Free WAF Detector

Detect web application firewalls protecting a site

Enter a URL to detect whether a Web Application Firewall (WAF) is protecting the site. This tool sends benign test requests and analyzes response headers, status codes, and body content to fingerprint the specific WAF vendor and configuration.

Trusted by teams at

Ramp
Pilot
Vercel
Stripe
Better Auth
SST
OpenCode

How it works

How WAF Detector works

01

Enter a URL

Paste any website URL. The tool sends several requests to analyze how the server responds to different types of input.

02

Fingerprint WAF behavior

We send a normal request, then requests with SQL-like and XSS-like query parameters. By comparing response codes, headers, and body content across requests, we identify whether a WAF is present and which vendor it is.

03

Get WAF analysis

You receive the detected WAF vendor, confidence level, evidence from headers and responses, and security implications for penetration testing scope.

Features

What WAF Detector checks

Detect major WAF vendors

Identifies Cloudflare, AWS WAF, Akamai, Sucuri, Imperva/Incapsula, Barracuda, F5 BIG-IP, Fortinet FortiWeb, ModSecurity, and other popular WAF solutions from response signatures.

Analyze response behavior differences

Compares how the server responds to normal vs suspicious requests. WAFs typically return different status codes (403, 406, 429) or custom block pages when they detect attack patterns.

Identify WAF-specific headers

Checks for vendor-specific headers like cf-ray (Cloudflare), x-sucuri-id (Sucuri), x-amz-waf (AWS), and others that directly reveal the WAF in use.

Assess bypass considerations

Notes the WAF's known capabilities and common bypass techniques that penetration testers should consider when scoping an engagement.

Use cases

Who should use the free WAF Detector

Penetration Testers

Identify the WAF before starting an engagement to set expectations, adjust testing techniques, and determine whether WAF bypass is in scope. Knowing the WAF vendor helps select appropriate evasion techniques.

Security Engineers

Verify that your WAF is properly deployed and detectable. If a WAF is configured but not blocking test payloads, it may be in monitoring-only mode or misconfigured.

DevOps Teams

Confirm WAF deployment across all web properties after infrastructure changes, CDN migrations, or DNS updates. Ensure no services are accidentally exposed without WAF protection.

FAQ

Frequently asked questions

Everything you need to know about the free WAF Detector.

Go beyond WAF Detector

This free WAF Detector checks a handful of things. Maced's AI pentest checks thousands.

Get a full autonomous penetration test — including OWASP Top 10, authentication flaws, business logic errors, API security, and more — with a compliance-ready report in hours.

Proof of exploit on every finding · SOC 2 & ISO 27001 compatible