Skip to content

Emulator and Bots

What it detects

Emulators, headless browsers, and click farm automation tools generate traffic that mimics real user sessions but lacks the behavioral and hardware characteristics of a genuine device. This filter applies multi-signal analysis to identify and block non-human traffic before it reaches attribution.

How it works

Integr8 evaluates multiple signals on each incoming request to determine whether the traffic originates from a real device:

  • User agent anomalies: Identifies spoofed or implausible user agent strings common to automation frameworks (Selenium, Puppeteer, headless Chrome, etc.)
  • IP frequency analysis: Flags IP addresses with unnaturally high request rates or access patterns inconsistent with human behavior
  • Device behavior profiling: Detects device characteristics that contradict what the user agent claims — for example, an Android user agent with no gyroscope or touch events

Traffic that matches emulator or bot signatures is rejected immediately.

Configuration

Navigate to Fraud Prevention > Device Fraud > Emulator and Bots to configure.

ParameterDefaultOptionsDescription
enabledfalsetrue, falseEnable emulator and bot detection
block_modeBlockBlock, FlagAction taken when non-human traffic is detected

What happens when triggered

When a request is identified as emulator or bot traffic:

  • Block mode: The request is rejected with fraud_reason: emulator_bot.
  • Flag mode: The request is recorded with the fraud tag for audit without blocking.

Review flagged or blocked traffic in Reports > Click Reports filtered by fraud_reason: emulator_bot.

Enable Flag mode first to assess the volume of bot traffic on your campaigns. If the flagged volume is consistently high and concentrated on specific publishers, those publishers are likely operating fraudulent traffic sources.