{"id":95,"date":"2021-11-16T09:53:00","date_gmt":"2021-11-16T09:53:00","guid":{"rendered":"https:\/\/adex.com\/?p=95"},"modified":"2026-04-22T17:38:49","modified_gmt":"2026-04-22T17:38:49","slug":"what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists","status":"publish","type":"post","link":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/","title":{"rendered":"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists?"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>It seems that fighting fraud by whatever means necessary is the right thing to do. While it\u2019s no secret that certain means are better than the others, did you know that some of them might be rather harmful than useful, namely when you use them as a stand-alone solution? That\u2019s true, and IP blacklisting is as tricky as that.<\/p>\n<\/blockquote>\n\n\n\n<p>The usage of IP address blocking as a single anti-fraud technique is associated with hidden risks. As an advertiser, you should be aware of them, so let\u2019s figure out what&#8217;s what.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-an-ip-address\"><strong>What is an IP address?&nbsp;<\/strong><\/h3>\n\n\n\n<p>As a rule, IP addresses are assigned to devices by the Internet providers automatically once they connect to the web. The first step is device connection to the local network and then it reaches the global network with the help of an Internet service provider. In general, we can divide them into the following categories:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Private\u00a0<\/strong>\u2013 personal IP addresses assigned to certain devices.<\/li>\n\n\n\n<li><strong>Public\u00a0<\/strong>\u2013 IP addresses assigned to networks, like homes, workspaces, and public places.<\/li>\n\n\n\n<li><strong>Static\u00a0<\/strong>\u2013 public IP addresses that change per request only.<\/li>\n\n\n\n<li><strong>Dynamic\u00a0<\/strong>\u2013 also public IP addresses that change automatically from time to time when the network needs that.<\/li>\n<\/ul>\n\n\n\n<p>Why are IP addresses necessary? Well, they are an integral part of the way the Internet works. The worldwide web needs to distinguish between devices and networks to ensure that each device can receive and send information accurately.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"and-what-is-ip-blacklisting\"><strong>And what is IP blacklisting?<\/strong><\/h3>\n\n\n\n<p>As you can understand from the name, IP blacklisting is all about\u2026 IP blacklisting. This is the anti-fraud strategy aimed at blocking particular IP addresses from getting access to your website or network.&nbsp;<\/p>\n\n\n\n<p>To be honest, this security method is known as a pretty ancient one \u2013 it was used against massive DDoS (Distributed Denial of Service) attacks some time ago. IP blacklisting allows you to stop the attack by blocking the server that sends harmful traffic to your website.&nbsp;<\/p>\n\n\n\n<p>After blacklisting, the requests from an IP address will be denied and device users won\u2019t be able to visit your network.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"why-is-ip-blocking-not-the-best-anti-fraud-solution\"><strong>Why is IP blocking not the best anti-fraud solution?&nbsp;<\/strong><\/h3>\n\n\n\n<p>The main problem with IP blocking is the risk of tossing the baby out with the bathwater. The method is not all that bad, but using it as the main or even single solution is not the best idea.&nbsp;<br>We have a quote of our&nbsp;<strong>Head of Project<\/strong>,&nbsp;<strong>Andrey Ivanov<\/strong>, on this subject:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>In numerous countries there is a small number of IP addresses. Therefore, people use a network with a single outside IP address. This might be an entire district or even a town. In such a case, whenever you block an IP like that, you keep a lot of users in the black list.\u00a0<\/em><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>As you can see, IP blacklisting can lead to a negative result \u2013 you risk losing your potential clients in your own hand.\u00a0\u00a0<\/em><\/p>\n<\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"some-users-browse-with-their-vpns-on\"><strong>Some users browse with their VPNs on<\/strong><\/h4>\n\n\n\n<p>The modern world is concerned with digital security and anonymity. That is why, many regular Internet users prefer VPNs to stay safe and hide their IP addresses. The problem with IP blocking is that it doesn\u2019t actually analyze every user, but blocks him by a single parameter, which might be VPN usage. And this may end up sadly \u2013 you risk eliminating new visitors and potential leads.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"not-only-you-block-the-fraudsters\"><strong>Not only you block the fraudsters&nbsp;<\/strong><\/h4>\n\n\n\n<p>IP blocking strategy aims at excluding large chunks of addresses, namely \u2013 the entire public address that serves numerous devices connected to it. In case an ad fraudster is using the public IP address (be it a house, institution, or office), blocking him means excluding all the other devices relevant to that network.&nbsp;<\/p>\n\n\n\n<p>The outcome is the same as the one we discussed in the previous paragraph \u2013 trying to get rid of one cheater, you may also cut off numerous potential visitors and customers.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"ip-blocking-cannot-stop-experienced-criminals\"><strong>IP blocking cannot stop experienced criminals&nbsp;<\/strong><\/h4>\n\n\n\n<p>Another issue about IP blocking is that fraudsters are pretty sophisticated today. This tactic is known as somewhat outdated and it is not strong enough to deal with new fraud schemes. About thirty years ago, the strategy prevented massive attacks done from a single server or computer, but it is not so relevant today.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/adex.com\/blog\/tpost\/dbd70nitr1-what-does-the-future-of-ad-fraud-prevent\" target=\"_blank\" rel=\"noreferrer noopener\">Modern fraudsters<\/a>\u00a0use numerous devices, bot farms, and malware to organize the attacks. They have thousands of IP addresses at their disposal, so blacklisting them all is far from possible. You will run out of slots to exclude malicious traffic sources at some point, but a fraudster will still have a significant amount of IP addresses to use.