Rate Limits & Best Practices
Understanding and respecting API rate limits ensures reliable, high-performance integrations that scale with your prop firm’s growth.
Rate Limit Overview
Tradovate implements multiple layers of rate limiting to ensure fair usage and maintain system stability for all partners.
Rate Limit Types
Standard Rate Limits
REST API Endpoints:
Rate Limit Response Format
When limits are exceeded, you receive:
HTTP Response:
WebSocket Response:
Handling Penalty Tickets (P-Tickets)
When you exceed rate limits on certain endpoints, the system may return a penalty ticket instead of a simple 429 response. This requires you to wait for a specified time before retrying.
Penalty Ticket Response Format
When a penalty ticket is issued, you receive:
Response Fields:
p-ticket: Encrypted penalty token tied to your IP addressp-time: Penalty duration in secondsp-captcha: Whether reCAPTCHA verification is required (optional field)
Handling Penalty Tickets
reCAPTCHA Rate Limiting (423 Response)
For severe rate limit violations, especially repeated failed authentication attempts, the system may require reCAPTCHA verification and impose extended lockout periods.
reCAPTCHA Response Format
When reCAPTCHA is required, you receive:
Authentication Failure Lockout
Critical: When you receive a 423 response after failed authentication attempts:
- Stop all API calls immediately for 1 hour
- Do not retry authentication during the lockout period
- After 1 hour, retry with valid credentials
Best Practices for reCAPTCHA Lockouts
Critical Guidelines:
- Immediate Cessation: Stop all API calls when receiving 423 responses
- Wait Full Duration: Respect the 1-hour lockout period completely
- Monitor Failed Attempts: Track authentication failures to prevent lockouts
- Valid Credentials Only: Only retry with confirmed correct credentials
- User Notification: Inform users about lockout periods and duration
Critical Warnings
reCAPTCHA Lockout: When you receive a 423 response, you MUST wait the full 1-hour period. Continued API calls during lockout may extend the penalty period.
Penalty Tickets: Always include penalty ticket parameters (p-ticket, p-captcha) in subsequent requests until the penalty period expires.
Authentication Failures: Multiple failed login attempts will trigger increasingly severe rate limits, potentially leading to extended lockouts.
Best Practices Summary
Do’s ✅
- Implement exponential backoff for retries
- Cache responses appropriately
- Use batch endpoints when available
- Prioritize critical requests (orders, risk management)
- Set up monitoring and alerting for rate limit usage
- Use connection pooling for HTTP clients
- Respect Retry-After headers
Don’ts ❌
- Don’t ignore 429 responses - always implement retry logic
- Don’t make unnecessary API calls - cache when possible
- Don’t exceed rate limits consistently - this may result in temporary blocks
- Don’t implement infinite retry loops - set maximum retry attempts
- Don’t skip authentication rate limits - these are stricter
- Don’t make blocking calls in high-frequency operations
Requesting Higher Limits
For high-volume integrations, you can request increased rate limits:
Eligibility Criteria
- Established partnership with proven integration
- Proper rate limit handling implemented
- Business justification for higher limits
- Technical review of integration architecture

