PerimeterX rebranded to HUMAN. The detection got even harder.
PerimeterX was already one of the toughest anti-bot systems. When they rebranded to HUMAN Security, they didn’t just change the logo — they upgraded their detection engine significantly.
HUMAN (PerimeterX) now deploys advanced JavaScript challenges that detect automation at the browser engine level. Not at the header level. Not at the IP level. At the engine level.
Bright Data’s proxies? Irrelevant. ScraperAPI’s “anti-bot mode”? Useless. Oxylabs’ residential IPs? Doesn’t matter.
PerimeterX doesn’t care about your IP address. It cares about your browser.
How PerimeterX detects Bright Data and ScraperAPI
Canvas fingerprinting
PerimeterX renders invisible graphics using the HTML5 Canvas API and WebGL. Every GPU produces a slightly different output. Real browsers produce unique, consistent fingerprints. Headless browsers — the kind Bright Data, ScraperAPI, and ZenRows use — produce identical, detectable fingerprints.
One canvas test. Instant detection.
Browser API interrogation
PerimeterX’s JavaScript checks hundreds of browser APIs:
- Does
navigator.webdriverexist? (Puppeteer sets this) - Does
window.chrome.runtimerespond correctly? (Headless Chrome doesn’t) - Does
Permissions.queryfor “notifications” work? (Headless browsers fail this) - Does
navigator.pluginscontain real plugins? (Headless Chrome returns empty)
Bright Data’s headless browsers fail at least a dozen of these checks. PerimeterX only needs one failure to block.
Behavioral biometrics
PerimeterX tracks how you interact with the page:
- Mouse movement patterns — speed, acceleration, micro-movements
- Keyboard input — typing speed, key press duration, tab patterns
- Scroll behavior — smooth vs. instant, scroll speed variation
- Click patterns — hover-then-click vs. instant click
Automated scripts don’t produce natural behavioral patterns. PerimeterX’s ML models are trained on billions of real user sessions and can detect even sophisticated behavioral simulation.
Cross-page journey analysis
PerimeterX doesn’t just analyze individual requests. It tracks your entire journey across the site. Real users browse naturally — they visit the homepage, navigate through categories, read content. Bots jump directly to data pages.
Bright Data’s approach of hitting specific URLs directly? That’s exactly the pattern PerimeterX is looking for.
Who uses PerimeterX (HUMAN)?
PerimeterX protects high-value sites across multiple industries:
- Retail — Major online retailers, fashion brands, luxury goods
- Travel — Airlines (Lufthansa, etc.), hotel chains, OTAs
- Financial services — Banking portals, fintech platforms, trading sites
- Media — Streaming services, news sites, content platforms
- Gaming — Game stores, digital marketplaces, in-game economies
If your target site uses PerimeterX, you’ve probably already discovered that Bright Data can’t scrape it.
The Bright Data / ScraperAPI / Oxylabs experience on PerimeterX
Here’s what every generic scraping service does on a PerimeterX-protected site:
- Request arrives → PerimeterX JavaScript loads
- Canvas fingerprint → Headless browser detected
- API checks → Automation markers found
- Behavioral analysis → No mouse movement, no natural interaction
- Result → Block. 403. CAPTCHA. Empty page.
Now do this 1,000 times with Bright Data at $25/1K:
- Requests sent: 1,000
- Requests blocked: 950-1,000
- Money spent: $25.10
- Usable data: Zero
Repeat with ScraperAPI. Repeat with Oxylabs. Repeat with ZenRows. Same result every time.
How UltraWebScrapingAPI defeats PerimeterX
We’ve invested heavily in defeating PerimeterX (HUMAN) because it protects some of the most valuable data on the internet:
Real canvas fingerprints
Our browsers have real GPUs producing unique, authentic canvas fingerprints. Not spoofed. Not emulated. Real GPU rendering that passes PerimeterX’s validation.
Clean browser environments
Zero automation markers. No Puppeteer artifacts. No Playwright traces. No headless signatures. Our Chrome browsers are indistinguishable from a real user’s browser.
Authentic behavioral patterns
Our browsing sessions include natural mouse movements, realistic scroll patterns, and human-like interaction timing. PerimeterX’s behavioral models see a real user.
Per-site optimization
Each PerimeterX deployment is configured differently. Retail sites have different rules than airline sites. Financial sites have stricter thresholds than media sites. We analyze and optimize for each specific deployment.
The real cost comparison
| Scenario | Bright Data | UltraWebScrapingAPI |
|---|---|---|
| 1K requests to PerimeterX site | $25.10 | $50.00 |
| Successful responses | 0-50 | 999 |
| Cost per successful page | $500+ or ∞ | $0.05 |
| Data quality | Empty HTML / CAPTCHAs | Full rendered pages |
Our advice
For sites without PerimeterX: use Bright Data, ScraperAPI, or Oxylabs. They’re cheaper for easy sites.
For PerimeterX-protected sites: stop wasting money on services that can’t get through. Test your URL in our playground — free, instant, no signup.
PerimeterX was built to be unbreakable. We broke it. 99.9% of the time.