Web block
Used when the request itself is suspicious enough to stop immediately, for example burst attacks, blocked ranges or clear bot reasons.
The system does not rely only on JavaScript, cookies or platform reports. It reads the incoming request, scores it, records evidence and blocks suspicious traffic at the web edge.
request ↓ paid traffic detection ↓ burst + replay + geo + datacenter + crawler checks ↓ decision: pass / 404 block / range escalate ↓ logs + blacklist + API export ↓ Google Ads exclusion sync
Click Fraud Block can be strict against paid traffic while staying safer for normal website visitors. The system distinguishes between an immediate web block and a temporary Ads-only exclusion.
Used when the request itself is suspicious enough to stop immediately, for example burst attacks, blocked ranges or clear bot reasons.
Used to stop showing ads to suspicious ranges without necessarily blocking the entire website for that network.
Temporary ad exclusions can expire automatically when no fresh evidence is seen, keeping the Google Ads exclusion list cleaner.
A typical public setup can show a 30-day range memory and a 30-day operational view, while keeping detailed paid-event logs for longer audit review.
| Component | Example value |
|---|---|
| Ads-only detection window | 30 days |
| Ads-only TTL | 30 days |
| Paid event audit | 180 days |
| IPv4 range | /24 |
| IPv6 range | /64 |
| Crawler logic | Verified infrastructure is separated from human clicks. |
Every suspicious paid hit can become evidence for a smarter blocking decision.