The answer is probably yes. We have seen everything from 1% – 100% fraudulent traffic. What we’ve never seen, however, is 0%.
On average, 16% of ad spend is wasted on fraudulent activity and low-quality traffic (users who click on your ads with no intent to buy).
Even if you’ve been a victim of ad fraud before, it’s never too late to start saving money.
Signs of bot traffic include:
For more information on how to detect bots using your own analytics data, see our article: How to detect IVT using your own analytics data
We monitor your campaigns 24/7 and block fraudulent non-human and low-quality users from clicking on your ads.
There are two ways this works:
No. We only block fraudulent non-human and low-quality users from clicking on your ads. And we only do so when we’re 100% certain. We never block real paying customers.
No. That’s the main advantage of using Negative Audience lists that we generate for you in real time. Once you set up the system (about 10 minutes), the lists are automatically updated and additionally added to all your major marketing platforms such as Facebook, Google Ads, Instagram, LinkedIn, TikTok, etc.
This eliminates unwanted traffic in real time and fully automatically on all your channels.
We analyze data discrepancies and behavioral anomalies. In addition, we apply a combination of real-time scoring, behavioral analysis, honey pots, browser testing, and other undisclosed techniques.
This allows us to identify fraudulent activity and protect your advertising budget across all major channels such as Google Ads, Facebook, DV360, LinkedIn, Twitter and many more.
fraud0 analyzes the shopping behavior and transactions on your website. This subsequently enables you to block low-quality traffic.
Low-quality traffic are visitors who click on your ads, but have no or very little intention to actually buy your products. This includes accidental clicks, clicks outside the set geography, clicks from market research, or simply your competitors clicking on your ads to drain your advertising budget.
We block fake and low-quality traffic. Fake traffic can be:
|Data Center||Data centers are a popular location for malicious bot networks. As data centers are secured locations that humans generally do not have access to, traffic originating from a data center is most likely a bot. For example, a session originating from an Amazon AWS data center IP address block is unlikely to be a valid human user.|
|Proxy||By routing their traffic via residential proxies, bot developers obfuscate their location and identity. Allegedly, this is relevant traffic from important markets such as the USA, Germany, or the UK. However, it actually originates from countries such as India, Pakistan, or Bangladesh. We keep a blocklist of known proxy connection details and IP addresses and flag traffic from these sources.|
|Tor||Tor, short for The Onion Router, is a protocol designed to anonymize internet traffic. Fraudsters can use Tor to disguise their location and usage information.|
|Scrapers||Malicious bots that scan websites for specific information such as email addresses, phone numbers, inventory details, or pricing data. This is often the case on e-commerce websites, where scraper bots are mostly used by competitors to undercut prices and increase their sales.|
|Behavioral Anomalies||Since bots are programs that perform repeatable actions, the exact repetition of activities can be an indication of non-human traffic. For example, to detect non-human traffic, we measure the intervals between clicks on a website. A human user has variable click intervals and patterns and does not behave with inhuman precision. Another example is measuring the number of clicks within a given session. A deviation from normal human activity may indicate that the user is a bot. When actions are performed by a script, the number of clicks can be very high or very low. Both can indicate suspicious activity.|
|Automation Tools||Fraudsters use tools like Puppeteer or Selenium, which were originally programmed to help developers test their work. However, these tools can also be used to easily create bots that visit websites and click on ads.|
|False Representation||False representation, also known as “user agent spoofing,” occurs when the browser’s user agent string is altered to disguise the user’s identity. When user agent tampering is present, there is a very high probability that the traffic is caused by a fraudulent user. The same is true for the rotation of the user agent identifier. Bots use rotating details (e.g., different browser type or operating system) for new sessions to impersonate a legitimate user. However, it is highly unlikely that the IP address of a real user would have constantly changing user agent details, since real people usually use the same devices and browsers.|
|Cookie Rotation||To avoid detection, bots also rotate cookies and referrer information. It would be suspicious if the same IP address (or other identifiers) is recorded with different cookies, since the normal ratio between a real user and his cookies is one-to-one.|
|Plugin Analysis||We analyze irregularities between installed plugins and browser functions to identify bot traffic.|
|Blacklisted Referrer||We maintain a block list of referrers that are known sources of poor traffic. These include bot farms, click farms, or fake websites based solely on bot traffic.|
|Malicious Publisher||Malicious publishers set up fake websites, fill them with plagiarized content, sign them up to ad networks, and then direct bot traffic to them. We maintain a block list of “malicious” publishers and flag traffic from these sources.|
|Click Farms||Click farms employ numerous low-paid workers to:
Typically, these organizations are located in developing countries such as China, India, Indonesia and Bangladesh.
|Known Bots||We maintain a blocklist of known bot and crawler names.|
When we detect unwanted clicks on one platform, we automatically block them on all other platforms as well. For example, if we detect invalid users on Google Ads, we also block them in your Facebook, Twitter, and LinkedIn campaigns.
This gives you the peace of mind that your advertising budget is protected in the best possible way on all channels.
The use of VPNs is a factor we take into account when analyzing for fraudulent activity. However, we do not block traffic solely for the reason that it came via a VPN connection.
Proxy connections are much more likely to be malicious than VPN connections. We keep a blocklist of known proxy connection details and IP addresses and flag traffic from these sources.
Our analysis shows that over 99.3% of ad clicks from proxy networks are automated bots. That’s why we block traffic via proxy connections by default.
If you do not exceed the limit of your package regularly, nothing will happen. However, if you regularly exceed the limit of your package, we will upgrade you to a higher package – but not without informing you first.
At no time will the fraud0 script stop working and affect your website in any way!
First, you need to implement our provided script into your website. The code allows us to detect fake and low-quality traffic and block it automatically.
We recommend that you integrate the script directly into your website. This way, we can also detect bots that have already left your website (“bounce”) before the tag manager is loaded.
No. You will see traffic data coming into your dashboard, but you’ll need to setup “Negative Audience Lists” and de-target unwanted traffic back in your ad platforms like GoogleAds, Facebook and Linkedin.