How Pop Traffic Fuels Affiliate Fraud
We examine how affiliate fraud is perpetrated using cheaply purchased pop-traffic from adult / torrent sites.
We examine how affiliate fraud is perpetrated using cheaply purchased pop-traffic from adult / torrent sites.
We detected a new pop-under scheme being used by Voice Media Group’s network of site. Here’s how it works.
Mapping shared DIRECT account-bidding IDs across uniquely owned websites to reveal business connections.
We analyzed over 16 million unique subdomains to better understand how ads.txt and sellers.json are used in the wild.
We fetch all known sellers.json files each day and compare them with the previous day. This dataset will show you all the seller objects which are removed or modified each day.
IVT trackers struggle to detect traffic generated via popunder. Allowing fraudsters to launder traffic and remove any trace of suspicious referral headers.
How an operation uses over 12,000 unique domains to bounce and launder traffic to 81 destinations.
Gain impression level insights into the advertising supply chain.
Learn about the counterpart to ads.txt. Sellers.json allows buyers to map seller IDs to the corresponding business entity.
Ads.txt is an industry-wide initiative, championed by the Interactive Advertising Bureau (commonly known as the IAB), which aims to reduce the prevalence of domain spoofing.