Humans Only Humans Only
Humans Only Humans Only

Ecommerce bot protection: a practical playbook for product owners and developers

Published on 2026-02-19

Protect login, checkout and inventory with risk-based defences that stop automation and keep real customers moving.

Ecommerce bot protection: a practical playbook for product owners and developers visual #1

Ecommerce bot protection: what you’re actually defending

Ecommerce bot protection isn’t about “reducing bot traffic”. It’s about stopping automated abuse of the actions that move money—without getting in your real customers’ way.

OWASP frames this as automated threats to web applications: attackers abuse normal functionality (login, checkout, search) at machine speed, not by “hacking” in the movie sense (OWASP Automated Threats). In ecommerce, that difference matters, because your “normal” flows are the product.

The four ecommerce bot problems that show up first

Most shops don’t notice bots until the symptoms hit revenue, ops, or both. Here are the usual suspects.

  1. Credential stuffing on login: automated use of stolen username/password pairs to break into accounts (OWASP: Credential stuffing).
  2. Card testing at checkout: bots run lots of tiny authorisations to validate stolen card details; it scales fast and gets expensive (Stripe: card testing surge).
  3. Scraping: automated collection of pricing, inventory, and content (and sometimes “add to basket” to probe availability) (OWASP OAT-011 Scraping).
  4. Scalping / inventory hoarding: bots reserve scarce stock faster than humans can click.

Product owners feel this as worse conversion, higher declines, and angry support tickets. Developers feel it as rate spikes, noisy logs, and incident-driven roadmap drift.

A simple model that works: Detect → Decide → Respond

If you want ecommerce bot protection that’s shippable (and operable), keep the mental model boring:

  1. Detect signals (velocity, browser integrity, network reputation, behavioural patterns).
  2. Decide risk per request (score or category).
  3. Respond with a small set of outcomes.

The best policy for cross-functional teams is still:

  1. Allow (low risk)
  2. Step-up (medium risk)
  3. Block or throttle (high risk)

That’s it. If you can’t explain your bot strategy in those three outcomes, you’ll struggle to tune it without breaking conversion.

Where to put protection in an ecommerce funnel

Ecommerce bots don’t “browse”; they target the endpoints with value. Protect those first, then expand.

High-value endpoints to prioritise

  1. POST /login and password reset flows (account takeover and fraud)
  2. POST /checkout / payment authorisation attempts (card testing and scripted fraud)
  3. “Add to basket” and reservation holds (inventory depletion)
  4. Search, pricing, and product detail APIs (scraping and competitive intel)
  5. Promo, rewards, and referral redemption (automated claiming)

Concrete example: if card testing is your headache, protecting only the login page won’t help much. You need controls around payment attempts and tokenisation, because that’s where the bot’s ROI is.

Defence-in-depth that doesn’t murder conversion

You don’t need a dozen tools. You need a few controls that reinforce each other.

1) Rate limit like you mean it (server-side)

Rate limiting is unglamorous and wildly effective when it’s done per endpoint with sensible keys. Cloudflare’s WAF docs show practical patterns like applying different thresholds by URI path and method, and escalating penalties as behaviour worsens (Cloudflare rate limiting best practices).

For ecommerce bot protection, don’t key on IP alone. Use combinations such as:

  1. IP + session/device
  2. account ID (if logged in)
  3. email/phone (where collected)
  4. basket ID / checkout session
  5. payment fingerprinting signals from your PSP (where available)

2) Step up verification at the moment of risk

Blanket challenges across the whole shop are a conversion tax. Instead, trigger step-up checks when signals stack up:

  1. high-velocity attempts on login/checkout
  2. repeated declines or repeated low-value payments (classic card testing patterns)
  3. data-centre/anonymiser networks + bursty behaviour
  4. unusual workflow (skipping pages humans typically touch)

PCI SSC explicitly recommends a layered defence to mitigate account testing (also called card testing/BIN attacks), rather than relying on any single control (PCI SSC: Beware of Account Testing Attacks).

3) Make flows harder to automate (without redesign)

Small implementation choices can make automation brittle:

  1. one-time tokens tied to session for critical actions
  2. strict idempotency rules for payment requests
  3. reject token/session mismatches (created in session A, used in session B)
  4. require modern browser behaviour on checkout pages

These are not “security theatre”; they’re practical friction against scripts.

4) Separate “good automation” from “bad automation”

Your ecommerce bot protection should allow the bots you want (search crawlers, uptime monitors, approved integrations). Treat “block all bots” as a bug, not a feature.

Metrics that tell you if you’ve actually won

If you only measure “blocked requests”, you’ll tune your system into a conversion problem.

Track:

  1. Step-up rate by endpoint (how often humans see extra verification)
  2. Pass rate and time-to-complete for step-up
  3. Checkout conversion and drop-off on protected steps
  4. Successful abuse rate (e.g. fake checkouts, ATOs, card testing attempts that reached your PSP)
  5. Decline rate and top decline codes during attacks

Concrete example: a good week isn’t “we blocked 2 million requests”. It’s “checkout conversion stayed flat, declines dropped, and card testing attempt volume collapsed.”

A rollout plan product and engineering can agree on

Start narrow, prove impact, then expand.

  1. Pick one pain point endpoint (usually POST /login or payment attempts).
  2. Run in monitor mode briefly to baseline volumes and false positives.
  3. Ship Allow / Step-up / Block with conservative thresholds.
  4. Add endpoint-specific rate limiting and escalation.
  5. Review weekly: tune thresholds and keep an eye on conversion and support tickets.

This keeps ecommerce bot protection as an optimisation loop, not a permanent emergency.

Where Humans Only fits

Humans Only is built for ecommerce bot protection that’s fast, privacy-first, and pleasant for real customers. You get user-friendly verification (no frustrating image puzzles), typically completes in under 2 seconds, plus real-time analytics so you can tune per endpoint with confidence.

If you want to protect login, checkout, and high-value APIs without turning your store into a fortress with a queue outside, Humans Only is designed for it: Stop Bots, Welcome Humans.

We use cookies to improve your experience and anonymously analyze usage.