Ad fraud isn’t a niche compliance issue sitting in someone’s quarterly risk report. It’s a live, continuous drain on advertising budgets that scales directly with digital ad spend.
Juniper Research projects global ad fraud losses hitting $172B annually by 2028 (up from $84B in 2023), with Fraudlogix’s 2025 analysis of 105.7B impressions showing 20.64% (roughly one in five) global invalid traffic (IVT) fraudulent. Applied to U.S. programmatic spend alone, that translates to an estimated $37 billion in ad spend associated with IVT annually.
What Actually Happens Inside a Fraud Operation
The term “ad fraud” covers a wide range of mechanics. Integral Ad Science (IAS), an independent ad measurement company, classifies invalid traffic into two tiers: General Invalid Traffic (GIVT) — known bots, datacenter traffic, and declared crawlers that can be filtered through standard blocklists — and Sophisticated Invalid Traffic (SIVT), which actively mimics human behavior and requires behavioral analysis and multi-signal corroboration to catch.
Fraudlogix estimates that GIVT accounts for 60–70% of IVT volume, while SIVT — despite lower volume — causes disproportionate financial damage because it targets higher-value inventory and evades basic filters.
Common fraud mechanics across both tiers include:
- Click farms: Large numbers of devices generating fake engagement to inflate publisher revenue or drain competitor budgets.
- Ad stacking: Multiple ads layered in a single placement, with only the top ad visible while all impressions are billed.
- Domain spoofing: Fraudulent inventory sold as premium supply by falsifying the referrer domain.
- SDK spoofing: Fake app install signals sent to attribution platforms without any actual user interaction.
Each of these tactics exploits the same gap: the advertiser cannot directly observe where their ads are actually running or who is seeing them.
How Verification Teams Approach the Problem
Ad verification is fundamentally a measurement and filtering operation. Teams instrument campaigns with third-party tags, collect impression-level signals — IP address, user agent, device type, geo, session behavior — and run those signals against detection models that flag non-human or suspicious traffic.

The IP Origin Signal
One of the most reliable fraud signals is where a request originates. Traffic from known datacenter ASNs is treated as suspicious by default, since no real user browses from a cloud host. Detection systems layer rules-based filtering, machine learning, and malware analysis to catch both GIVT and SIVT — because single-signal detection is easily circumvented.
The same logic applies in reverse for verification teams. To accurately confirm what a real user in a target location sees when an ad loads, the request needs to originate from the type of IP that carrier networks in that region actually assign to mobile devices.
That’s where mobile proxies become part of the verification stack — they route requests through real 5G, 4G, and LTE carrier IPs, producing traffic fingerprints that match genuine mobile users. Ad servers and DSPs increasingly serve different creatives — or none at all — to requests that don’t match expected device and network profiles for a given location, which makes carrier-IP verification the only reliable method for mobile-targeted campaigns.
What a Verification Checklist Actually Covers
Pixalate’s Q4 2025 IVT benchmarks, drawn from analysis of over 103 billion global programmatic impressions, put the U.S. mobile app IVT rate at 29% in Q4 2025 — higher than desktop/mobile web (25%) or CTV (19%).
Mobile app is the worst-performing channel, and it’s where verification gaps are hardest to close: when fake conversions enter the optimization loop, algorithms treat that inventory as high-performing and keep buying more of it.
Verification teams check location-accuracy, creative rendering, viewability, and brand safety — and every one of those checks requires requests that the ad server treats as coming from real users in real locations.

The Infrastructure Behind Reliable Verification
Running location-accurate verification at scale requires proxy infrastructure that reliably represents mobile carrier traffic across dozens of markets. Stale residential pools produce inconsistent results as flagged IPs accumulate, and datacenter IPs get filtered entirely — the practical requirement is fresh, carrier-assigned IPs with clean rotation.
Cost structure matters, too. Verification isn’t a one-time audit; it runs continuously across every active campaign, which means infrastructure costs compound quickly. A pay-per-GB model with non-expiring traffic fits the variable workload of AdOps teams far better than fixed monthly allocations — usage might be 10 GB one week and 200 GB during a major campaign launch, with no budget lost to unused allocation.
The teams catching fraud reliably aren’t just running better detection — they’re running it on infrastructure that actually looks like the traffic they are trying to verify.


