Frequently Asked Questions

We are an adtech company specializing in digital advertising security and fraud protection. Adspect is also a trademark of our flagship product–the Adspect cloaker and traffic filter–developed to protect affiliate marketing campaigns from various types of unwanted traffic.
Cloaking is the security practice of restricting access to a website (landing page, affiliate offer, e-commerce, etc.) at the sole discretion of the website owner. Adspect acts as a web application firewall (WAF), protecting your content from unwanted and malicious visitors.
Adspect protects you from unwanted traffic, that is, any type of visitor that is irrelevant to an advertising campaign’s goals, ranging from nuisance that distorts your analytics to outright malicious specimens that may put your affiliate success at risk. Examples include click fraud, ad network moderators, spy services, web scrapers, and robots of antivirus companies.
  1. We have much larger and more comprehensive private IP address blocklists: 1.6+ billion IPv4 addresses in regular mode, 2.3+ billion IPv4 addresses in paranoid mode, 18000+ IPv6 address ranges.
  2. Our immense IP address blocklists already include blocklists of nine of our major competitors, which makes us as robust as all of them combined at the very least, even without our fingerprinting and machine learning checks.
  3. We use JavaScript fingerprinting to detect numerous kinds of bots, security scanners, and ad reviewers, no matter how much they try to look like legitimate visitors. This includes GeoEdge, Google Safe Browsing, The Media Trust, Confiant, Ad Lightning, AppNexus, Integral Ad Science, and similar highly disguised threats.
  4. We use TCP/IP and SSL/TLS fingerprinting technology to detect bots with advanced emulation, manual reviewers, residential and mobile proxy services, including Bright Data (Luminati) and GeoSurf.
  5. We use our state of the art VLA™ machine learning technology to do complex fingerprint analysis and detect the most elusive of threats if they manage to fool heuristic checks.
  6. We have a built-in tracker with exceptionally flexible reporting for analyzing funnels that covers all the most popular use cases and thereby lets you run ads without a separate tracker.
  7. We have several built-in safe page generators that generate keyword-based pages ranging from news feeds to Google Play landers to complete WordPress websites.

We work with all traffic sources, both existing and to come. The list of supported ad networks includes: Facebook, Google Ads, TikTok, Bing Ads, Snapchat, Yandex, myTarget, VK, ZeroPark, ExoClick, Taboola, Outbrain, TrafficStars, TrafficJunky, MGID, and hundreds of others.

We detect threats in all traffic types regardless of its technical intrinsics: social, mobile, native, push notifications, teasers, popunder, you name it.
Yes, we protect your content from various security and ad scoring companies: GeoEdge, The Media Trust, Confiant, Ad Lightning, AppNexus, Integral Ad Science, Google Safe Browsing, Kaspersky Labs, Avast, Forcepoint, and others.
Adspect employs several advanced techniques to filter traffic, both well-known and proprietary: blacklisting of IP addresses and HTTP intrinsics, JavaScript fingerprinting with heuristic analysis, big data grade statistical analysis by the HyperLogLog system, and deep scanning by our state of the art machine learning technology called VLA™.
In addition to maintaining vast blacklists of IP addresses used by moderators in many different networks, Adspect has detailed information about software features that are specific to moderators. Our HyperLogLog system tracks record of all visitors ever seen by Adspect and is able to detect various statistical anomalies about them in real time. Finally, our VLA™ machine learning technology knows even more, learning and refining its knowledge as the traffic runs through our servers.

VLA™ stands for “Virtual Learning Appliance.” It is the trademark of our state of the art machine learning technology used to detect the most elusive of threats that are actively disguising themselves and manage to get past all of the other filters. VLA detects and blocks new dangers as they emerge, with no human intervention.

VLA inspects browser fingerprints and other technical aspects of every visitor, scanning through thousands of features. With the help of computer science, probability theory, and statistics, it finds recurring suspicious patterns in observed facts and yields a certainty of danger, in percents, much like saying, e.g., “I am 97% sure that this fingerprint belongs to someone dangerous, so you better block them.”

HyperLogLog is an algorithm used by our unique traffic filter of the same name. And when we say “unique”, we mean it: this cutting edge filter was invented by Adspect to combat the spreading practice of manual reviews using residential proxies and real devices in target countries. Internals of the HyperLogLog filter are guarded as a trade secret, so there are no analogues of it in existence.

