Affiliate Fraud Prevention

Fraudlogix’s Affiliate Fraud Suite enables you to stop affiliate fraud before it happens and monitor affiliate quality in real-time. Our solutions help you avoid time-consuming claw backs, angry advertisers, annoyed affiliates, and uncomfortable conversations around discrepancies.

Solution #1

IP Block List

  • Block fake traffic.
  • Zero latency.
  • Benefit from global intelligence.
How it Works

The Fraudlogix javascript code is embedded on 300+ million URLs and apps, monitoring 640 million unique users and 1.2 billion devices monthly.

IPs generating high volumes of fake traffic & installs are identified and added to a list that updates hourly.

The list is integrated directly into your platform, allowing you to block clicks, installs, leads, and sales from known fraudulent sources (e.g., bots, automated scrips, and malware).

IP Block List FAQ

What makes the Fraudlogix IP Block list unique?

The Fraudlogix IP Block List is the only one derived from a large amount of live data collected from a multitude of networks and exchanges within the affiliate and programmatic space. The live input causes the data to change hourly, making it the most frequently updated and community-based feed on the market.

Where do you get the IP addresses from?

We combine fraud intelligence from all of our clients across the affiliate and programmatic ecosystem. Our pixel encounters 640 million unique users, 300+ million unique URLs and apps, and 1.2 billion unique devices monthly.

How large is the IP Block List?

The IP Block List is roughly 2.5 million unique IP addresses at any given time.

How does an IP make it to the list?

By consistently generating a large percentage of fake traffic.

How do IPs get removed from the list?

When the amount of real traffic begins to outweigh the amount of fake traffic seen from an IP it will be removed.

What do you consider fake/fraudulent traffic?

Traffic that may have been created manually by bad actors or created by bots, automated scripts, or other non-human means.

How often does the IP Block List update?

Hourly. IPs are constantly being added or removed based on current input from the affiliate and programmatic ecosystem.

What is the latency?

None. The full file is hosted in your environment.

Solution #2

Pixel or S2S Integrations

  • Full dashboard reporting.
  • Affiliate, sub-affiliate & transaction-level reporting.
  • Detailed reports on why transactions are being flagged.
How it Works

Place the Fraudlogix pixel on your landing page, connect with us via your tracking platform’s API, or post data to us server-to-server.

Fraudlogix monitors traffic in real time and identifies fraudulent conversions.

View detailed reports in the Fraudlogix dashboard to identify fraudulent traffic partners and their transactions. See reporting on why transactions were flagged.

Affiliate Pixel & S2S FAQ

How do I integrate the affiliate pixel solution?

Place the Fraudlogix pixel on your landing page or conversion button. Each action (a lead or a click, for example) is evaluated and given a quality score in real-time. Based on this analysis, you decide what happens next: leads, for example, can be sent to different landing pages depending on results.

How do I integrate the server-to-server solution?

We can connect directly to your tracking platform’s API. Reporting results are then available in your Fraudlogix dashboard.

How do I see the reports?

You can receive a real-time response or log into a full-reporting dashboard.

What reports will I get?

You will be able to customize your reports from the Fraudlogix dashboard. There’s three main areas of reporting:

  • Fraud Risk Scores: See the risk level of every transaction.
  • Analysis Reports: Evaluate the performance of referring URLs and sources.
  • Affiliate Management Reports: Analyze the volume and quality of transactions from partners and sub-partners.

What do you consider affiliate fraud?

When an affiliate is trying to cheat the advertiser by self-creating leads, installs, clicks, sales, etc. This traffic may be manually entered by bad actors or created by bots, automated scripts, or other non-human means.