What we monitor
Short or long periods of time in which a click converts to an install.
IP & Device Fingerprinting
Allows us to track click usages over time identifying the ones driving large volumes.
Geography, platforms & OS versions.
When our system flags forbidden keywords the link instantly renders inactive and our team is immediately notified.
High ratios of clicks-to-installs, installs-to-opens and installs-to-events by a traffic source.
When a traffic source generates fake clicks programmatically when an ad is rendered.
Cloud Providers & Server Farms
Cloud computing providers and server farms allow users to drive fake clicks and installs.
When exactly a source completes certain levels of information in an app.
When a traffic source places multiple ads on top of each other but only the top ad is visible.
Proxies & VPNs
When a user bypasses filtering and targeting systems.
We monitor the HTTP addresses of all our clicks identifying any forbidden keywords.