Fraud Type Guide

Traffic Laundering: How Fraudsters Disguise Bot Traffic as Legitimate

Fraudsters route bot traffic through chains of redirects and legitimate-seeming domains to make it appear genuine. Learn how traffic laundering works and how to detect it.

What Is Traffic Laundering?

Quick answer: Traffic laundering is an ad fraud technique where bot or low-quality traffic is passed through a chain of redirects and intermediary domains to disguise its true origin. By the time the traffic reaches the ad server, it appears to come from legitimate, brand-safe sources — making it extremely difficult to detect using referral data alone.

Just as money laundering makes illegally obtained funds appear legitimate, traffic laundering takes fraudulent bot visits and makes them appear to be genuine human traffic from reputable websites. The technique exploits the way referral data works on the web.

Fraudsters create networks of intermediary websites that pass traffic through a chain of redirects. Each hop strips or replaces the original referrer information, so by the time the traffic reaches its final destination, it carries referral data pointing to legitimate publishers or search engines.

This makes traffic laundering one of the most difficult fraud techniques to detect using traditional analytics. The traffic arrives with clean referral data, residential IP addresses (if routed through compromised devices), and standard browser user-agents, passing most basic fraud filters.

How Traffic Laundering Works

The laundering process follows a deliberate sequence designed to strip evidence of fraud at each stage.

🤖

Bot Traffic Generation

Fraudsters generate large volumes of bot traffic using botnets, headless browsers, or compromised devices. This is the raw material that needs to be disguised before it can be monetised.

🔀

Redirect Chain

Traffic is routed through multiple intermediary websites, each performing a redirect that modifies or strips the referrer header. This creates a clean chain of provenance that hides the true origin.

🎭

Domain Washing

The final redirect lands the traffic on a legitimate-looking publisher site that serves ads. The traffic now appears to come from a real website with clean referral data, passing basic verification.

💰

Monetisation

Ads are served to the laundered traffic and impressions are counted. Advertisers pay full CPM rates for bot impressions that their analytics tools report as coming from legitimate sources.

Why Traffic Laundering Is So Dangerous

Traffic laundering is particularly harmful because it is designed to defeat the exact tools advertisers rely on for verification.

💰

Invisible Budget Drain

Because laundered traffic passes basic fraud checks, it consumes budget silently. Advertisers may never know a portion of their impressions are reaching bots instead of humans.

📊

Analytics Pollution

Laundered traffic appears in your analytics as legitimate visits from real sources. This corrupts every metric: bounce rates, session duration, conversion rates, and attribution models.

📋

False Source Attribution

Your analytics may credit legitimate publishers or traffic sources for sending traffic that is actually fraudulent. This leads to investing more in channels that are actually delivering bots.

📈

Undermines Verification Tools

Standard verification relies on referral data and domain checks. Traffic laundering specifically targets these signals, making traditional verification ineffective against this technique.

Opticks integrates via a lightweight tag — install through Google Tag Manager in under five minutes with no code changes required.

How Opticks Detects Traffic Laundering

Behavioural Analysis

Opticks analyses mouse movements, scroll patterns, and session behaviour to identify bot characteristics that persist regardless of how many redirects the traffic has passed through.

Device Fingerprinting

Every visit is fingerprinted at the device level. Laundered traffic from botnets reveals patterns like identical GPU renderers, missing browser features, and inconsistent hardware profiles.

Cross-Campaign Correlation

Opticks identifies patterns across campaigns and time periods, revealing when the same bot fingerprints appear across different traffic sources and laundering chains.

Frequently Asked Questions

Expose Laundered Traffic Before It Wastes Your Budget

See how Opticks traces traffic back to its true origin and identifies laundered bot visits across all your campaigns. No code changes required — install via Google Tag Manager in under five minutes.

Start Free Trial
No credit card required