- Report this article
Dr. Augustine Fou
Dr. Augustine Fou
FouAnalytics - "see Fou yourself" with better analytics
Published Oct 27, 2022
+ Follow
In the past,
- bots come from data center IP addresses
- humans come from residential IP addresses
but now,
- humans also come from data center IP addresses (when using VPNs)
- bots also appear to come from residential IP addresses (when disguising themselves with residential proxy services)
Declared bots (orange) -- the ones that say their name honestly -- come from obvious data centers like Amazon and Google Cloud.
Search crawlers (yellow) come from obvious data centers. But note in the example below, the HTTP_USER_AGENT can be easily falsified to appear to be "Googlebot." But by cross referencing the name of the ISP, we can see some of those are not the real Googlebot.
IP addresses are not useful for BLOCKING fraud, because
- blocking datacenter IP addresses won't stop bots because more advanced bots disguise their IP addresses using residential proxy services (which make them appear to come from residential IP addresses)
- blocking datacenter IP addresses won't stop the bots because bots dump useless IP addresses and get new ones within seconds of the IP address being blocked
Recommended by LinkedIn
- blocking datacenter IP addresses means you may block real humans using VPNs
- blocking residential IP addresses means you may block real human visitors; residential IP addresses are households which can have dozens of devices (a few computers, laptops, iPads, smart TVs, smartphones, etc.) Not all of the devices are compromised with malware and committing ad fraud.
meets the legal definition of fraud
n. "the intentional use of deceit, a trick or some dishonest means to deprive another of his/her/its money, property or a legal right. A party who has lost something due to fraud is entitled to file a lawsuit for damages against the party acting fraudulently, and the damages may include punitive damages as a punishment or public example due to the malicious nature of the fraud."
TAG and IAB are intentionally selling a block list of 100 million fraud IP addresses to their own members. Those IP addresses have been useless for years, do not block the fraud, and add tremendous computing burden to the RTB (real time bidding) process. I consider that fraud; and clients should sue TAG and IAB and get years of their money back, as a class.
How to use FouAnalytics on-site and in-ad
Using FouAnalytics, advertisers find the sites and apps that cheat using fraudulent means to steal ad dollars and add them to block lists. IP addresses are only one ingredient used in the process of fraud detection. See the screenshots and examples in the following 2 articles about how to use FouAnalytics on your site and in your digital ads.
How Site-Owners Use FouAnalytics to Troubleshoot Bot Traffic
https://www.linkedin.com/pulse/how-site-owners-use-fouanalytics-troubleshoot-bot-dr-augustine
How to use FouAnalytics to Scrutinize Clicks from Programmatic Campaigns
https://www.linkedin.com/pulse/how-use-fouanalytics-scrutinize-clicks-from-programmatic-fou
FouAnalytics Practitioners
FouAnalytics Practitioners
16,806 followers
+ Subscribe
Like
Celebrate
Support
Love
Insightful
Funny
Sander Kouwenhoven
1y
- Report this comment
Confirmed. Blacklists based on IP addresses are a complete waste. A few weeks ago I did a blind test with a company trying to sell me their IP-address-reputation solution as an additional layer to fraud detection. They asked for 1000 IP addresses we had flagged as fraud in order to see how much they had flagged. Instead, I sent them a list with: 523 fraudulent IP addresses and 477 genuine IP addresses in order to see how well they scored. The result: Only 43.6% was labelled correctly; False Positives were 34.2% and False Negatives were 22.2%. Tossing a coin would have been better!
11Reactions 12Reactions
Simon Gardner
Senior Software Engineer at Lunar Energy
1y
- Report this comment
also mobile ISPs generally share a pool of IPv4 addresses between their subscribers using Network Address Translation (NAT). At any given time an IP address belonging to a mobile ISP may be in use simultaneously by 1000's of mobile devices. So if you block a malicious device based on IP address you're potentially blocking 1000's of other harmless devices that happen to be using the same shared IP. It won't take long before you've blocked entire swathes of your potential audience based on a few rogue devices.Fixed line ISPs also dynamically share IP addresses, albeit each subscriber gets a whole temporary IP address to themselves but the principle is still the same.
2Reactions 3Reactions
Domenico T.
Senior Data Science-Marketing Professional
1y
- Report this comment
Good point about exclusion list false positives.So then…IP adresses are not spoofed like RTB bid parameters but are clearly easy to game.
1Reaction 2Reactions
See more comments
To view or add a comment, sign in
More articles by this author
No more previous content
- Where did your ad load on-screen? "see Fou yourself" with FouAnalytics Sep 12, 2024
- PUBLISHERS leaving 90% on the table selling through programmatic channels Sep 7, 2024
- Let this be a lesson, digital marketers. Time to "see Fou yourselves" Sep 6, 2024
- What CPM prices do you pay for display, OLV, CTV? Aug 29, 2024
- Fire this executive and his agency now. Why? "see Fou yourself" Aug 28, 2024
- Your ad was not viewable if the browser was behind another app Aug 27, 2024
- The best way to overcome FOFO is to "see Fou yourself" Aug 26, 2024
- Organic, direct, paid traffic, measured by on-site FouAnalytics tags Aug 26, 2024
- Yes, bots click on ads and sites too - FouAnalytics data Aug 25, 2024
- Show your boss how awesome your campaigns are with FouAnalytics Aug 24, 2024
No more next content
Sign in
Stay updated on your professional world
Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Insights from the community
- Gaming Industry How can you avoid online scams in the gaming industry?
- Gaming Industry How can you secure in-game transactions and virtual currency?
- Technical Support How can you explain the importance of two-factor authentication to users?
- Technical Support What are the most effective ways to help users stay safe on social media?
- E-commerce How can you protect your customers' privacy in mobile commerce?
- E-commerce What are the best practices for securing your website's two-factor authentication?
- Mobile Technology How can you protect yourself from mobile commerce fraud and cyberattacks?
- Financial Services What is the best way to secure mobile wallet systems for businesses?
- E-commerce How can you secure mobile commerce transactions on public Wi-Fi?
Others also viewed
- PayPal accounts breached, Yum! Brands attacked, ODIN Intelligence hacked CISO Series 1y
- Answers to All Your Questions from June 11th WorkReduce Live Dr. Augustine Fou 4y
- How to Delete Yourself from the Internet: The Ultimate Guide for 2023 MD ROBIUL HOSSEIN 1y
- Can AI Fight Ad Fraud? Dr. Augustine Fou 1y
- HELPING GIANTS TO FIGHT ONLINE FRAUD Laura Urquizu 1y
- The Biometric Scan: May 2024 Aware, Inc. 3mo
- Data Privacy in the Age of social media: Protecting Your Digital Footprint CyberSec Consulting 1y
- Verified ID: Securing Your Digital Experiences Ronni K. Gothard Christiansen 8mo
- A Simple Way to See the Failure of IVT Detection Tech That You Paid For Dr. Augustine Fou 2y
- The future of Device ID in the digital world JuicyScore 2y
Explore topics
- Sales
- Marketing
- IT Services
- Business Administration
- HR Management
- Engineering
- Soft Skills
- See All