How to Block Bot Traffic in Fastify With No Extra Infra

Fastify hooks (onRequest) and the SecureNow preload both work cleanly. Here's the production setup for IP blocking and user-agent filtering.

Lhoussine
May 9, 2026·5 min read

How to Block Bot Traffic in Fastify With No Extra Infra

Fastify gives you onRequest hooks for the fast path of request handling. Combined with the SecureNow preload, you have two clean options.

Option 1: SecureNow preload (recommended)

npm install securenow

# Update your start command:
node -r securenow/firewall-only server.js

500k IPs blocked, hourly refresh, automatic crawler allowlisting. Sub-millisecond per request. Free.

Option 2: Fastify onRequest hook

import Fastify from 'fastify';

const app = Fastify();

const BLOCKED_IPS = new Set(['185.220.101.42']);
const BAD_UA = /sqlmap|nikto|acunetix|masscan|python-requests/i;
const GOOD_BOTS = /googlebot|bingbot|gptbot|claudebot|perplexitybot/i;

app.addHook('onRequest', async (req, reply) => {
  const ip = req.headers['x-forwarded-for']?.toString().split(',')[0]?.trim() || req.ip;
  const ua = req.headers['user-agent'] || '';

  if (GOOD_BOTS.test(ua)) return;
  if (BLOCKED_IPS.has(ip)) return reply.code(403).send('Forbidden');
  if (BAD_UA.test(ua)) return reply.code(403).send('Forbidden');
});

This runs before any route handler. Blocked requests get a 403 with no further processing.

Allowlisting trusted proxies

Configure trust proxy properly:

const app = Fastify({
  trustProxy: 1, // or true, depending on topology
});

Without this, req.ip is the load balancer's IP, not the user's.

Verifying

npx securenow firewall status

Or via curl:

curl -i https://yourapp.com/ -H "User-Agent: sqlmap/1.5.7"

Combining with @fastify/rate-limit

npm install @fastify/rate-limit
import rateLimit from '@fastify/rate-limit';

await app.register(rateLimit, {
  max: 100,
  timeWindow: '1 minute',
});

Bot blocking + rate limiting + IP-reputation firewall = three layers of defense, ~5 minutes of setup.

Related

Frequently Asked Questions

Should I use onRequest or preHandler?

onRequest. It runs before payload parsing, so blocked requests don't waste CPU on body parsing. preHandler is the right place for auth-style checks that need parsed bodies.

Does the SecureNow preload work with Fastify?

Yes. Fastify uses Node's HTTP server; the preload sits below it. No Fastify-specific config needed.

What about Fastify v5?

Same hooks, same preload behavior. The plugin API changed slightly but `onRequest` is unchanged.

Can I use this with @fastify/rate-limit?

Yes — they're complementary. Bot blocking removes obvious bad traffic; rate-limit handles per-IP request budgets for everyone else.

Recommended reading

Adding Backend Tracing to a Sentry Stack with OpenTelemetry

If your team uses Sentry for frontend errors and needs backend distributed tracing without doubling the Sentry bill, here's the OpenTelemetry path that doesn't make you choose.

May 9
How to Block Bot Traffic in Express With No Extra Infra

Five approaches to bot blocking in Express, ranked by effort vs. effectiveness. From a 5-line allowlist to a full IP-reputation firewall — all without Cloudflare, AWS WAF, or any new infrastructure.

May 9
How to Block Bot Traffic in NestJS With No Extra Infra

NestJS guards, interceptors, and global middleware all give you bot-blocking hooks. Here's the cleanest pattern for each.

May 9