tencent cloud


Bot Traffic Analysis

Last updated: 2022-06-28 16:55:55


    Bot behavior management identifies friendly and malicious bots, and take appropriate traffic management strategies. It can allow traffic from search engine bots, ignore traffic from malicious bots crawling product information, slow down its response or take different response strategies, and deal with resource consumption, information leakage and ineffective marketing caused by malicious bot crawling. Meanwhile, it protects friendly bot programs (such as search engines and advertising programs).

    With rich data provided by this module, bot traffic analysis can quickly analyze how domain names are affected by bots in terms of the following metrics: types of bots, types of actions, distribution of bot scores, top statistics by bot requests, and vulnerable URLs.


    1. Log in to the WAF console and select Bot Traffic Analysis on the left sidebar.
    2. On the page that appears, click All domain names in the upper-left corner.
    3. If you select a specific domain name, then click View configuration. You will be redirected to the bot and application security page.
    4. Specify a date or use the filter to search data of a specific domain name.
      • By specifying a date, you can search data of a specific domain name within the specified period.
      • By setting the filter, you can add conditions to filter out data you need.
    5. In the Requests section, you can view requests that are identified as different types of bots and the bot session scores.
      • According to the action and score you configure, requests sent to a website are scored and categorized.
      • The bot session scores chart shows you how bot requests distribute and the bot scores given, and lets you take appropriate actions to combat malicious bots.
    6. In the Actions section, you can view the actions taken on the requests at different times and the proportion of actions.
    7. Top 5 exceptional requests shows you top 5 requests within the specified period that are considered abnormal based on bot features detected. You can click Filter or Exclude to display data you need.
    8. Top 5 by request count shows you top 5 data within the specified period based on the bot features detected. You can click Filter or Exclude to display data you need.
    9. You can also view a list of URLs that are the most vulnerable to bots and the actions taken to combat bots. The data in the list will be collected every 5 minutes.

    Field description

    • Access source: Source of the access request.

    • Session ID: ID of the session.

    • Region: Location of the access source.

    • Domain name: Accessed domain name.

    • Request path: URI of the access request.

    • Action: Action taken by the bot behavior management module.

    • Number of accesses: Number of sessions.

    • Hit module: Modules that are hit.

    • Bot score: Bot score of the access request.

    • Bot tag: Bot tag of the access request.

    • Threat intelligence: It provides collected data that is used to analyze attack behaviors.

    • Intelligent analysis modules: Modules that analyze access requests are hit.

    • Type of exceptions: Types of exceptions detected.

    • Logging time: Time that the bot accesses.

    • Operation:

      • View logs: It allows you to view access logs.

        To view access logs, you need to subscribe to the access logging service.

    • View details: It allows you to view details of a specific bot feature.
    • Add to blocklist: It allows you to add a specific access source IP to the blocklist.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support