Rate Limits
Explanation of what rate limits are and how to handle them.

What is a Rate Limit?

Your plan has a certain capacity for the number of requests per second your application can make.
Often times, if you send queries too quickly in succession you will get a rate limit response. For most cases this is totally fine and will not affect your users at all as long as you handle them properly. Some developers see these errors and request for rate limit increases rather than appropriately refactoring their code to handle this case. If you are experience under 30% rate limited requests, using retries is the best solution.

Rate Limit Type

Compute Units Per Second (CUPS)

CUPS are a measure of the number of compute units used per second when making requests. Since each request is weighted differently, we base this on the total compute units used rather than the number of requests.
For example, if you send one eth_blockNumber (10 CUs), two eth_getLogs (75 CUs), and two eth_call (26 CUs) requests in the same second, you will have a total of 310 CUPS.
See the table below for the number of compute units per second (CUPS) permitted for each user type.


When you exceed your capacity, you will receive a rate limit response. This response will be different depending on whether you are connecting to Alchemy using HTTP or WebSockets.
If you would like to test receiving a 429 response, send a POST request to https://httpstat.us/429.


You will receive an HTTP 429 (Too Many Requests) response status code.


You will receive a JSON-RPC error response with error code 429. For example, the response might be:
"jsonrpc": "2.0",
"error": {
"code": 429,
"message": "Your app has exceeded its compute units per second capacity. If you have retries enabled, you can safely ignore this message. If not, check out https://docs.alchemyapi.io/guides/rate-limits"


All you need to do to easily handle rate limits is to retry the request. This is a great idea to ensure great user experiences with any API even if you aren't hitting rate limits. Once you've implemented retries, test out the behavior to make sure they work as expected.

Option 1: Alchemy Web3

If you're using Web3.js, just use the Alchemy wrapper for Web3. We handle all of the retry logic for you!

Option 2: Retry-After

If you are using HTTP and not WebSockets you may receive a Retry-After header in the HTTP response. This indicates how long you should wait before making a follow-up request. We still recommend using exponential backoff since Retry-After only accepts an integer number of seconds.

Option 3: Simple Retries

If exponential backoff poses an challenge to you, a simple retry solution is to wait a random interval between 1000 and 1250 milliseconds after receiving a 429 response, and sending the request again, up to some maximum number of attempts you are willing to wait.

Option 4: Exponential Backoff

Exponential backoff is a standard error-handling strategy for network applications. It is a similar solution to retries, however, instead of waiting random intervals, an exponential backoff algorithm retries requests exponentially, increasing the waiting time between retries up to a maximum backoff time.

Example Algorithm:

  1. 1.
    Make a request.
  2. 2.
    If the request fails, wait 1 + random_number_milliseconds seconds and retry the request.
  3. 3.
    If the request fails, wait 2 + random_number_milliseconds seconds and retry the request.
  4. 4.
    If the request fails, wait 4 + random_number_milliseconds seconds and retry the request.
  5. 5.
    And so on, up to a maximum_backoff time.
  6. 6.
    Continue waiting and retrying up to some maximum number of retries, but do not increase the wait period between retries.
  • The wait time is min(((2^n)+random_number_milliseconds), maximum_backoff), with n incremented by 1 for each iteration (request).
  • random_number_milliseconds is a random number of milliseconds less than or equal to 1000. This helps to avoid cases in which many clients are synchronized by some situation and all retry at once, sending requests in synchronized waves. The value of random_number_milliseconds is recalculated after each retry request.
  • maximum_backoff is typically 32 or 64 seconds. The appropriate value depends on the use case.
The client can continue retrying after it has reached the maximum_backoff time. Retries after this point do not need to continue increasing backoff time. For example, suppose a client uses a maximum_backoff time of 64 seconds. After reaching this value, the client can retry every 64 seconds. At some point, clients should be prevented from retrying indefinitely.

πŸ§ͺ Test Rate Limits + Retries

To test out your implementation of retries, we created a test app on each network with a low rate limit of 50 Compute Units/Second. Feel free to make requests to this test app on any of the networks using the following API keys:
















Final Tips

Use a different key for each part of your project (e.g., frontend, backend, development) to isolate rate limit usage to each use case. This also splits monitoring across different parts of your project, making it easier to debug issues and monitor usage.
Last modified 3d ago