Skip to main content

Documentation Index

Fetch the complete documentation index at: https://www.octoparse.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

LinkedIn is one of the most sensitive scraping targets because it combines professional identity, company data, jobs, and platform rules. Technically, public LinkedIn pages can contain valuable structured signals. Operationally, LinkedIn is aggressive about login walls, rate limits, account restrictions, and automated access. Treat LinkedIn scraping as a high-governance workflow. Collect only public data you are allowed to use, avoid private account data, and consider official or licensed alternatives when the data will be used in production.

Page types

Page typeTypical fieldsCommon use
Public profilesName, headline, location, current role, company, education, public URLB2B research, recruiting context
Company pagesCompany name, industry, size, location, website, descriptionAccount research, market mapping
JobsTitle, company, location, description, seniority, employment type, date postedHiring signals, labor market research
PostsText, author, date, reactions, comments, company/profile URLTrend and thought-leadership analysis
Bright Data’s LinkedIn Scraper API is organized around profiles, companies, jobs, and posts. Apify’s LinkedIn actor ecosystem is similarly split by profiles, company data, and jobs. That is the right mental model: build different workflows for different LinkedIn page types.

Public vs logged-in access

LinkedIn pages may look accessible in a browser but behave differently for automation.
  • Public profile pages may expose limited information without login.
  • Job pages often expose useful fields publicly.
  • Company pages vary by region and layout.
  • Search and people discovery are much more constrained and often push users toward login.
  • Logged-in scraping can put accounts at risk and may violate platform rules.
Avoid designing a workflow that depends on a personal account staying logged in and scrolling indefinitely. If the use case requires authenticated access, review the terms, account risk, and whether an official product or data provider is more appropriate.

Job scraping workflow

LinkedIn jobs are often the most practical LinkedIn target because job postings are intended for public discovery. Collect:
  • Job title
  • Company name
  • Company URL
  • Location
  • Job URL
  • Date posted
  • Employment type
  • Seniority level
  • Function or industry
  • Description
  • Applicant count when visible
Use jobs as signals, not just records. A company hiring many sales roles may indicate go-to-market expansion. A company hiring security engineers may indicate security investment. A company hiring for a tool-specific role can imply technology adoption.

Profile and company workflows

For public profiles, collect only fields visible without special permission and minimize personal data. For company pages, focus on organization-level information:
  • Company name
  • Website
  • Industry
  • Headquarters
  • Company size range
  • Description
  • Public page URL
  • Recent public posts when relevant
If you are building lead generation workflows, avoid treating scraped profile data as a license to send unsolicited messages. Connect collection to a compliant outreach process with suppression, opt-out, and data retention rules.

Technical challenges

LinkedIn scraping is constrained by:
  • Login prompts
  • Rate limits
  • Dynamic rendering
  • Search result limits
  • Session and fingerprint checks
  • Layout variation by page type
  • Legal and account-policy risk
Prebuilt tools can handle pagination, retries, and field mapping, but they do not remove the need to define a responsible use case. Managed APIs such as Bright Data’s or actors on Apify may be easier than maintaining a brittle custom browser workflow. The hiQ v. LinkedIn litigation shaped industry discussion around scraping public LinkedIn data, especially under the Computer Fraud and Abuse Act in the United States. But it did not make every LinkedIn scraping use case automatically safe. Contract claims, privacy law, platform terms, data protection obligations, and account access rules can still matter. This page is not legal advice. For production workflows, especially involving personal data, get legal review.

Practical rule

Use LinkedIn scraping only when the page type, access level, and downstream use are defensible. Jobs and company-level public information are usually easier to justify than profile-heavy personal datasets. Keep the field list narrow, preserve source URLs and timestamps, and prefer official or licensed routes where they meet the business need.