We'll be with you in a second ;)

20+ ad network including FB, Google Ads, TT, Taboola etc.

Docly Child

Fraud check

Estimated reading: 3 minutes 0 views

What is a fraud check?

It’s a separate feature developed together with our partner Fraudscore. When enabled, clicks are checked by Fraudscore and a special fraud report is generated.

You have 2 separate options available: check fraud clicks separately on a campaign level for $0,10 per 1k checks or pay monthly for an all-inclusive solution (it will check all your clicks). Check out our pricing for more information. 

Enable and check

It can be enabled on a Campaign level and has an additional $0,10 per 1k checks fee. To check your clicks, you need to activate “Fraud check” on the campaign level.

As soon as RedTrack.io and Fraudscore check the first click – you can access click quality report by picking up a campaign in the list and clicking the “Fraud Report” button. In the report, you can choose up to 5 group slices for better analysis:

Checked clicks are also available directly in your campaigns (clicks will be checked and grouped for “all-inclusive” fraud check and even for separate campaigns if you prefer this option):

The report will contain most of the familiar report slices, including sub-id, and will place each click into one of the following categories:

Category Details
  • Congratulations! RedTrack.io fraud monitoring system reports no issues
  • clickspamming – App installs previously attributed to clicked ads were discovered to be user-generated app installs randomly claimed by ad networks by spamming the fingerprinting algorithms
  • cookie stuffing – the process by which a client is provided with cookies from other domains as if they had visited those different domains. taking ad tags from a publisher’s site and putting them on to another site without the publisher knowledge
  • click injection (Android only) – Android uniquely vulnerable to click injection fraud, in which an ad network takes credit for organic app installs.
  • user’s device (browser, phone, app, device-emulator, or another system) has been modified to call HTML or make ad requests that are not under the control of a user and made without the user’s consent.
  • hijacked device where a user is present and additional HTML or ad calls are made independently of the content being requested by the user.
  • ads and redirections are inserted into the user experience by the program running on the device.
  • webcrawlers
  • IPs with excessive FraudScore in the near past.
  • IPs that are associated with known Botnets and Adware.
  • traffic originating from servers in data-centers or known cloud platform providers, rather than residential or corporate networks, where the ad is not rendered in a user’s device (there is no real human user).

Filter and block

Once the clicks are checked and analyzed, you can either filter or block the visitors you don’t want to see in your reports


The filtering is done the same way as standard filtering.
Go to the campaign setting -> Funnel -> Filters

Filtered traffic will go to the next funnel (without filters or with filters that do not exclude this type of traffic) or to the fallback URL you can set in Tools -> default fallback URL.


If, after the analysis, you have realized you want to exclude this traffic from your campaigns, you can block it entirely with the help of RedTrack tools.
Blocked traffic is not counted towards your event limit.

Leave a Comment

Share this Doc
Chat Icon Close Icon