RedTrack.io users can opt-in to analyze their click quality. This feature is available to all of our paid subscribers.
How it can be enabled
It can be enabled on a Campaign level and has additional fee of $0,10 per 1k checks:
In order to check your clicks, you need to activate "Fraud check" on the campaign level. As soon as RedTrack.io checks the first click - you can access click quality report by picking up a campaign in the list and clicking the "Fraud Report" button.
How to read the data
In the report you are able to choose up to 3 group slices for better analysis:
The report will contain most of the familiar report slices including sub-id and will place each click into one of the following categories:
- Congratulations! RedTrack.io fraud monitoring system reports no issues
- clickspamming - App installs previously attributed to clicked ads were discovered to be user-generated app installs randomly claimed by ad networks by spamming the fingerprinting algorithms
- cookie stuffing - the process by which a client is provided with cookies from other domains as if the user had visited those other domains. taking ad tags from a publisher’s site and putting them on to another site without the publisher knowledge
- click injection (Android only) - Android uniquely vulnerable to click injection fraud, in which an ad network takes credit for organic app installs.
- user’s device (browser, phone, app, device-emulator or another system) has been modified to call HTML or make ad requests that are not under the control of a user and made without the user's consent.
- hijacked device where a user is present and additional HTML or ad calls are made independently of the content being requested by the user.
- ads and redirections are inserted into the user experience by the program running on the device.
- IPs with excessive FraudScore in the near past.
- IPs that are associated with known Botnets and Adware.
- traffic originating from servers in data-centers or known cloud platform providers, rather than residential or corporate networks, where the ad is not rendered in a user's device (there is no real human user).
- “proxied” connections - Socks proxy, VPN, Tor etc
- traffic routed through an intermediary proxy device or network where the ad is rendered in a user's device where there is a real human user.
- users actively hiding their identity or making conversions from an unwanted location