Long story short: HyperLogLog allows us to evaluate statistical data from billions of clicks in real time without sacrificing a millisecond of extra overhead. This data contains a lot of distinct patterns that let us tell ad moderators from legitimate visitors. And the more traffic Adspect processes, the more precise this filter will get, i.e. it is getting better and better right now!
No solution can guarantee 100% precise results, especially at the height of the arms race between malicious parties and security companies like us. However, our VLA machine learning system is backed by dozens of ad-hoc heuristics that yield exceptionally precise results. Adspect has the lowest rates of false positives and false negatives on the market.
Legitimate traffic bleed rate normally does not exceed 5%. However, it may be substantially higher when paranoid mode is enabled, which is designed to filter out potentially high risk ISPs regardless of whether they provide residential or mobile Internet services.
We filter out more because we detect more and better. Higher filtering rate does not mean that we block more legitimate users, but, conversely, it means that we detect and block bots and fraud that others wrongfully let through. In other words, we have much lower false negatives. It is especially evident with highly fraudulent traffic sources such as Google Ads (search) and popunder networks.
Adspect provides you with a special PHP script, index.php, to run your traffic through. You will need a server or an affiliate tracker with PHP support to host this script. The index.php file is linked to a stream in our system that contains settings and rules for traffic management. You will then use a link to the index.php file in your ad network campaign. The script will receive incoming clicks, thoroughly analyze them, and send to an appropriate destination: a money page (your real landing page or CPA offer) or a safe page (a safe page devoid of sensitive content.)
Yes, we provide native integration with Binom tracker.
Yes, we support JavaScript integration that is suitable for use with Shopify, Tilda, GitHub, and generally any service where you have the ability to add custom HTML code to the page. JavaScript integration also requires that our PHP file is downloaded and hosted on a server, but it may be any server, i.e. it does not have to be the same server/service where your safe page resides.
Yes, WordPress websites are supported via our reverse PHP integration.
No, this is not possible. You will need a PHP-enabled server to host our PHP scripts.
We support a wide range of web hosting platforms, ranging from shared hosting and VPS to dedicated servers and Amazon AWS. PHP 7 or PHP 5 is required. Both Linux and Windows are supported. You may also host the index.php file using your tracker if it supports uploading of PHP-enabled landing pages.
Yes, the zero redirect cloaking mode is supported with PHP-based integration. This is the most robust mode well suited for working with Facebook and Google Ads in particular.
Yes, Adspect fully supports Cloudflare in proxy mode, KeyCDN, Fastly, Amazon CloudFront, Akamai, and other CDN vendors. This also applies to custom reverse proxy setups.
Yes, Adspect fully supports IPv6 traffic and filters it just as good as IPv4 traffic. JavaScript fingerprinting and VLA are protocol-agnostic, plus we maintain extensive IPv6 blacklists for IP address-based filtering.
No for PHP integration and yes for JavaScript integration (ajax.php file). Generally, HTTPS is highly recommended as it is the de-facto standard in contemporary Internet and adds a certain amount of trust to your landing page. Consider using Let’s Encrypt to obtain a free SSL/TLS certificate for your domain.
No, all of our plans include unlimited traffic volumes. No additional costs will be incurred. You may use Adspect to run as much traffic as you like.
Yes, the limit is set at 20 streams per account on Anti-fraud plan. Cloaking plan offers unlimited streams.
Yes, you can run traffic through any number of copies of the same index.php file without creating any interference among them beyond shared stream statistics.
Please refer to the Pricing section for detailed information.

Currently we support the following payment methods:

  • Bitcoin
  • Litecoin
  • Ethereum
Additional payment options may be available upon request.
Yes, please contact us in Telegram about it, and we will make desired changes to your plan.
Traffic will not be lost. However, all of your streams working in the Filtering mode will be sending every visitor to their corresponding safe pages. It is therefore advised to renew your subscription in advance. We will remind you about it beforehand.
Yes, we have a referral program available for all customers. The fee is 10% of subscription price. You may find additional details in the Referral Program chapter of our documentation.
No, we do not enforce any KYC/AML procedures on our customers. We value your trust and do not collect personal information or any other sensitive data. You are completely anonymous to us.
Unfortunately, an active subscription cannot be paused or cancelled.
Haven’t found the answer to your question? Read documentation or reach out to us.