The answers is probably yes. We have seen 1% fradulent traffic and 100% fraudulent traffic. But we have never seen 0% fraud. On average we see that 16% of ad spend is lost due to fraudulent activities and low-quality traffic. Even if you have been a victim of ad fraud in the past, it’s never too late to start saving money.
Some indications for bot traffic:
We monitor your campaigns 24/7 and block fraudulent non-human and low-quality users from clicking on your ads. There are two ways this works. First, we generate invalid audience lists using your tag manager. You can use these lists to de-target fake and low-quality traffic across all your major buying channels. Second, you can use our analytics suite to understand where fraudulent and low-quality traffic is coming from and react accordingly e.g. by shifting budgets to campaigns that drive more human traffic.
No. And that’s the beauty about the negative audience lists we generate in real-time. Once you set the system up (10 minutes), negative audience lists are automatically updated and fed into all your favourite marketing platforms like Facebook, GoogleAds, Instagram, Linkedin, TickTock etc. so unwanted traffic is de-targeted, in real-time and fully automatic.
We analyse data discrepancies and behavioural anomalies and apply a combination of real time scoring, behavioural analytics, device fingerprinting, honeypots, browser challenges and further undisclosed techniques to identify fraudulent activity and protect your ad budget accross all major channels like GoogleAds, Facebook, DV360, Linkedin, Twitter and many more.
fraud0 analyses the shopping behaviour and transactions on your site allowing you to exclude low-quality traffic. That is traffic that clicks on your ads but has none to very little intention of actually purchasing your products. Like accidentals clicks, out of geo clicks, researchers scanning the market or simply your competitors who can easily click on your ads multiple times a day to drain your ad budget.
We block fake and low-quality traffic. Fake traffic can be:
|Data Center||Data centers are a favored location for malicious bot networks. As data centers are secured locations where humans are typically not allowed access, traffic originating from a data center is likely to be a bot. For example, a session coming from an Amazon AWS data center address block is unlikely to be a valid human user.|
|Proxy||Proxies are often used to obfuscate a user’s location or identity allowing bot makers to “bounce their traffic” through residential IP addresses and disguise it. Though it may be purporting to be relevant traffic coming from key markets such as the US, Germany or UK, this traffic is actually from countries like India, Pakistan or Bangladesh. We maintain an internal blacklist of known proxy connection details & IP addresses.|
|Tor||Tor, short for The Onion Router, is a protocol developed to anonymise web traffic. Fraudsters can use Tor to conceal their location and usage information.|
|Scrapers||Malicious bots scan websites looking for specific information like email addresses, phone numbers, inventory details or pricing data. This occurs frequently on ecommerce websites where malicious bots search for pricing information, which then enables the competition to sell items for slightly less and thereby gain more customers.|
|Behavioral Anomalies||Because bots are computer programs that perform repeatable actions, precise repetition of activity can be an indication of non-human traffic. To detect non-human traffic, we measure for example the speed between clicks on a website. A human user will have variations in click timing and patterns and not act with inhuman precision. Another example is measuring the quantity of clicks within a session. A variance from normal human activity can indicate that the user is a bot. If actions are performed by a script, the number of clicks can be extremely low or extremely high. Either of these can indicate suspicious activity.|
|Automation Tools||Fraudsters often deploy tools like Puppeteer or Selenium. These tools were originally created to help programmers test their work, but they make it simple to write bots that visit pages and click on ads.|
|False Representation||False Representation, also known as “user agent spoofing”, occurs when the browser’s user agent string is modified with the intention of being misleading about who the user really is. If the user agent string is faked, the likelihood of traffic driven by a fraudulent user is very high. The technical lift and lack of benefits for a legitimate user makes it unlikely that a real user will modify the user agent string. This also includes user agent rotation. As new sessions are initiated, bots will use rotating details (such as browser type or operating system) in an attempt to pass themselves off legitimate human traffic. However, it’s highly unlikely that a real user’s IP address will have continually-changing user agent details, since real people tend to use the same devices regularly.|
|Cookie Rotation||In order to avoid detection, fake traffic will rotate referrer cookies to appear human. If the same IP address, or other identifiers, is recorded with multiple cookies, a high level of suspicion is assigned because the normal relationship between user and cookie would be one to one.|
|Plugin Analysis||We analyse irregularities between installed plugins and browser functionalities to identify bot traffic.|
|Blacklisted Referrer||We maintain a blacklist of traffic referrers that are known sources of bad traffic, like bot farms, click farms or long-tail sites running solely on bot traffic. Traffic from known bad reference sources can indicate invalid activity.|
|Publisher Collusion||Bad publishers buy bot traffic and spread the traffic across an array of websites. The same IP address showing up on several sites that are owned by the same publisher at a frequency beyond normal human activity can indicate invalid activity.|
|Click Farms||Click farms consist of a large group of low-paid workers hired to click on advertisements, like, share, comment, subscribe or follow social media accounts and are usually located in developing countries such as China, India, Indonesia and Bangladesh.|
|Known Malicious Bots & Crawlers||We maintain a database of known malicious bot and crawler traffic sources.|
If we detect unwanted clicks on one platform, we’ll automatically block it on all other platforms too. For example, if we detect invalid users on GoogleAds, we’ll exclude them from your GoogleAds, Facebook, Twitter and Reddit Ads account too. This gives you added peace of mind that bad traffic cannot retarget you on any other platform.
Proxy connections have a much higher chance of being malicious than VPN connections. We maintain an internal blacklist of known proxy connection details & IP addresses. Our analysis shows that over 99.3 % of ad clicks from proxy networks are non-legitimate users. For this reason, we will block the users of proxies by default.
The difference is how often you pay your subscription fee. With monthly billing, you will be charged on the same day each month. With annual billing, you are charged once for the whole year.
If you do not exceed your plan on a regular basis nothing will happen. If you exceed your plans limit on a regular basis we will upgrade you to a higher plan – but we will notify you first of course.