Why use custom filters? #
Every advertising campaign has unique needs, and sometimes a simple IP blacklist isn’t enough. Custom filters give you full control over who can access your landing pages by setting specific rules based on visitor attributes such as IP, country, device type, referrer, user-agent, and more.
Key Benefits of Custom Filters: #
- Target the Right Audience – Allow or deny traffic based on geolocation, devices, or user behavior.
- Block Ad Reviewers – Detect and filter out ad network moderators to prevent unwanted scrutiny.
- Prevent Spy Tools – Block traffic from tracking services and competitor monitoring tools.
- Improve Conversion Rates – Ensure that only qualified traffic reaches your monetization pages.
- Reduce Fraud & Spam – Eliminate suspicious visits by setting advanced filtering rules.
How TrafficShield’s Custom Filters Work #
TrafficShield enables you to create advanced filtering rules to control who can or cannot access your website.
Custom Filtering Options: #
- Geo-Blocking & Allowlisting – Restrict access based on country, region, or IP range.
- Device-Based Filtering – Target or block visitors using specific devices (mobile, desktop, tablet).
- Referrer & URL Filtering – Control access based on the referring website or URL parameters.
- User-Agent & Browser Rules – Filter visitors based on the browser, operating system, or bot signatures.
- Traffic Behavior Analysis – Detect and block abnormal browsing patterns (e.g., zero engagement, instant bounces).
How to Set Up Custom Filters in TrafficShield #
- Go to the Custom Filters section in your TrafficShield dashboard.
- Choose the filtering criteria (IP, location, device, user-agent, referrer, etc.).
- Set rules – Block, redirect, or allow traffic based on your conditions.
- Save and apply the filters to your campaigns.
- Monitor & adjust the rules based on real-time traffic data.
Best Practices for Custom Filters #
- Regularly review traffic logs to refine your filtering criteria.
- Combine multiple filter types for layered protection (e.g., IP + user-agent + behavior tracking).
- Use allowlists for trusted traffic sources while blocking risky ones.
- Continuously update filtering rules to adapt to changes in ad network detection algorithms.