The Most Active and Friendliest
Affiliate Marketing Community Online!

“Propeller”/  Direct Affiliate

Who's a boT? :D

Graybeard

Well-Known Member
Ii just checked a sample today --pops I am buying aT $0.93/CPM [raw cost] they are remnant probably but surprisingly Mac is a good value here --if I can monetize the l33t :p
upload_2020-10-22_17-21-34.png

ALL US AND CANADA DESKTOP/TABLET WiFi
upload_2020-10-22_17-4-12.png


Bottom line I am getting filtered 80% human traffic to the target @ $0.003 a head.
Yesterday push visits cost me $0.08 each and that cattle didn't buy either :p

200 OK
302 Redirected; old browsers, known bad bots and decrepit os non supported <win 10 <Android 6 etc (junk)
403 forbidden maps to a datacenter bot (unauthorized ips) scrapers, spy-bots etc
499 connection closed by the client --popup blockers?
444 --ticket to server hell
 
Day ended ...

5.7576/1966 $0.0029 per head NET or $2.90/CPM for real? popunders
they count 6,191
I count 5279 received raw (@ my redirection server)
  • 2634 filtered real
  • and 1966 on the clickbank stats
  • 1-(1966/6191) = .6825 68.25% Bots and junk

only one user tried the order form 3 times --strange
I am going to assume that was legit and he was declined (for unknown reasons)
user was in a small town in Nevada

13636 "2020-10-22 11:55:06",1,Pahrump,NV,89060,US,74.82.146.xxx,client-74.82.146.xxx.idf.id
.digis.net,|1246925484|,pc,2001,456411,dso_dir,HTTP/1.1,"Mozilla/5.0 (Macintosh; Intel Mac OS
X 10_15_5) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.1.1 Safari/605.1.15"
Pahrump, Nevada - Wikipedia :D

upload_2020-10-23_3-43-7.png


Of course 1 of 1996 is hardly conclusive --
lower income, rural, bad teeth --the offer is tooth and gum preventative and restorative 'nutra related'

I am assuming 5% of the general population has dental-tooth and gum disease issues --That being the case about 100 of the almost 2000 visitors might have some interest --and not bounce on the pop-up so 1% were viable customers and the offer selling page failed.
For cold traffic that is not that bad ... $6 down on a viability test popunders.
Push ads were

upload_2020-10-23_4-5-27.png

20% cost overrun on the $20 test and no order form attempts --perhaps better as it was clicked traffic BUT only 217 hits were logged as hits on clickbank
Push= 24.01/217 = $0.1106 NET per head (net visit) v. Popunder 5.7576/1966 = $0.0029 per head (net visit)
both 0 sales and 1(3 tries) user interaction with the popunders (in the beginning hit #268 --random event most likely)
Do the math, will try another ad network for push --see if there is some difference.
 
Last edited:
UPDATE your fake bots sigs morons :p
6495 45.145.129.157 - - [23/Oct/2020:16:12:10 +0000] "GET /200402/?cid=2001&nwk=
pc&ctr=dso_dir&sid=250802&cat=Search&sysid=329877&b=0.00093 HTTP/2.0" 200 41 "http:
//:D:D:D/go/10229/250802/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) Apple
WebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.75 Safari/537.36 Edg/86.0.622.38
"
6494 98.195.161.50 - - [23/Oct/2020:16:12:04 +0000] "GET /200402/?cid=2001&nwk=p
c&ctr=dso_dir&sid=581143&cat=Women&sysid=329877&b=0.00093 HTTP/2.0" 302 145 "http:/
/:D:D:D/go/282927/581143" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleW
ebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.75 Safari/537.36 Aoyou/WiNtQCk2PG
I2VGF0cn5AMx9_VhmjFM0peP5p-mJSvV_3CTAxjybFuFpS"

6493 23.116.0.174 - - [23/Oct/2020:16:12:04 +0000] "GET /200402/?cid=2001&nwk=pc
&ctr=dso_dir&sid=581143&cat=Women&sysid=329877&b=0.00093 HTTP/2.0" 302 145 "http://
:D:D:D/go/282927/581143" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (
KHTML, like Gecko) Chrome/79.0.3945.70 Safari/537.36"

6491 174.17.178.177 - - [23/Oct/2020:16:11:58 +0000] "GET /200402/?cid=2001&nwk=
pc&ctr=dso_dir&sid=569423&cat=Blog|Chat|Forum&sysid=329877&b=0.00093 HTTP/2.0" 302
145 "http://:D:D:D/go/274724/569423" "Mozilla/5.0 (Windows NT 10.0) AppleWe
bKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.0 Safari/537.36"
 
Last edited:
It's amazing the depth and volume of the bots now. I had one trying to hijack one of my landers yesterday. PerimiterX caught it. They messaged me right away and told me the bot was trying to syphon personal data from my customer logins.

