Blocking reasons
#### URL Parameters
The lead attempted to access the cloaking link without the URL parameters configured in the campaign. If you created the campaign in basic mode, these parameters were generated automatically. At the end of campaign setup, we provide a step-by-step guide to setting these parameters correctly on Facebook or Google.
#### Under review
This action is currently under review. Our systems are analyzing lead behavior to determine whether to block or allow.
#### Bot
Our system detected that this lead was, in fact, a bot. We carry out several analyzes to guarantee this identification with 100% accuracy.
#### Internal blacklist
Our system has an extensive list of blocking patterns, which includes bots, moderators and other types of threats. If you notice a block on your request, don't worry, this is part of the automatic protection.
#### Google
We block Google bots and moderators so your campaign lasts longer and is less prone to restrictions.
#### Facebook
We block Facebook bots and moderators so your campaign runs longer and with greater security.
The lead attempted to access your cloaking page through a new window, without clicking a link on another site, which could indicate suspicious behavior.
The lead attempted to access your cloaking page using a VPN or proxy, which could signal an attempt to mask their true location or identity.
The lead attempted to access the page from a geographic location that is not on the whitelist you defined. This may indicate an attempt to bypass location-based access restrictions.
We analyze the device used by the lead to access your page, checking if it matches the expected legitimate traffic profile.
We monitor the lead's internet service provider (ISP), checking whether it is associated with suspicious practices or known blocks.
The lead's operating system is also analyzed. If it is not on the list of allowed operating systems or is considered suspicious, access may be blocked.
We check the browser used by the lead. Unconventional browsers or those with suspicious configurations may be blocked.
We analyze the language configured in the lead's browser. If there are discrepancies regarding your campaign's target audience, it may result in blocking.
The reference (referrer) where the lead came from is analyzed. Access attempts without references or with suspicious references may be blocked.
We analyze the domain used to access your cloaking page. If the domain is unauthorized or considered suspicious, access may be blocked.
The lead attempted to access the cloaking link without the URL parameters configured in the campaign. If you created the campaign in basic mode, these parameters were generated automatically. At the end of campaign setup, we provide a step-by-step guide to setting these parameters correctly on Facebook or Google.
#### Under review
This action is currently under review. Our systems are analyzing lead behavior to determine whether to block or allow.
#### Bot
Our system detected that this lead was, in fact, a bot. We carry out several analyzes to guarantee this identification with 100% accuracy.
#### Internal blacklist
Our system has an extensive list of blocking patterns, which includes bots, moderators and other types of threats. If you notice a block on your request, don't worry, this is part of the automatic protection.
We block Google bots and moderators so your campaign lasts longer and is less prone to restrictions.
We block Facebook bots and moderators so your campaign runs longer and with greater security.
Null reference
The lead attempted to access your cloaking page through a new window, without clicking a link on another site, which could indicate suspicious behavior.
Proxy/VPN
The lead attempted to access your cloaking page using a VPN or proxy, which could signal an attempt to mask their true location or identity.
Geolocation
The lead attempted to access the page from a geographic location that is not on the whitelist you defined. This may indicate an attempt to bypass location-based access restrictions.
Device
We analyze the device used by the lead to access your page, checking if it matches the expected legitimate traffic profile.
Internet Provider
We monitor the lead's internet service provider (ISP), checking whether it is associated with suspicious practices or known blocks.
Operating System
The lead's operating system is also analyzed. If it is not on the list of allowed operating systems or is considered suspicious, access may be blocked.
Browser
We check the browser used by the lead. Unconventional browsers or those with suspicious configurations may be blocked.
Browser Language
We analyze the language configured in the lead's browser. If there are discrepancies regarding your campaign's target audience, it may result in blocking.
Reference
The reference (referrer) where the lead came from is analyzed. Access attempts without references or with suspicious references may be blocked.
Domain
We analyze the domain used to access your cloaking page. If the domain is unauthorized or considered suspicious, access may be blocked.
Updated on: 03/09/2024
Thank you!