1. Help Center
  2. Made for Advertising (MFA)

Identifying exposure to "Made For Ads" (MFA) traffic using the Analytics Dashboard

How can I use the Analytics Dashboard to combat MFA Inventory?

 

 

Pixalate has updated the Analytics Dashboard with reports for MFA websites, Mobile apps and CTV apps. These features are available to all Analytics Dashboard subscribers as a beta program. With these reports, a user can identify traffic that has been labeled with an MFA risk, ranging from low to high, and see the impact on overall performance. 

For a full description of Pixalate's methodology and MFA solutions, please see here and for all MFA related definitions, see here. From these reports, a number of actions can be taken, including blocking certain supply, working with the publisher or increasing spend where MFA risk is low. 

 


Domain Data Set

Although the number of websites marked as MFA makes up 2% of all websites, the global ad spend tied to MFA sites makes up 9%, per Pixalate's Q1 2024 MFA Websites Report. The MFA Analytics report allows clients to view their web/domain traffic by MFA Risk levels, as well as by the various MFA metrics. These MFA metrics can be broken down individually or in combination to yield a custom list of domains that a user wishes to act on. Additionally, other metrics, such as IVT, can be leveraged for further insights. 

View the MFA Domains Report and Sort by Default Values

This provides a snapshot of total traffic accompanied by the amount of MFA impressions and MFA Traffic rate, so a user has a better understanding of current impact. Should any spikes in MFA traffic occur, this day over day view can pinpoint when that occurred and what/if new supply was introduced. 


Screen Shot 2024-05-23 at 3.02.17 PM

Screen Shot 2024-05-23 at 3.02.58 PM

  • By sorting by MFA risk from high to low, you are given an immediate list of the top outlier sites with MFA risk. If you are concerned with the source coming from either social or paid traffic, these columns would be helpful to sort by as well. With the domains that meet upper quantile performance, a user can decide to block that site or the publisher altogether. Additionally, a user can leverage this data to work with a supply source and improve areas such as omitting certain sources of traffic.
  • If you're concerned with user experience and how a web page is operating its ad placements, a user can sort by Ad Density and Ad Refresh Rate. By focusing on the worst offenders, you can take this data to sellers and/or publishers to work on either decreasing the ad placement activity or blocking the site due to continued poor user experience. If there is an ad refresh limit in place based on the partnership, then this data can be used for potential clawbacks as well. 

Filter by MFA Dimensions/Metrics & Adding Other Metrics

Screen Shot 2024-05-23 at 3.15.34 PM

Screen Shot 2024-05-23 at 3.24.19 PM

Screen Shot 2024-05-23 at 3.27.44 PM

  • By layering different MFA related dimensions and metrics, a user can create a custom allow or block list based on the thresholds input. This can allow for a more nuanced method of blocking based on post bid data. Note, without touching any IVT related metrics/dimensions, the score increased as scope was tightened to medium MFA risk and ad density of greater than 3. Pixalate's 2024 research shows there's a 23% higher risk of invalid traffic (IVT), including ad fraud, on MFA websites compared to non-MFA websites.
  • Introducing specific fraud types can help identify overlap with MFA and fraudulent activity as well. For instance, if a site demonstrated high ad density and high ad refresh rate AND was also being flagged for display impression fraud, a buyer may infer that the two behaviors are possibly correlated. This will not always be the case, but in this situation, there's signals pointing to ad placement saturation and possibly background or non viewable ads, which warrant clawbacks. 
  • If you'd like to flip the view to the demand side to track how advertisers and campaigns are exposed to MFA sites, these dimensions can be added as well. This is helpful to monitoring performance at a more granular level for the buy side. In addition, reports can be saved and scheduled to keep different partnerships separate. On that note, if different buyers have varying thresholds for MFA risk, this can help to monitor different quality levels of inventory by demand preferences.  