65% growth in account takeover attacks from 2018 to 2019. 2020 numbers not out yet.
 
7032 40.77.188.45 - - [23/Oct/2020:21:42:51 +0000] "GET /200402/?cid=2001&nwk=pc
&ctr=dso_dir&sid=69052&cat=IT|Webmasters&sysid=329877&b=0.00093 HTTP/2.0" 302 145 "
http://xxxxx.net/go/37348/69052" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) App
leWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/80.0.3987.16 Safari/537.36 Edg/8
0.0.361.9"



lolz what a pinhead ... :D
 
it got weirder this morning --I did an impromptu ClickBank offer test and the same thing occurred;
one unique user and 3 order form attempts (each time) --WTF?
That is a very strange coincidence to occur twice
Different user, different os, different browser?

4 "2020-10-24 12:21:00",1,Virginia Beach,VA,23451,US,68.231.244.xxx,ip68-231-244-xxx.hr
.hr.cox.net,|1156052216|,pc,2001,581129,Dprep,HTTP/2.0,"Mozilla/5.0 (Windows NT 6.1; Win64; x
64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36"

13636 "2020-10-22 11:55:06",1,Pahrump,NV,89060,US,74.82.146.xxx,client-74.82.146.xxx.idf.id.digis.net,|1246925484|,pc,2001,456411,dso_dir,HTTP/1.1,"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.1.1 Safari/605.1.15"

I am spooked --this ain't right
 
Last edited:
anything is possible ...
without seeing the codes they got back from the transaction --no idea.
I think there is a problem --all the traffic was from the same network but the site IDs of the publishers are different too.
3 tries to post the transaction does seem a creditable limit ... So, IDK :eek:

Bottom line: who would target carding clickbank junk :D

I think they may be having internal transaction issues (just a guess)?
 
high risk --what reward? no mia culpa lolz :D
forms-errors.png

Some weird stuff here --no accusations implied
8403 "2020-10-19 21:08:54",1,Phoenix,AZ,85021,US,70.175.21.194,wsip-70-175-21-194.ph.ph.co
x.net,|1185879490|,pc,1005,538820,dolp2,HTTP/1.1,"Mozilla/5.0 (Windows NT 10.0; Win64; x64) A
ppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.125 Safari/537.36"

7461 "2020-10-19 20:21:26",1,Little Elm,TX,75068,US,72.47.70.94,72-47-70-94.plptcmtk01.com
.dyn.suddenlink.net,|1211057758|,pc,1005,546485,dolp2,HTTP/1.1,"Mozilla/5.0 (Windows NT 6.1;
WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.109 Safari/537.36"


Some overlap with the above but no logical patterns.
 
In terms of risk:reward where is the comparison?
Maybe, it's the attack of the Insane Botnet Posse :D

Billing transaction errors seem more likely to me -- I had occasion to mitigate a proxy attack on a billing page on a cam site that posted direct to a large processor (and not to our own PCI-DSS transaction server) it's not the fraud pattern I saw.
Looks (on the surface) as resubmitted pay forms that either did not reply or declined the transaction --that is my supposition.
 
push ads have bots too

Are you doing any verifications for conversions? I haven't attempted anything like that for CPA, but I do it with my high end stuff. The high end consumers seem to like that level of verifications. Bot's can't through it as far as I know.
 
my strategy is discounting to a fair price.

  • you set a 100% good price and discount for the bot/junk content
  • I say US GEO pops are worth $3.00/CPM if perfect --send me 60% bots and junk I will only pay $1.20/CPM
  • US GEO push ads might be .12/cpc at 100% quality
  • pro rata to the traffic quality.

I have been banning sites that exceed 50% bots and junk --I want the good stuff too
I have developed a fast nosql (bash) "api' code to determine this buy time period
last few days to last few hours

what conversions :D ClickBank but the expense has been minor in ad spend <$250
 
banners
Back