Seleniumbase UC + Proxies - Can't bypass Cloudflare Captcha and Detected location - on Pixelscan #2818
-
I am a new developer After I login to the account with seleniumbase UC, when I get to a certain page in that website I face Cloudflare "Verifying you are human" and then I am unable to continue since its not working to click on "verify" button manually (by manually I mean that I am clicking manually with my mouse because I haven't automated it yet since its not working. I have added Proxies and I spoof the location to the proxy location.
|
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 6 replies
-
The easiest way to figure out why you're being detected is to hit https://pixelscan.net/. The example for that bypasses bot-detection on there successfully: SeleniumBase/examples/raw_pixelscan.py The example scripts that bypass Cloudflare are working successfully:
I saw lots of things from your script that could get you detected:
You should review the 2nd UC Mode Video tutorial: |
Beta Was this translation helpful? Give feedback.
-
I tried to do the changes you suggested but I am still getting detected so I went to a more simple approach and tried pixelscan, it worked with this script:
At first it did not work when I applied the spoofed timezone before opening the page for some weird reason no idea why, but then I applied the spoofed time zone after opening the webpage and refreshed the page and It finally worked and pixelscan did not detect anything suspicious, but then I tried the SAME approach on gitlab.com at it did not work:
It's getting stuck on the CAPTCHA page and won't pass it. I can't figure out a way to bypass it. I spoofed the timezone to match the proxy, which works on Pixelscan, but not on Gitlab.com, which has the same type of CAPTCHA as the actual website I need to access. Any suggestions? |
Beta Was this translation helpful? Give feedback.
-
Each time chromedriver disconnects from Chrome to avoid detection (after the |
Beta Was this translation helpful? Give feedback.
-
Sure. Thank you! if anything pops up and you find a solution or anyone else
please inform me 🙏
…On Mon, Jun 3, 2024, 00:07 Michael Mintz ***@***.***> wrote:
I would experiment and see if you can figure it out. I’ve given you as
much information as I can.
—
Reply to this email directly, view it on GitHub
<#2818 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ASIE6WN2LX26BUVTL5AWIWTZFOCS7AVCNFSM6AAAAABIT44TS2VHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM4TMNBQHE4DS>
.
You are receiving this because you authored the thread.Message ID:
***@***.***
com>
|
Beta Was this translation helpful? Give feedback.
The easiest way to figure out why you're being detected is to hit https://pixelscan.net/.
The example for that bypasses bot-detection on there successfully: SeleniumBase/examples/raw_pixelscan.py
The example scripts that bypass Cloudflare are working successfully:
I saw lots of things from your script that could get you detected:
pls
. (The default one is best)WebDriverWait
(SeleniumBase has its own built-in waits)cl…