It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda WAF-as-a-Service

Bot Categories

  • Last updated on

The following table provides information about the bot categories:

Bot Category

Sub Categories

Description

Browser Integrity

  • Improper Header Name/Value Pair

  • Non-Standard User Agent Build

Bots not sending proper header key value pair, or sending random user-agent strings to avoid detection.

AI Bot

  • Gen AI (Language Model)

  • Gen AI (Conversational Agent)

AI Bots utilize advanced machine learning and natural language processing (NLP) to generate, analyze, or enhance human-like text. These bots enable automated responses, content creation, and AI-driven assistance. However, they also pose risks such as unauthorized data scraping, intellectual property violations, and automated misinformation generation. With the rise of generative AI, unregulated bot activity raises transparency, security, and ethical concerns for online platforms. Blocking AI bots helps mitigate data theft, competitive exploitation, and compliance risks.

Social Media Agent

  • Link Preview Generator

  • Feed Fetcher*

A client that fetches feeds, such as RSS feeds, or uses an API. Indexing website for internal search engines. Supplies visual support when a link is shared. For example, Yahoo Pipes, and Facebook External Hit.

Advanced Persistent Bots

  • Advanced Persistent Bots

Bots that rotate IP addresses and user-agent headers to avoid detection.

Advanced Bots

  • Programmatic Browsing*

  • Automated Browser/Web driver

  • Headless Browser

Bots using the popular User-Agent Browser Automation tools, headless browsers, or web drivers. These bots are capable of executing JavaScript.

Technical Partners/ Commercial Tools

  • Site Monitoring*

  • Marketing/Advertising*

  • SEO/Website Analyzer Tool

  • Chatbot

  • Vulnerability Scanner*

Tools or services that send requests to a website for a positive purpose, usually by the site owner or host, such as health checkers, broken link checkers, performance measurement tools, and payment service providers. For example, Rackspace Monitoring Agent, Amazon Route 53 Health Checks.

Known Violator

  • Empty UA

  • Known Bad User Agent

  • Developer/Hacking Tool

  • HTTP Request Library

  • Application/Software Library

  • Known Bad Device

Known bad bots that are used to carry out attacks on websites.

Crawler/Indexer

  • Search Engine Bot*

  • Copyright Bot

  • Aggregator

A web crawler is a robot, also called a spider, that visits your website looking for updates and new information, and uses it for their own purposes, such as a search engine. Examples include Google Bot, and Apple Bot.

Uncategorized

  • Unclassified

The Advanced Threat Intelligence engine cannot map the attack to one of the existing bot categories.
OR
The system is not sure if the attack is being made by a bot or a human.

Therefore, the engine marks the category as Uncategorized and the sub-category as Unclassified.

Impersonator

  • Impersonator

Bots trying to mimic the behavior of good bots, such as Google Bot and Bing Bot, to avoid detection.

Tool (Developer Tool)

  • Website Analyzer Tool*

  • Proxy Service

  • Screenshot Creator*

  • Page Speed Tester*

  • Virus Scanner*

  • Backlink Checker*

  • Virtual Assistant

All tools that can be programmed for any purpose, malicious or not. For example, scripts or command line tools such as Wget and lwp-request, or programming language libraries that enable web requests such as Java or Python urllib.