Popular Articles
Threat Definitions & Corresponding Traps
High Risk Threats The following threats belong to the high risk category. Trojan (TA) Trojan Traffic is a high-risk threat detected by identifying devices infected with a Trojan virus. This threat arises when the source is suspected of initiating ...
Trap Names and Trap Codes
Trap Names Trap Codes Trojan Traffic TA Bot Network BN Known Attack Sources KAS Empty Referrer EREF Offscreen OFS Crawler CAW Fake Crawlers FC IFrame IF Hidden IFrame HVIF Data Center DC Click Spam CS eReader ERE Gaming Console CND Internet Explorer ...
SDK Integration (in English)
1.Download and Setup Download the SDK: Obtain the SDK from the provided link. Create a 'libs' Directory: Within your app's directory, create a folder named libs. Add the AAR File: Place the downloaded .aar file into the libs directory. 2. SDK ...
Javascript Pixel Integration with DV360
Introduction This guide provides a step-by-step process for adding an HTML tracking tag to a creative in DV360 (Display & Video 360). By following these instructions, you can ensure the tracking tag is correctly inserted using a <script> tag with the ...
Postback Integration
Introduction ClearTrust’s Postback functionality empowers businesses to act decisively and swiftly by sending real-time notifications (callbacks) whenever critical events occur, such as fraudulent traffic detection or conversions. This innovative ...