<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authorize.net webhooks and Cloudflare &amp;quot;attack mode&amp;quot; in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Authorize-net-webhooks-and-Cloudflare-quot-attack-mode-quot/m-p/94258#M58300</link>
    <description>&lt;P&gt;JavaScript Challenges: When "I'm Under Attack Mode" is enabled, Cloudflare presents a JavaScript challenge to visitors to verify they are legitimate users and not bots. This challenge involves a brief "Checking your connection" screen and requires the client to execute JavaScript.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Oct 2025 11:21:39 GMT</pubDate>
    <dc:creator>Rectee</dc:creator>
    <dc:date>2025-10-08T11:21:39Z</dc:date>
    <item>
      <title>Authorize.net webhooks and Cloudflare "attack mode"</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Authorize-net-webhooks-and-Cloudflare-quot-attack-mode-quot/m-p/93919#M58107</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using Authorize.net on a magento 2 site.&amp;nbsp; We are being inundated by AI scrapers and need to restrict them.&amp;nbsp; The conventional methods have failed to keep them out.&amp;nbsp; Cloudlare has a mode “I’m Under Attack” which requires attachments to the site to verify that they are human.&amp;nbsp; Unfortunately this break the Authorize.net webhooks.&lt;/P&gt;&lt;P&gt;If I could know the IP addresses that the webhooks were coming from I could create a rule to specifically allow these IP addresses.&amp;nbsp; Can anyone help me get these IP addresses?&lt;/P&gt;&lt;P&gt;If anyone has a different/better solution I would love to hear it.&amp;nbsp; When I search for solutions ho to solve this they suggest using features of Cloudflare that have been deprecated or are not part of the free package that we use.&lt;/P&gt;&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 11:52:28 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Authorize-net-webhooks-and-Cloudflare-quot-attack-mode-quot/m-p/93919#M58107</guid>
      <dc:creator>Proflix</dc:creator>
      <dc:date>2025-09-08T11:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Authorize.net webhooks and Cloudflare "attack mode"</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Authorize-net-webhooks-and-Cloudflare-quot-attack-mode-quot/m-p/94258#M58300</link>
      <description>&lt;P&gt;JavaScript Challenges: When "I'm Under Attack Mode" is enabled, Cloudflare presents a JavaScript challenge to visitors to verify they are legitimate users and not bots. This challenge involves a brief "Checking your connection" screen and requires the client to execute JavaScript.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:21:39 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Authorize-net-webhooks-and-Cloudflare-quot-attack-mode-quot/m-p/94258#M58300</guid>
      <dc:creator>Rectee</dc:creator>
      <dc:date>2025-10-08T11:21:39Z</dc:date>
    </item>
  </channel>
</rss>

