The Most Active and Friendliest
Affiliate Marketing Community Online!

“Propeller”/  MyBid

why I am not able to search offers on Adplexity?

Mrunal Ghatole

New Member
Hello,

I am searching offers on adplexity mobile but unable to find offers from my affiliate networks. These are top offers in my network so surely they are getting more traffic. but still nothing is coming on the name of those offers, I have searched using keywords of the offer. Also I have searched using category of the offer for example for survey offers, I have searched by "survey" but still not getting relevant landing pages. All I am getting is sweeps landing pages mostly.

Quick questions:
1: Is adplexity good for sweep offers only? As I am unable to find any landing pages from category like weight loss, crypto and more
2: Are super affiliates are able to prevent their landing pages from tools like adplexity and other spy tools?
3: what are other options for spying (how to do manual spying?)
4 how to search better on adplexity?

Also when searching on adplexity, I found that there are very less landers from Voluum and mostly from bemob and binom and other new trackers. As much I know all or most experience affiliate uses Voluum as tracker and newbie mostly use new trackers. If experience affiliates using voluum and running high volume why there are less landers in adplexity for voluum. This again prove my theory of super affiliate preventing their landers from adplexity

Is it possible to prevent your landers from spy tools?

Thanks in advance
 
All you have to do is block web sever access to the IP addresses (or the data center AS numbers) that a tool uses.
I have hisec (enhanced security) domains where I map and block many data centers. The blocking is mapped at the root server domain configurations.

I don't like snoops. If a server needs access I have to allow that server's IP to overide the block list entry for its CIDR block e.g.; 1.2.3.0/16

Code:
barry@paragon-DS-7:~$ ipcalc 100.20.103.0/16
Address:   100.20.103.0         01100100.00010100. 01100111.00000000
Netmask:   255.255.0.0 = 16     11111111.11111111. 00000000.00000000
Wildcard:  0.0.255.255          00000000.00000000. 11111111.11111111
=>
Network:   100.20.0.0/16        01100100.00010100. 00000000.00000000
HostMin:   100.20.0.1           01100100.00010100. 00000000.00000001
HostMax:   100.20.255.254       01100100.00010100. 11111111.11111110
Broadcast: 100.20.255.255       01100100.00010100. 11111111.11111111
Hosts/Net: 65534                 Class A

I assume people (sophisticated affiliates) may be doing this to the Adplexity spy tool ;) seems likely ...

[T]his again prove my theory of super affiliate preventing their landers from adplexity

Is it possible to prevent your landers from spy tools?

Thanks in advance
 
Last edited:
thank you so much Graybeard

Can you please also share some info on manual spying?
How we can do manual spying?
I believe VPN is a way, but can sophisticated affiliate also block spying through VPN?
 
All you have to do is block web sever access to the IP addresses (or the data center AS numbers) that a tool uses.
I have hisec (enhanced security) domains where I map and block many data centers. The blocking is mapped at the root server domain configurations.

I don't like snoops. If a server needs access I have to allow that server's IP to overide the block list entry for its CIDR block e.g.; 1.2.3.0/16

Code:
barry@paragon-DS-7:~$ ipcalc 100.20.103.0/16
Address:   100.20.103.0         01100100.00010100. 01100111.00000000
Netmask:   255.255.0.0 = 16     11111111.11111111. 00000000.00000000
Wildcard:  0.0.255.255          00000000.00000000. 11111111.11111111
=>
Network:   100.20.0.0/16        01100100.00010100. 00000000.00000000
HostMin:   100.20.0.1           01100100.00010100. 00000000.00000001
HostMax:   100.20.255.254       01100100.00010100. 11111111.11111110
Broadcast: 100.20.255.255       01100100.00010100. 11111111.11111111
Hosts/Net: 65534                 Class A

I assume people (sophisticated affiliates) may be doing this to the Adplexity spy tool ;) seems likely ...

Thank you so much Graybeard :)

Can you please also share some info on manual spying?
How we can do manual spying?
I believe VPN is a way, but can sophisticated affiliate also block spying through VPN
 
Thanks again Graybeard

I understand good services should be paid well but I am not able to pay $500/month as it is out of my budget right now. But I will get back to you on this when I have this in my budget :)

But based on this I am sure to not use/focus on adplexity much as mostly landers there are for sweeps offer and from newbie affiliates
 
If the VPN is a server in a data center then it is trivial to block.
I block tor users also from some websites too -- that is not hard the list of exit nodes is published ;)

I can "manually" spy on any URL with my own robots (automagically) using my own ISP IP's I have 5 static IP's amd one ISP assigned 'main' IP. This has gotten past Cloudfront in the past.

If you want to commit to a min of $500.00/per month I can provide a service with 4 million residential IP's world-wide you can proxy with. We piggy back on VPN users and use their real IP addresses while they are using VPN's for free :D everything free has a price.
 
Yes for a business this amount is small but for a newbie affiliate it is lot. I totally understand the value in the tools you have mentioned but currently cannot buy as much as I wanted too.

I am trying my best to make affiliate marketing works. I am doing a full time job and affiliate marketing in spare time, I know this should not be this way but it is what it is and I can't complaint because I know we have to make it work with the resources (time, money, tools) we have. Best part is my confidence is still high in affiliate marketing after so many fail campaigns and losing hard earned money. so as I said earlier I will make your tools in my budget and then will buy them. Hopefully soon :)
 
$500/mo is not a lot for an ad network, affiliate network or larger businesses with interests in SEO. For individual affiliates it's a lot.

