Learn under what circumstances Cloudflare displays a Captcha to a visitor and how to resolve such issues.
There are several common reasons a Cloudflare-protected website displays a Captcha to a site visitor:
- The visitor’s IP address demonstrated previous suspicious activity online. Review your client IP address for malicious activity at Project Honeypot. If no suspicious activity is observed from the visitor’s IP address after a two-week period, Cloudflare stops challenging the IP address.
- The website owner blocked the country associated with the visitor’s client IP.
- The visitor’s actions activated a Web Application Firewall rule enabled by the website owner.
An example Captcha page is similar to the following:
Cloudflare employees cannot remove a Captcha. Only the website owner can configure their Cloudflare settings to stop the Captcha. When observing a Cloudflare Captcha page similar to the above, there are several possible approaches to resolve the issue:
- Request the website owner to whitelist the visitor’s IP address.
- The visitor’s computer is infected and requires an antivirus scan. Also, it is possible for an antivirus or firewall service on the client’s computer to block access to the Captcha image.
Set the Challenge Passage
When Cloudflare evaluates a cf_clearance cookie, a few extra minutes are included to account for clock skew. For XmlHTTP requests, an extra hour is added to the validation time to prevent breaking XmlHTTP requests for pages that set short lifetimes.
Challenge Passage controls the cf_clearance cookie and is managed via the Settings tab of the Cloudflare Firewall app. A visitor is issued a new challenge when the configured Challenge Passage time expires.
The Challenge Passage does not apply to challenges issued by the Web Application Firewall (WAF). Also, Challenge Passage does not apply to Rate Limiting unless the rate limit is configured to issue a challenge.