Consumer VPNs
Commercial VPN services with servers in dozens of countries. Fraudsters subscribe to these services to route traffic through clean IPs shared with legitimate users.
Fraud Type Guide
Fraudsters route bot traffic through VPNs and proxies to hide their real location and identity. Learn how masked connections undermine your geo-targeting and inflate your metrics.
A Virtual Private Network creates an encrypted tunnel between a user’s device and a remote server. The website or ad network sees the VPN server’s IP address instead of the visitor’s real one. While millions of people use VPNs legitimately for privacy, fraudsters exploit this same technology to mask the origin of bot traffic and click farms.
For advertisers, VPN-masked traffic is particularly problematic because it defeats one of the most fundamental fraud defences: geographic verification. When a click farm in Southeast Asia routes traffic through a US-based VPN exit node, your analytics record it as domestic traffic — and your campaign budget pays the domestic CPC rate.
Beyond consumer VPNs, fraudsters also use residential proxy networks, data centre proxies, and rotating proxy services that can provide thousands of unique IP addresses from any target country, making simple IP-based detection nearly impossible.
Not all proxy traffic is the same. Understanding the different masking technologies helps explain why detection requires multiple layers of analysis.
Commercial VPN services with servers in dozens of countries. Fraudsters subscribe to these services to route traffic through clean IPs shared with legitimate users.
Networks of real residential IP addresses obtained through SDKs embedded in free apps. These are the hardest to detect because the IPs belong to genuine ISP customers.
IP addresses hosted in cloud infrastructure and data centres. They offer speed and scale but are easier to identify because they belong to known hosting providers rather than ISPs.
Services that automatically rotate through pools of thousands of IPs with each request, making it appear that traffic comes from many different users in different locations.
The Tor network anonymises traffic through multiple relay layers. While primarily used for privacy, it is also exploited by fraudsters who need maximum anonymity for their operations.
Arrays of mobile devices connected to cellular networks, providing genuine mobile carrier IPs. These are used to generate traffic that appears to come from real mobile users.
Masked traffic creates a chain of problems that undermine targeting, attribution, and budget efficiency.
Your ads are served to visitors who appear to be in your target market but are actually in a different country. Every impression and click on these mislocated visitors wastes budget.
Traffic from high-CPC regions routed through VPNs costs you premium rates for visitors who will never convert because they are not genuine prospects in your target geography.
VPN traffic pollutes your geographic performance reports, making it impossible to accurately assess which regions deliver the best ROI and where to allocate budget.
Ad platform algorithms learn from engagement signals. VPN-masked fraud teaches these algorithms to optimise toward fake geographic clusters, degrading campaign performance over time.
Identifying masked traffic requires combining IP intelligence with behavioural and device-level signals.
Cross-reference visitor IPs against databases of known VPN providers, data centres, and proxy networks. This catches the majority of commercial VPN and data centre proxy traffic.
Compare the browser’s reported timezone against the geographic location of the IP address. A visitor appearing from New York with a timezone offset for Bangkok is likely masked.
WebRTC can expose the real IP address behind a VPN through STUN requests. Checking for discrepancies between the connection IP and the WebRTC-revealed IP identifies VPN use.
Analyse browser language preferences, keyboard layouts, and system locale settings. A visitor from a US IP with a browser configured for a non-English language may be using a VPN.
Opticks integrates via a lightweight tag — install through Google Tag Manager in under five minutes with no code changes required.
Opticks checks every IP against VPN provider databases, data centre ranges, and residential proxy networks in real time, identifying masked connections before they corrupt your data.
IP data is combined with timezone, locale, WebRTC, and device fingerprint signals to detect even residential proxy traffic that passes basic IP reputation checks.
See the true geographic distribution of your traffic alongside the reported distribution, with campaign-level breakdowns showing which sources send the most masked traffic.
Keep Exploring
See how Opticks reveals VPN and proxy traffic across all your campaigns in real time. No code changes required — install via Google Tag Manager in under five minutes.