Yext Inc

Neutral Block: Depends Verified robots.txt: No

The Yext Crawler provides Yext customers with a tool to retrieve data from their own websites.

Key facts

Operator
Yext
Family
Yext
Purpose
General Crawl
User-Agent
YextBot
Should you block it?
Depends
Verified
Yes
Respects robots.txt
No
Identity type
Unknown
Confidence
Medium
Last verified
2026-04-01
Last checked
2026-04-01

Bot details

Identity

User-Agent
YextBot
robots.txt token
YextBot
HTTP user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/87.0.4280.88 YextBot/Java Safari/537.36

Ownership

Operator
Yext
Family
Yext
Type
Scraper
Purpose
General Crawl

Verification and trust

Source type
Unknown
Confidence
Medium
Last verified
2026-04-01
Last checked
2026-04-01
Verification
Validate the identifying user-agent or signature against the operator documentation before creating hard allow rules.
Operator URL
https://www.yext.com
Spoofing risk
User-agent strings can be spoofed. For allow-listing or low-friction rules, pair the published identifier with operator documentation or cryptographic verification when available.

Blocking and detection

Robots

User-agent: YextBot
Disallow: /

Cloudflare

(http.user_agent contains "YextBot")
Advanced server rules

Apache

RewriteEngine On
RewriteCond %{HTTP_USER_AGENT} YextBot [NC]
RewriteRule ^ - [F,L]

Nginx

if ($http_user_agent ~* "YextBot") { return 403; }

Notes

Known user-agent patterns: YextBot Known user-agent strings: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/87.0.4280.88 YextBot/Java Safari/537.36 Robots.txt handling in the directory: no.

Operator documentation: https://www.yext.com

Evidence and source

  • Validate the identifying user-agent or signature against the operator documentation before creating hard allow rules.
  • The Yext Crawler provides Yext customers with a tool to retrieve data from their own websites.
  • User-agent strings can be spoofed. For allow-listing or low-friction rules, pair the published identifier with operator documentation or cryptographic verification when available.