Splice the Data by a Specific Publisher or Seller

Screen Shot 2024-05-23 at 3.32.17 PM

Screen Shot 2024-05-23 at 3.33.54 PM

  • By isolating a specific seller, this exposes an overall MFA health tied to that supply source. Instead of blocking altogether, a user can reference this post bid data to make note of sites that do not meet expectations when considering MFA. With the exported report, you can claim which sites are in the high performing range for MFA risk and deem which impressions are billable vs not. By referencing specific data points, such as an ad refresh rate of 48, this will help bolster an argument for why this traffic is devalued.
  • Publishers can own/create a wide array of sites and that number is growing every day, which makes monitoring a tricky situation. Based on Q1 2024 data, one root domain (iwastesomuchmoney.com) was linked to 771,742 unique urls. Being able parse out all the data can be cumbersome but by adding in pub ID, a user can evaluate all inventory under a given publisher. If there's a direct partnership in place, a user can reference the data to no longer buy on certain sites or block the publisher altogether if the majority of inventory is high MFA risk. This can also act as a decision making tool when comparing two publishers or even sellers for that matter. By tracking performance side by side, you can repurpose spend with publishers that align with quality expectations in place. 

Mobile App and CTV Data Sets
For the majority of time that MFA inventory has been discussed, this has always been framed around websites specifically. Pixalate has found similar MFA characteristics when it comes to certain mobile and CTV apps, promoted through paid traffic and often posting a high number ads per video session. Per Q1 2024 MFA Reporting, there was an estimated $5M ad spend on MFA Mobile apps with open programmatic advertising. That number increases significantly when focusing on CTV, jumping to $64M. It's evident that there is an MFA impact solely outside of websites.
View the MFA Mobile and CTV Apps Report 

Screen Shot 2024-05-23 at 4.01.15 PM

Screen Shot 2024-05-23 at 4.01.59 PM

Screen Shot 2024-05-23 at 4.02.35 PM

Screen Shot 2024-05-23 at 4.02.27 PM

  • Currently, the two exposed MFA data points are MFA risk and ad refresh rate. This allows for partitioning data to focus on the worst offenders, create custom allow or block lists and also request clawbacks. Similar to websites, these reports can also be spliced to include seller, publisher, campaign, etc. to find the right level of performance based on each partnership in place. 
  • IVT% and fraud types can act as additional layers for ensuring performance falls in line with expectations. Just like the example with display impression fraud, it's possible that an app marked for high MFA risk, may also exhibit additional suspicious characteristics. Beyond requesting non payment, there can be additional measures taken on the pre-bid side if a user wishes to continue doing business with a supplier. This would involve one or multiple of Pixalate's data feeds to weed out IVT flagged impressions at the user, device and IP level. 
  • While the MFA risk and ad refresh rate are exposed within the dashboard, Pixalate takes into account other signals, such as app age, IVT%, Pixalate derived popularity score and the total number of app reviews. For those apps marked as high MFA risk, they again would need to perform as an outlier for one or multiple of these categories. 

Key Benefits of Pixalate’s MFA Analytics Dashboard Report

  • Understand exposure based on actual traffic: The report provides insights into your specific traffic and associated exposure from MFA websites.
  • Filter by MFA Risk level: The report filters can be used to view by specific risk level (low/high/medium).
  • Granular insights with MFA factors: The dimensions or MFA filters can be used to view traffic by the various MFA factors (ad density, ad refresh rate, etc) that are a part of Pixalate’s MFA detection methodology.
  • Reduce SOV tied to MFA inventory: By utilizing the data and flagging for supply partners, the MFA impact can be reduced while wasted spend also goes down. At the same time, demand partners and advertisers are please with more premium and brand suitable sites/apps.

How can I block MFA traffic?

Pixalate's MFA data feeds can be used to block traffic on websites, mobile apps, or CTV apps deemed to be high or medium for MFA Risk. For more information, please visit the knowledge base article.

Where can I learn about MFA, Pixalate's MFA detection methodology, and products?

For more information, please visit Pixalate's Made For Advertising Solutions knowledge base articles.