Articles on: Getting Started

How Tapper uses browser fingerprints to detect invalid traffic

Tapper uses advanced browser fingerprinting technology—built on top of tools like CreepJS—to help identify bots, spoofed devices, and other forms of invalid traffic. This guide explains how fingerprint data is used in our system and why it's important for protecting your ad budget.

1. Detecting Inconsistencies Between Browser APIs



Modern browsers expose a range of APIs that provide information about the user's environment, including the device, browser, language, screen resolution, and more. We cross-check values between these APIs to identify inconsistencies that may indicate spoofing or automation.

Example checks include:
Comparing navigator.userAgent with navigator.platform and screen dimensions
Cross-referencing window.devicePixelRatio with screen resolution
Matching navigator.languages with HTTP headers like Accept-Language

Inconsistencies across these values often signal bot frameworks or fingerprint spoofers.

2. Identifying Headless or Automated Browsers



Tapper uses fingerprint signals that help flag headless browsers, automation tools, and virtual machines. These indicators may include:
navigator.webdriver set to true
Missing or uniform values from WebGL, Audio, or Canvas APIs
Lack of hardware fingerprint diversity (e.g., fonts, plugins, audio contexts)

These signals are commonly seen in environments running Puppeteer, Selenium, or commercial click farms.

3. Monitoring Fingerprint Stability Over Time



We record how fingerprints behave across sessions. A typical user will have a stable fingerprint over time. Bots, by contrast, often rotate proxies, spoof devices, or reconfigure browser states—resulting in unstable or frequently changing fingerprints.

Tracking this change helps us assess session legitimacy and spot suspicious patterns.

4. Matching Fingerprints With Geographic Data



Fingerprints contain timezone and language data that can be compared against the user’s IP address and geolocation. For example, if a browser reports a US timezone but the IP is in Eastern Europe, this mismatch raises a red flag.

This helps uncover residential proxy networks and spoofed geo behavior.

5. Behavioral Fingerprinting



In addition to technical fingerprints, Tapper also captures behavioral data to enhance fraud detection. We analyze:
Scroll speed and movement patterns
Click frequency and placement
Tab focus and visibility changes
Timing between user actions

Bots often produce uniform, unnatural, or too-perfect behavior, which Tapper is trained to detect.

6. Generating a Fingerprint Risk Score



All fingerprint signals are compiled into a composite risk score. This score helps determine how suspicious a given session is and contributes to Tapper’s decision-making on whether to allow, block, or flag the session as potentially invalid.

We classify sessions into tiers (e.g., low, moderate, high risk) based on a weighted assessment of fingerprint quality, behavior, and consistency.

If you’re interested in seeing the fingerprint data Tapper collects or would like to learn how this contributes to our fraud prevention engine, contact our support team or your onboarding specialist.

Updated on: 25/05/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!