Stuck creating a new request
Running Cloudscraper in a UV venv.
I've tried running multiple providede examples, for instance:
interpreters = ['js2py', 'nodejs', 'native']
for interpreter in interpreters:
try:
scraper = cloudscraper.create_scraper(
interpreter=interpreter,
delay=5, # Longer delay for complex challenges
enable_stealth=True, # Additional stealth for v3 detection
debug=True
)
response = scraper.get("https://hd24bit.com/rss.xml")
print(f"✅ {interpreter}: Success ({response.status_code})")
except Exception as e:
print(f"❌ {interpreter}: Failed - {str(e)}")
After a 403 it gets stuck creating a new request:
🛡️ Received 403 error, attempting session refresh (attempt 1/3)
Refreshing session due to staleness or 403 errors...
Cleared Cloudflare cookies for session refresh
⏱️ Request throttling: sleeping 0.90s
🚦 Concurrent request limit reached (1/1), waiting...
🚦 Concurrent request limit reached (1/1), waiting...
and on and on and on...
System Information
{
"platform": {
"system": "Linux",
"release": "6.12.28-1-MANJARO"
},
"interpreter": {
"name": "CPython",
"version": "3.12.8"
},
"cloudscraper": "3.0.0",
"requests": "2.32.4",
"urllib3": "2.4.0",
"OpenSSL": {
"version": "OpenSSL 3.0.15 3 Sep 2024",
"ciphers": [
"ADH-AES128-GCM-SHA256",
"ADH-AES128-SHA",
"ADH-AES128-SHA256",
"ADH-AES256-GCM-SHA384",
"ADH-AES256-SHA",
"ADH-AES256-SHA256",
"ADH-CAMELLIA128-SHA",
"ADH-CAMELLIA128-SHA256",
"ADH-CAMELLIA256-SHA",
"ADH-CAMELLIA256-SHA256",
"AECDH-AES128-SHA",
"AECDH-AES256-SHA",
"AES128-CCM",
"AES128-CCM8",
"AES128-GCM-SHA256",
"AES128-SHA",
"AES128-SHA256",
"AES256-CCM",
"AES256-CCM8",
"AES256-GCM-SHA384",
"AES256-SHA",
"AES256-SHA256",
"ARIA128-GCM-SHA256",
"ARIA256-GCM-SHA384",
"CAMELLIA128-SHA",
"CAMELLIA128-SHA256",
"CAMELLIA256-SHA",
"CAMELLIA256-SHA256",
"DHE-DSS-AES128-GCM-SHA256",
"DHE-DSS-AES128-SHA",
"DHE-DSS-AES128-SHA256",
"DHE-DSS-AES256-GCM-SHA384",
"DHE-DSS-AES256-SHA",
"DHE-DSS-AES256-SHA256",
"DHE-DSS-ARIA128-GCM-SHA256",
"DHE-DSS-ARIA256-GCM-SHA384",
"DHE-DSS-CAMELLIA128-SHA",
"DHE-DSS-CAMELLIA128-SHA256",
"DHE-DSS-CAMELLIA256-SHA",
"DHE-DSS-CAMELLIA256-SHA256",
"DHE-PSK-AES128-CBC-SHA",
"DHE-PSK-AES128-CBC-SHA256",
"DHE-PSK-AES128-CCM",
"DHE-PSK-AES128-CCM8",
"DHE-PSK-AES128-GCM-SHA256",
"DHE-PSK-AES256-CBC-SHA",
"DHE-PSK-AES256-CBC-SHA384",
"DHE-PSK-AES256-CCM",
"DHE-PSK-AES256-CCM8",
"DHE-PSK-AES256-GCM-SHA384",
"DHE-PSK-ARIA128-GCM-SHA256",
"DHE-PSK-ARIA256-GCM-SHA384",
"DHE-PSK-CAMELLIA128-SHA256",
"DHE-PSK-CAMELLIA256-SHA384",
"DHE-PSK-CHACHA20-POLY1305",
"DHE-RSA-AES128-CCM",
"DHE-RSA-AES128-CCM8",
"DHE-RSA-AES128-GCM-SHA256",
"DHE-RSA-AES128-SHA",
"DHE-RSA-AES128-SHA256",
"DHE-RSA-AES256-CCM",
"DHE-RSA-AES256-CCM8",
"DHE-RSA-AES256-GCM-SHA384",
"DHE-RSA-AES256-SHA",
"DHE-RSA-AES256-SHA256",
"DHE-RSA-ARIA128-GCM-SHA256",
"DHE-RSA-ARIA256-GCM-SHA384",
