Bot Traffic Generation
Fraudsters generate large volumes of bot traffic using botnets, headless browsers, or compromised devices. This is the raw material that needs to be disguised before it can be monetised.
Fraud Type Guide
Fraudsters route bot traffic through chains of redirects and legitimate-seeming domains to make it appear genuine. Learn how traffic laundering works and how to detect it.
Just as money laundering makes illegally obtained funds appear legitimate, traffic laundering takes fraudulent bot visits and makes them appear to be genuine human traffic from reputable websites. The technique exploits the way referral data works on the web.
Fraudsters create networks of intermediary websites that pass traffic through a chain of redirects. Each hop strips or replaces the original referrer information, so by the time the traffic reaches its final destination, it carries referral data pointing to legitimate publishers or search engines.
This makes traffic laundering one of the most difficult fraud techniques to detect using traditional analytics. The traffic arrives with clean referral data, residential IP addresses (if routed through compromised devices), and standard browser user-agents, passing most basic fraud filters.
The laundering process follows a deliberate sequence designed to strip evidence of fraud at each stage.
Fraudsters generate large volumes of bot traffic using botnets, headless browsers, or compromised devices. This is the raw material that needs to be disguised before it can be monetised.
Traffic is routed through multiple intermediary websites, each performing a redirect that modifies or strips the referrer header. This creates a clean chain of provenance that hides the true origin.
The final redirect lands the traffic on a legitimate-looking publisher site that serves ads. The traffic now appears to come from a real website with clean referral data, passing basic verification.
Ads are served to the laundered traffic and impressions are counted. Advertisers pay full CPM rates for bot impressions that their analytics tools report as coming from legitimate sources.
Traffic laundering is particularly harmful because it is designed to defeat the exact tools advertisers rely on for verification.
Because laundered traffic passes basic fraud checks, it consumes budget silently. Advertisers may never know a portion of their impressions are reaching bots instead of humans.
Laundered traffic appears in your analytics as legitimate visits from real sources. This corrupts every metric: bounce rates, session duration, conversion rates, and attribution models.
Your analytics may credit legitimate publishers or traffic sources for sending traffic that is actually fraudulent. This leads to investing more in channels that are actually delivering bots.
Standard verification relies on referral data and domain checks. Traffic laundering specifically targets these signals, making traditional verification ineffective against this technique.
Opticks integrates via a lightweight tag — install through Google Tag Manager in under five minutes with no code changes required.
Opticks analyses mouse movements, scroll patterns, and session behaviour to identify bot characteristics that persist regardless of how many redirects the traffic has passed through.
Every visit is fingerprinted at the device level. Laundered traffic from botnets reveals patterns like identical GPU renderers, missing browser features, and inconsistent hardware profiles.
Opticks identifies patterns across campaigns and time periods, revealing when the same bot fingerprints appear across different traffic sources and laundering chains.
Keep Exploring
See how Opticks traces traffic back to its true origin and identifies laundered bot visits across all your campaigns. No code changes required — install via Google Tag Manager in under five minutes.