The problem is looking at the offers in different GEOs -- maybe something is hot in the UK or France and I can't see it with a US IP or a German IP ... or I am redirected by a smart link. Same goes for regional SEO or even local SEO withing a GEO (country code IP). GEO City is used a lot in Search Engines today.
 
Thank you so much Azgold :)

Would love to get some more info, however I am more inclined towards manual spying now :)

Also please let me know if I have posted this thread in correct category as in starting I was not getting any responses so thought I posted/asked incorrectly or in wrong category
 
Thank you so much Azgold

You're very welcome.

Also please let me know if I have posted this thread in correct category as in starting I was not getting any responses so thought I posted/asked incorrectly or in wrong category

That can happen sometimes, especially on weekends but actually, I think I'm going to move this to the Research and Intelligence forum, see if we can get you some more traction. :)
 
3: what are other options for spying (how to do manual spying?)

Hi Mrunal,

For manual spying, you can try using a VPN like HideMyAss or I personally use ExpressVPN. What traffic source are you using? If you can get a hold of the individual urls of the placements, then you are good to go. Otherwise, if the traffic is a blind traffic source like PopAds, you must find a way to figure the individual sites.

For spying, if you are using desktop offers, this would be easier as you can just activate your VPN and browse the target url and you can see the ads on which country you want to spy.

For mobile, you will need an agent switcher for Chrome extension, you can Google it. Once you install it, all you have to do is spoof your desktop browser to imitate say the Android OS and add it with a VPN and you are ready to spy. But if you are targeting specific 3G carriers then it can get a bit complicated to show the ads.

Hope this helps and good luck on your journey!
 
Hi Mrunal,

For manual spying, you can try using a VPN like HideMyAss or I personally use ExpressVPN. What traffic source are you using? If you can get a hold of the individual urls of the placements, then you are good to go. Otherwise, if the traffic is a blind traffic source like PopAds, you must find a way to figure the individual sites.

For spying, if you are using desktop offers, this would be easier as you can just activate your VPN and browse the target url and you can see the ads on which country you want to spy.

For mobile, you will need an agent switcher for Chrome extension, you can Google it. Once you install it, all you have to do is spoof your desktop browser to imitate say the Android OS and add it with a VPN and you are ready to spy. But if you are targeting specific 3G carriers then it can get a bit complicated to show the ads.

Hope this helps and good luck on your journey!


Thank you Wes888 for explaining in detail.

Can you please also explain how to find site URLs from blind traffic network as Pop Ads, Propeller Ads and more?
 
You can use PublicWWW, it is a source code search engine. Basically, you put the adserving code of the traffic source, so for PopAds that would be popads.net, PopCash would be popcash.net, for Propeller, I think it is something like onclickads.com. It would show you a list of sites that serve those ads and you spy from there.
 
All you have to do is block web sever access to the IP addresses (or the data center AS numbers) that a tool uses.
I have hisec (enhanced security) domains where I map and block many data centers. The blocking is mapped at the root server domain configurations.

I don't like snoops. If a server needs access I have to allow that server's IP to overide the block list entry for its CIDR block e.g.; 1.2.3.0/16

Code:
barry@paragon-DS-7:~$ ipcalc 100.20.103.0/16
Address:   100.20.103.0         01100100.00010100. 01100111.00000000
Netmask:   255.255.0.0 = 16     11111111.11111111. 00000000.00000000
Wildcard:  0.0.255.255          00000000.00000000. 11111111.11111111
=>
Network:   100.20.0.0/16        01100100.00010100. 00000000.00000000
HostMin:   100.20.0.1           01100100.00010100. 00000000.00000001
HostMax:   100.20.255.254       01100100.00010100. 11111111.11111110
Broadcast: 100.20.255.255       01100100.00010100. 11111111.11111111
Hosts/Net: 65534                 Class A

I assume people (sophisticated affiliates) may be doing this to the Adplexity spy tool ;) seems likely ...


Can you please please please explain in details or help me out on this?? i want to prevent my campaings from being spied on..

or would be much easier if you have a guide link regarding this..
 
about manual spy
You can try to add a Request Header param like : X-FORWARD-FOR by some CHROME headers modify extensions. For example . if you want to see Germany Ads . try to find out a Germany IP address as the value for X-Forward-For .
if the ad network trust this param of request header .then it will show you the ads that you want .Otherwise it will doesn't work .
 
There is no one-stop link. This took me years to figure this out -- what's that worth to you?

Moreover, any form/schema of security is a continuous process that has to be adapted with customized countermeasures. Has civilization ever stopped theft since we decided it was a crime?
  1. learn to read your server logs; and,
  2. understand the IP address system; and,
  3. develop heuristics (that may or not work); and,
  4. understand that IPv6 will widen the IP address space radically making your prior work of lessened value.
It's like pissing on a forest fire --but there is little else you can do unless you want to adopt a super restrictive access policy. With advertising networks attempting to conceal the ad referrers -- you can't do much to assure that the HTTP requests are genuine ... There is no easy way
 
banners
Back