Overview
This step is optional. If your website uses a WAF, CDN protection, or rate limiting, you may see some 403 or 429 errors in your crawl results. For more accurate results, you can whitelist our crawler using one of the methods below.
Identification Methods
Our crawler can be identified using two methods:User-Agent String
Verification Header (Recommended)
Our crawler sends this unique header with every request to your site:Platform-Specific Instructions
- Cloudflare
- AWS WAF
- Nginx
- Apache
Cloudflare WAF
Create a Cloudflare WAF rule to allow our crawler:Alternative: User-Agent Matching
You can also use User-Agent matching if you prefer:Other Platforms
Sucuri
Sucuri
In the Sucuri dashboard:
- Go to Firewall → Access Control
- Under Whitelisted HTTP Headers, add:
- Header:
X-SEOCrawler-Verify - Value:
c0cf648c-fb8b-41f0-b25e-1c99646701e3
- Header:
- Save changes
Wordfence (WordPress)
Wordfence (WordPress)
In WordPress admin:
- Go to Wordfence → Firewall → Blocking
- Create a new whitelist rule
- Set pattern type to Custom Pattern
- Allow requests containing header
X-SEOCrawler-Verifywith valuec0cf648c-fb8b-41f0-b25e-1c99646701e3
Akamai
Akamai
In the Akamai Control Center:
- Go to your property configuration
- Add a new rule under Security
- Match on header
X-SEOCrawler-Verifyequalsc0cf648c-fb8b-41f0-b25e-1c99646701e3 - Set action to Allow
- Deploy the configuration
Fastly
Fastly
Add this VCL snippet:
Imperva / Incapsula
Imperva / Incapsula
In the Imperva dashboard:
- Go to Security → WAF → Policies
- Create a new Whitelist Rule
- Set condition: Header
X-SEOCrawler-Verifyequalsc0cf648c-fb8b-41f0-b25e-1c99646701e3 - Apply the rule
Verifying the Whitelist
After setting up your whitelist, run a new crawl to verify it’s working:Troubleshooting
Still seeing 403 errors
Still seeing 403 errors
- Verify the whitelist rule is active
- Check for multiple security layers (WAF + CDN + origin)
- Ensure the header name is exact:
X-SEOCrawler-Verify - Check rule priority/order
Still seeing 429 errors
Still seeing 429 errors
- Rate limiting may be configured at multiple levels
- Check both CDN and origin server configurations
- Verify the whitelist bypasses rate limiting, not just WAF
Can't find verification header
Can't find verification header
The header
X-SEOCrawler-Verify is sent with every request from our crawler. If you can’t see it in your logs, check that:- Your server logs include request headers
- No upstream proxy is stripping headers
Security Considerations
Our approach is secure because:- Unique tokens: Each domain has a unique verification token
- Header-based: Headers are harder to spoof than User-Agent strings
- Server-side verification: The check happens at your server/WAF level