Keep public endpoints alive when arbitrage bots come calling
IP-tiered rate limits, paid-vs-free tier enforcement, and abuse shaping that holds up against arbitrage scanners, price feed scrapers, and DDoS-adjacent burst patterns.
What Fairvisor Does for Crypto & Web3
IP-Tiered Limits
Enforce different rate envelopes by IP type and reputation:
- Datacenter vs residential ASN — different default quotas
- Dynamic tightening for high-velocity anonymous sources
- IP reputation signals baked into enforcement decisions
Paid vs Free Tier Enforcement
Make free tier limits real:
- Hard quotas for unauthenticated and free-tier consumers
- Priority handling and higher limits for authenticated paid users
- Upgrade signals when free-tier limits are consistently hit
Abuse Shaping
Slow down and discourage automation without fully blocking:
- Tarpit responses to increase cost for high-frequency scanners
- Burst shaping that absorbs legitimate peaks but degrades bot patterns
- Cooldown windows after threshold breaches
DDoS-Adjacent Burst Protection
Hold public endpoints up during coordinated surges:
- Rate envelopes that don’t collapse under burst load
- Separate enforcement for public vs authenticated endpoints
- Edge enforcement before traffic reaches your infrastructure
What Abuse Looks Like
Three patterns that hit crypto and Web3 APIs hardest:
Arbitrage bots on price feeds.
A public/v1/ticker endpoint gets 400 requests/second from a single datacenter ASN. The bot is polling for price discrepancies across exchanges. Your free tier was designed for developers, not HFT infrastructure. IP-tiered limits with stricter quotas for hosting ASNs stops this without affecting real users. → IP type docs
Block scanner overload.
An on-chain indexer launches. Within hours, dozens of block explorer bots are hammering your RPC endpoint for historical block data. They’re not malicious — they’re just not your customers. Rate envelopes per API key, with lower defaults for unauthenticated traffic, keeps the endpoint available for paid users.MEV bot coordination.
Multiple bots poll your mempool endpoint at sub-second intervals, each from a different IP but with identical request patterns. Traditional IP-based limits don’t see the pattern. Behavioral rate limits — request velocity + timing uniformity + ASN clustering — catch it.Airdrop farming sweeps.
Campaign bots rotate wallets and IPs to hit eligibility and claim-check endpoints at machine cadence. Identity- and route-scoped quotas cap sweep velocity without degrading normal user claim flows.Who This Is For
- Exchanges with public market data APIs
- On-chain data providers and indexers
- RPC providers with free and paid tiers
- DeFi protocols with publicly accessible state endpoints
- Block explorers and analytics APIs