Skip to main content

Malicious Category Reference Guide

Use this guide to understand the categories that can be flagged or customized within your denylist configuration. Each category identifies a type of unwanted, risky, or non-compliant behavior that can occur during ad or site scanning.

Meghan Mark avatar
Written by Meghan Mark
Updated today
  • Browser Extension

    Tracking pixel fired by a potentially malicious or hijacked browser extension on the user’s browser. These extensions may hijack search queries, inject ads, or redirect users to install additional extensions.

  • Cryptomining

    Script that uses browser resources to mine cryptocurrency without user consent.

  • Landing Page

    Flags pages or redirects that lead to unsafe, deceptive, or irrelevant destinations.
    Common issues include fake downloads, phishing forms, or domains unrelated to the advertised content.

  • Malware

    Code or content associated with malicious activity, including:

    • Bitcoin or crypto mining scripts

    • Cloaked or deceptive ads

    • Domain shadowing

    • Exploit kits or infectious code

    • Unsafe click trackers or landing pages

  • Phishing

    Attempts to collect personal or sensitive information deceptively, such as fake login or support pages.

  • Pornography

    Ads or content containing explicit adult imagery or sexual material.

  • Redirect

    Forceful or unexpected navigation away from the original page or ad. Redirects are typically caused by injected scripts or malicious tags that hijack the user’s session to drive fake traffic, load deceptive landing pages, or prompt unwanted app installs. Common behaviors include:

    • Auto-redirects that load new pages without a click

    • Click hijacking or invisible ad overlays

    • Redirect chains hiding the true destination domain

    • Redirects that trigger only for specific devices, geos, or browsers

  • Risky Platform

    Platforms repeatedly linked to unwanted or suspicious behavior.
    While not inherently fraudulent, they are often exploited by bad actors for malvertising campaigns.

  • Suspicious Content

    Flagged for unusual or obfuscated behavior, such as:

    • Ad stacking or impression stuffing

    • Fake downloads or updates

    • Highly obfuscated JavaScript

    • Pixel stuffing

    • Recently registered or low-reputation domains

    • Suspicious ad servers, DSPs, or platforms

    • Unrelated or misleading information in the ad

  • Trojan

    Redirects users to install potentially unwanted or harmful programs.

  • Video Stuffing

    Hidden or invisible video ads that play in the background to inflate impressions or revenue.

Related Articles

You may also be interested in:

Did this answer your question?