Bypass Amazon WAF
There are 2 options how this captcha is used at destination pages:
1. Bots filtering page which Amazon shows automatically when you visit a website behind their firewall. We call it "gokuProps", because you can find window.gokuProps parameters at this page source code.
2. Standalone captcha widget which is triggered by user's action. We call it Widget.
Identify the type of captcha yourself and use switcher below to show different version of the documentation and examples.
Use this type of tasks to obtain Amazon WAF cookie token. Simply grab temporary iv and context tokens along with permanent key site key, send them to our API. Result of the task is a token which you can use in your HTTP request as a cookie value with name amazon-waf-token.
Test this type of task first for bypass rate before testing tasks with proxies.


Task object
Property | Type | Required | Purpose |
---|---|---|---|
type | String | Yes | AmazonTaskProxyless |
websiteURL | String | Yes | Address of a target web page. Can be located anywhere on the web site, even in a member area. Our workers don't navigate there but simulate the visit instead. |
websiteKey | String | Yes | Value of key from window.gokuProps object in WAF page source code. |
iv | String | Yes | Value of iv from window.gokuProps object in WAF page source code. |
context | String | Yes | Value of context from window.gokuProps object in WAF page source code. |
captchaScript | String | No | Optional URL leading to captcha.js |
challengeScript | String | No | Optional URL leading to challenge.js |
Request example
#pip3 install anticaptchaofficial
from anticaptchaofficial.amazonproxyless import *
solver = amazonProxyless()
solver.set_verbose(1)
solver.set_key("YOUR_API_KEY")
solver.set_website_url("https://website.com")
solver.set_website_key("key_value_from_window.gokuProps_object")
solver.set_iv("iv_value_from_window.gokuProps_object")
solver.set_context("context_value_from_window.gokuProps_object")
# Optional script URLs
solver.set_captcha_script("https://e9b10f157f38.9a96e8b4.us-gov-west-1.captcha.awswaf.com/e9b10f157f38/76cbcde1c834/2a564e323e7b/captcha.js")
solver.set_challenge_script("https://e9b10f157f38.9a96e8b4.us-gov-west-1.token.awswaf.com/e9b10f157f38/76cbcde1c834/2a564e323e7b/challenge.js")
# Specify softId to earn 10% commission with your app.
# Get your softId here: https://anti-captcha.com/clients/tools/devcenter
solver.set_soft_id(0)
token = solver.solve_and_return_solution()
if token != 0:
print "token: "+token
else:
print "task finished with error "+solver.error_code
Task solution object
Property | Type | Purpose |
---|---|---|
token | String | Use this token as a cookie value with name "aws-waf-token" in your request to the target web page. |
Response example
{
"errorId":0,
"status":"ready",
"solution": {
"token": "fe4c2ff3-6ed6-40fa-95c9-4c738a7dad49:FgoAe0ZLBmYBAAAA:LK0S/m1nGbfjDk/9i6tMmiUWGecMfyjvuAx9lY6ZhaBUmjrILEqW00UAsEliykPjwebdzn9J3..."
},
"cost":"0.002000",
"ip":"46.98.54.221",
"createTime":1472205564,
"endTime":1472205570,
"solveCount":"0"
}