Rate Limit Bypass Detection
Traditional rate limiting by IP fails against bots that use proxy pools, rotating residential proxies, or cloud infrastructure. ShieldLabs provides a stableDeviceID and VisitorID that survive IP changes.
The problem
Rate limiting by DeviceID
ShieldLabs built-in rate limiting
ShieldLabs automatically detects and bans devices exceeding 10 checks per minute. When triggered, all subsequent webhooks for that device return:Score === 999 as a fast path to block without processing other signals.
Detecting IP-cycling bots
Even if the bot uses a fresh IP each time, the Trust Score reveals the pattern:Blocking at the application level
Once aDeviceID is flagged, block it in your login/checkout middleware: