What is suspicious behavior?
Suspicious behavior is any unusual activity from a click that may indicate it is non-human or fake. Our algorithm looks beyond traditional methods of identifying suspicious behavior, such as simply monitoring IP addresses. Instead, we take a more holistic approach, analyzing over 800 different factors to determine whether a click exhibits normal or abnormal behavior.
What We Monitor
Our system reviews a variety of data points, such as device fingerprints, host names, and the type of device being used. This allows us to detect discrepancies that may suggest suspicious activity. For example:
- Device Misrepresentation: If a click is coming from a mobile device but the device claims to be a desktop, this inconsistency raises a red flag.
- Use of VPNs and Proxies: When a click originates from behind a VPN or proxy, particularly on a mobile device, it may signal non-human activity, as it’s not common for mobile users to configure such setups unless there are legitimate reasons (like using Apple’s private relay, which is rare).
- Geographical Mismatch: If a campaign is set to target a specific region, but the click originates from an entirely different location—say, a campaign targeting users in the U.S., but clicks are detected from an old device in India—this could be another indicator of suspicious behavior.