Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Accuses Perplexity AI For Evading Firewalls and Crawling Websites by Changing User Agent

Posted on August 5, 2025August 5, 2025 By CWS

Perplexity AI, an rising question-answering engine powered by superior massive language fashions, has lately come underneath scrutiny for deploying stealth crawling strategies that bypass customary internet defenses.

Initially launched with clear intentions, Perplexity’s crawlers would determine themselves through declared person brokers corresponding to PerplexityBot/1.0, respecting robots.txt directives and internet software firewall (WAF) guidelines.

Nonetheless, in early August 2025 researchers noticed that after blocked, Perplexity started modifying its id mid-crawl, switching to generic browser person brokers and unannounced IP ranges to be able to entry disallowed content material.

Cloudflare analysts famous that this shift in conduct represented a deliberate evasion tactic slightly than an inadvertent misconfiguration.

After encountering network-level blocks, the system altered its person agent string to impersonate Chrome on macOS, issuing requests like:-

GET /secret-page.html HTTP/1.1
Host: testexample.com
Consumer-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36

These stealth requests rotated via a number of autonomous system numbers (ASNs) and IP blocks not publicly attributed to Perplexity, enabling persistent entry throughout hundreds of thousands of day by day requests.

The ramifications of this conduct are vital. Web site operators who explicitly disallowed Perplexity of their robots.txt recordsdata and deployed customized WAF guidelines reported continued unauthorized scraping of delicate pages.

Assault movement (Supply – Cloudflare)

This abuse of belief undermines core web ideas and raises authorized and coverage questions concerning AI coaching knowledge sourcing.

Content material homeowners now face the issue of distinguishing authentic human visitors from obfuscated AI crawlers, complicating compliance with privateness laws and copyright protections.

Moreover, Perplexity’s fallback technique upon being blocked—counting on various knowledge sources—demonstrates adaptive persistence.

When direct crawling was unsuccessful, the system generated solutions primarily based on secondary web sites, although with diminished specificity in comparison with unique content material.

This multi-source aggregation underscores the AI’s resilience and amplifies issues over knowledge provenance and accuracy.

Detection Evasion Mechanisms

A key facet of Perplexity’s subtle persistence is its dynamic person agent rotation mixed with speedy ASN hopping.

By programmatically biking via person brokers and IP prefixes, the crawler evades signature-based firewall guidelines.

Cloudflare researchers recognized that stealth crawlers keep session continuity by preserving cookies and referrer headers throughout id modifications, successfully masquerading as particular person human customers.

Mitigation requires behavioral evaluation that flags anomalous patterns—excessive request velocity, uniform inter-request timing, and repeated cookie exchanges—slightly than static signature matching.

Steady refinement of bot administration heuristics and adoption of rising requirements like Net Bot Auth are essential to counteract this evolving menace.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searche

Cyber Security News Tags:Accuses, Agent, Changing, Cloudflare, Crawling, Evading, Firewalls, Perplexity, User, Websites

Post navigation

Previous Post: Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
Next Post: New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks

Related Posts

New nightMARE Python Library to Analyze Malware and Extract Intelligence Indicators Cyber Security News
How To Detect Them Early  Cyber Security News
Threat Modeling for DevSecOps Practical Guide Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News