Several online tools can test if your bot, web scraper, or automated browser script is being detected as a bot by analyzing your fingerprint, IP address, and behavior.
Top Web Tools for Testing Bot Detection
- Pixelscan (pixelscan.net): A highly recommended, modern tool that analyzes your browser fingerprint, proxy behavior, and connection details to tell you if you are flagged as «Human» or «Bot».
- CreepJS (abrahamjuliot.github.io/creepjs): A very advanced, rigorous tool for analyzing browser fingerprints, often used to test how «insane» or unique a browser setup is.
- BrowserScan (browserscan.net): Checks for automation, WebGL, WebRTC leaks, and browser properties to determine if your environment is controlled by a robot.
- BrowserLeaks (browserleaks.com): Provides comprehensive, detailed information about your browser, IP, and web technologies (Canvas, WebGL, DNS).
- f.vision: A tool for testing browser fingerprinting and leakage.
- WhatLeaks (whatleaks.com): Focuses heavily on proxy, VPN, and networking detection aspects.
- Sannysoft (bot.sannysoft.com): A classic, simple test to see if
navigator.webdriveris detected.
What These Tools Test For
- Fingerprint Consistency: They check if your user agent matches your browser capabilities (e.g., if you claim to be Chrome on Windows but have Linux-specific fonts).
- Headless Detection: They identify if you are running in headless mode (e.g., Headless Chrome), which is a common sign of automation.
- Proxy/VPN Usage: They analyze your IP address reputation to see if it is from a known data center, which is often flagged.
- Behavioral Signals: Some tools (like advanced CAPTCHA tests) analyze mouse movements, typing speed, and page interaction timing.
How to Use Them
- Open the tool (e.g., pixelscan.net) using your bot’s browser instance (Puppeteer, Selenium, Playwright).
- Navigate to the site.
- Read the «Bot Detected» or «Human Detected» status to identify which parameters are giving you away
Deja una respuesta