"DHE-RSA-CAMELLIA128-SHA",
"DHE-RSA-CAMELLIA128-SHA256",
"DHE-RSA-CAMELLIA256-SHA",
"DHE-RSA-CAMELLIA256-SHA256",
"DHE-RSA-CHACHA20-POLY1305",
"ECDHE-ARIA128-GCM-SHA256",
"ECDHE-ARIA256-GCM-SHA384",
"ECDHE-ECDSA-AES128-CCM",
"ECDHE-ECDSA-AES128-CCM8",
"ECDHE-ECDSA-AES128-GCM-SHA256",
"ECDHE-ECDSA-AES128-SHA",
"ECDHE-ECDSA-AES128-SHA256",
"ECDHE-ECDSA-AES256-CCM",
"ECDHE-ECDSA-AES256-CCM8",
"ECDHE-ECDSA-AES256-GCM-SHA384",
"ECDHE-ECDSA-AES256-SHA",
"ECDHE-ECDSA-AES256-SHA384",
"ECDHE-ECDSA-ARIA128-GCM-SHA256",
"ECDHE-ECDSA-ARIA256-GCM-SHA384",
"ECDHE-ECDSA-CAMELLIA128-SHA256",
"ECDHE-ECDSA-CAMELLIA256-SHA384",
"ECDHE-ECDSA-CHACHA20-POLY1305",
"ECDHE-PSK-AES128-CBC-SHA",
"ECDHE-PSK-AES128-CBC-SHA256",
"ECDHE-PSK-AES256-CBC-SHA",
"ECDHE-PSK-AES256-CBC-SHA384",
"ECDHE-PSK-CAMELLIA128-SHA256",
"ECDHE-PSK-CAMELLIA256-SHA384",
"ECDHE-PSK-CHACHA20-POLY1305",
"ECDHE-RSA-AES128-GCM-SHA256",
"ECDHE-RSA-AES128-SHA",
"ECDHE-RSA-AES128-SHA256",
"ECDHE-RSA-AES256-GCM-SHA384",
"ECDHE-RSA-AES256-SHA",
"ECDHE-RSA-AES256-SHA384",
"ECDHE-RSA-CAMELLIA128-SHA256",
"ECDHE-RSA-CAMELLIA256-SHA384",
"ECDHE-RSA-CHACHA20-POLY1305",
"PSK-AES128-CBC-SHA",
"PSK-AES128-CBC-SHA256",
"PSK-AES128-CCM",
"PSK-AES128-CCM8",
"PSK-AES128-GCM-SHA256",
"PSK-AES256-CBC-SHA",
"PSK-AES256-CBC-SHA384",
"PSK-AES256-CCM",
"PSK-AES256-CCM8",
"PSK-AES256-GCM-SHA384",
"PSK-ARIA128-GCM-SHA256",
"PSK-ARIA256-GCM-SHA384",
"PSK-CAMELLIA128-SHA256",
"PSK-CAMELLIA256-SHA384",
"PSK-CHACHA20-POLY1305",
"RSA-PSK-AES128-CBC-SHA",
"RSA-PSK-AES128-CBC-SHA256",
"RSA-PSK-AES128-GCM-SHA256",
"RSA-PSK-AES256-CBC-SHA",
"RSA-PSK-AES256-CBC-SHA384",
"RSA-PSK-AES256-GCM-SHA384",
"RSA-PSK-ARIA128-GCM-SHA256",
"RSA-PSK-ARIA256-GCM-SHA384",
"RSA-PSK-CAMELLIA128-SHA256",
"RSA-PSK-CAMELLIA256-SHA384",
"RSA-PSK-CHACHA20-POLY1305",
"SRP-AES-128-CBC-SHA",
"SRP-AES-256-CBC-SHA",
"SRP-DSS-AES-128-CBC-SHA",
"SRP-DSS-AES-256-CBC-SHA",
"SRP-RSA-AES-128-CBC-SHA",
"SRP-RSA-AES-256-CBC-SHA",
"TLS_AES_128_GCM_SHA256",
"TLS_AES_256_GCM_SHA384",
"TLS_CHACHA20_POLY1305_SHA256"
]
}
}
Debug Log
- Add
debug=Truetocreate_scraper()
<paste_here>
This command is only available on cloudscraper v1.2.33 and greater. Otherwise, please provide some basic information about your system (Python version, operating system).
Same problem there, tryed all examples from repo
Same problem there
+1 for same issue
Same problem here with version 3 of cloudscrape , python 3.8 in linux mint 20.3
@dreadedhamish: could you please tell me how you generated your system info report in json format ?
same(
As a temporary solution, you can add the parameter auto_refresh_on_403=False I mean scraper = cloudscraper.create_scraper(auto_refresh_on_403=False)
@wb-08 This "temporary solution" doesn't solve anything at all in my hands, unfortunately.
abandoned on the same say as the new release.