stealth_mode
Bypass bot detection systems with advanced anti-detection techniques including fingerprint randomization, human behavior simulation, and stealth browser configurations.
Use Cases
Protected E-commerce Sites
Scrape product data from sites with Cloudflare, DataDome, or PerimeterX protection
Social Media Platforms
Extract public data from platforms with sophisticated bot detection
Financial Data Sites
Access market data, stock prices, and financial information from protected sources
Rate-Limited APIs
Bypass aggressive rate limiting with fingerprint rotation
Geo-Blocked Content
Access region-restricted content with residential proxy support
High-Security Testing
Test your own anti-bot systems with advanced evasion techniques
Endpoint
/api/v1/tools/stealth_mode
Parameters
Name | Type | Required | Default | Description |
---|---|---|---|---|
operation | string | Required | - | The scraping operation to perform: fetch, scrape, or screenshot Example: scrape |
url | string | Required | - | Target URL to scrape with stealth mode Example: https://protected-site.com |
level | string | Optional | medium | Stealth level: basic, medium, or advanced Example: advanced |
stealthConfig | object | Optional | - | Custom stealth configuration options Example: {"randomizeFingerprint": true, "simulateHumanBehavior": true} |
randomizeFingerprint | boolean | Optional | true | Randomize browser fingerprint on each request Example: true |
simulateHumanBehavior | boolean | Optional | true | Add random delays and mouse movements Example: true |
rotatePro Proxy | boolean | Optional | false | Use residential proxy rotation (additional cost) Example: false |
Stealth Levels
- User-Agent randomization
- Basic header manipulation
- Cookie handling
- ~1-2 second delay
- Full fingerprint randomization
- Canvas/WebGL fingerprint masking
- Timezone and language spoofing
- Human-like scrolling and movements
- ~3-5 second delay
- All medium features plus:
- WebDriver detection evasion
- Bot-specific JavaScript challenge bypass
- Advanced TLS fingerprinting
- Mouse movement simulation
- Random click patterns
- ~8-12 second delay
Request Examples
Response Example
{ "success": true, "data": { "url": "https://protected-site.com", "operation": "scrape", "level": "advanced", "content": "...", "contentLength": 45678, "detectionBypassed": true, "fingerprint": { "userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)...", "viewport": { "width": 1920, "height": 1080 }, "timezone": "America/New_York", "language": "en-US" }, "stealthMetrics": { "fingerprintChanges": 12, "humanActionsSimulated": 8, "delaysApplied": 6, "totalStealthTime": 8200 } }, "credits_used": 3, "credits_remaining": 997, "processing_time": 8750}
data.detectionBypassed
Whether bot detection was successfully evadeddata.fingerprint
Browser fingerprint used for this requestdata.stealthMetrics
Details about stealth techniques applieddata.stealthMetrics.totalStealthTime
Time spent on stealth measures (ms)credits_used
Fixed 3 credits per stealth mode requestprocessing_time
Total time including stealth delays (8-15 seconds typical)Error Handling
Detection Failed (403 Forbidden)
Bot detection couldn't be bypassed. Try increasing stealth level or enable proxy rotation.
CAPTCHA Required (429 Too Many Requests)
Site presented a CAPTCHA challenge. Contact support for CAPTCHA solving integration.
Invalid Operation (400 Bad Request)
Operation must be one of: fetch, scrape, or screenshot.
Timeout Error (500 Internal Server Error)
Stealth mode timed out. Site may be too slow or heavily protected.
Credit Cost
What's Included:
- Fingerprint randomization (all levels)
- Human behavior simulation
- Anti-detection techniques
- WebDriver detection evasion (medium+)
- Canvas/WebGL masking (medium+)
- Advanced TLS fingerprinting (advanced)
Plan Recommendations:
Free Plan: 1,000 credits = 333 stealth requests
Hobby Plan: 5,000 credits = 1,666 stealth requests ($19/mo)
Professional Plan: 50,000 credits = 16,666 stealth requests ($99/mo)