Please see the descriptions below on the different fraud strategies, which are integrated in vene dash.


  • Anonymous Proxies - Enabling this strategy will block requests that originate from anonymous proxies.
  • App Blacklisting - Enabling this strategy will validate incoming requests against our curated list of malicious mobile applications. 
  • Custom App Blacklisting - Enabling this strategy will validate incoming requests against your curated list of malicious mobile applications. 
  • App Whitelisting - Enabling this strategy will disallow all traffic coming from mobile applications except for the applications defined in the list. The list has to include the applications package names. Examples: com.imgur.mobile, com.facebook.katana 
  • Blacklisted IP's - This strategy validates if the user IP is part of our IP blacklist.
  • Device Pacing - This strategy disallows repeated attempts from a specific device. It helps limit the volume from infected devices as well as black hat attempts. When active it will block clicks when the threshold number of clicks within the period is exceeded.
  • DNS Spoofing - This strategy verifies that a reverse PTR is available to protect from DNS Spoofing. 
  • Geo Blacklisting - This strategy disallows traffic from specified geo locations. 
  • Geo Whitelisting - This strategy allows traffic from specified geo locations. 
  • Hosting Services - Allows for blocking traffic originating from hosting services.
  • Invalid IP - This strategy allows for blocking users whose IP address cannot be resolved.
  • Known Bots - Enabling this strategy will block the traffic originating from known bots. 
  • Known Spammers - This strategy validates if the user is not part of the known spammers database.
  • Block App Traffic - This strategy allows for blocking traffic from specific apps.
  • Block Irregular Appnames - This strategy allows for blocking irregular app names.
  • Private IP - This strategy allows for blocking users whose IP address is from a private network.
  • Suspicious Proxies - Allows for blocking traffic originating from proxies known for being engaged in malicious activity.
  • TOR Exit Nodes - This strategy allows for blocking traffic originating from TOR exit nodes. 


Note: Strategies have activation ratios - this defines the probability if using the specific strategy when filtering the traffic. For example if the 'Know Bots' filter is set at 90% - it means that out of the total traffic allowed, no more than 10% of bot traffic would be allowed.