DNS & Network

Rate Limiting

Rate limiting controls how many requests a user or IP address can make to an API or web application within a given time window, protecting against brute-force attacks, credential stuffing, scraping, and denial-of-service. It is commonly implemented at the API gateway, WAF, or application layer using sliding window or token bucket algorithms. Returning HTTP 429 (Too Many Requests) with a Retry-After header is the standard response. Rate limiting is a PCI-DSS and SOC 2 control for authentication endpoints.

Why it matters for your website

  • 1Can result in traffic interception, phishing attacks using your domain, or service disruption
  • 2Often discovered and exploited before organizations notice
  • 3Preventable with proper monitoring and defensive DNS configuration

Check your site for Rate Limiting issues

Run a free scan to see if your domain has any Rate Limiting-related vulnerabilities or misconfigurations.

Related Terms

Browse Glossary

View all 85 terms

Free Security Scan

See your SSL, headers, CORS, DNS, and email security score in seconds.