\u00a0\u00a0\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"ip-addresses-can-be-spoofed-and-changed-easily\"><strong>IP addresses can be spoofed and changed easily&nbsp;<\/strong><\/h4>\n\n\n\n<p>Fraudsters can change the blocked IP addresses to avoid blacklists and continue terrorizing your website. In a word, they fake their identity and pretend to be legitimate users, bypassing the blocks.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-should-advertisers-do\"><strong>What should advertisers do?&nbsp;<\/strong><\/h3>\n\n\n\n<p>In general, IP blocking is not that bad, but it is not enough to protect your resource from fraudsters. And sometimes, using this strategy as a standalone solution can lead to poor and even confusing results.&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The main issue \u2013 IP blacklisting relies on limited information. Services that offer this type of anti-fraud solution tend to use third-party IP bases. After checking your traffic this way, service providers may conclude that you actually have a huge percentage of fraud, say, 50% or 60%. Why so? Because they don\u2019t have regard to details.\u00a0<\/p>\n<\/blockquote>\n\n\n\n<p>The verdict delivered by third-party IP bases grounds on\u00a0<a href=\"https:\/\/adex.com\/blog\/tpost\/bsabj1e9j1-in-built-fraud-trackers-do-they-provide\" target=\"_blank\" rel=\"noreferrer noopener\">narrow data<\/a>. For example, they perceive any VPN usage as fraud. As we have discussed earlier, this way you may toss numerous legitimate users overboard and lose valuable traffic.\u00a0<\/p>\n\n\n\n<p>To distinguish fraud smartly, one has to rely on numerous parameters to see if the actions belong to a real person or bot. ADEX believes that fraud detection and fighting must be scrupulous and precise.&nbsp;<\/p>\n\n\n\n<p>That is why, we strive to the highest accuracy level \u2013 our platform relies on&nbsp;<strong>45+ parameters<\/strong>&nbsp;to distinguish the browser properties and behaviour patterns of every single user. Choose ADEX as an in-depth solution to analyze your campaign performance on all the layers. This way, you will find and eliminate all dubious traffic sources and avoid any harm done to your budget.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The usage of IP address blocking as a single anti-fraud technique is associated with hidden risks. As an advertiser, you should be aware of them, so let\u2019s figure out what&#8217;s what.<\/p>\n","protected":false},"author":1,"featured_media":96,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-95","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current_risks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists? - ADEX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists? - ADEX\" \/>\n<meta property=\"og:description\" content=\"The usage of IP address blocking as a single anti-fraud technique is associated with hidden risks. As an advertiser, you should be aware of them, so let\u2019s figure out what&#039;s what.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/\" \/>\n<meta property=\"og:site_name\" content=\"ADEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adexsaas\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-16T09:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-22T17:38:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/Adex_IP_Blacklists.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@adexsaas\" \/>\n<meta name=\"twitter:site\" content=\"@adexsaas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/person\\\/6656430251ede436e24e1d7cea415d47\"},\"headline\":\"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists?\",\"datePublished\":\"2021-11-16T09:53:00+00:00\",\"dateModified\":\"2026-04-22T17:38:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/\"},\"wordCount\":1065,\"publisher\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Adex_IP_Blacklists.png\",\"articleSection\":[\"Current risks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/\",\"name\":\"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists? - ADEX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Adex_IP_Blacklists.png\",\"datePublished\":\"2021-11-16T09:53:00+00:00\",\"dateModified\":\"2026-04-22T17:38:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Adex_IP_Blacklists.png\",\"contentUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Adex_IP_Blacklists.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/adex.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/\",\"name\":\"ADEX - Ad Fraud & Invalid Traffic Prevention Platform\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#organization\"},\"alternateName\":\"ADEX\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adex.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#organization\",\"name\":\"ADEX - Ad Fraud & Invalid Traffic Prevention Platform\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/CDD2258_copy-48-1.svg\",\"contentUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/CDD2258_copy-48-1.svg\",\"width\":148,\"height\":30,\"caption\":\"ADEX - Ad Fraud & Invalid Traffic Prevention Platform\"},\"image\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adexsaas\\\/\",\"https:\\\/\\\/x.com\\\/adexsaas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/person\\\/6656430251ede436e24e1d7cea415d47\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/287cc094533349e9a15d72518e384a145a98fad1f9732127eb7387ef54f3c015?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/287cc094533349e9a15d72518e384a145a98fad1f9732127eb7387ef54f3c015?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/287cc094533349e9a15d72518e384a145a98fad1f9732127eb7387ef54f3c015?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/adex.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists? - ADEX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/","og_locale":"en_US","og_type":"article","og_title":"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists? - ADEX","og_description":"The usage of IP address blocking as a single anti-fraud technique is associated with hidden risks. As an advertiser, you should be aware of them, so let\u2019s figure out what's what.","og_url":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/","og_site_name":"ADEX","article_publisher":"https:\/\/www.facebook.com\/adexsaas\/","article_published_time":"2021-11-16T09:53:00+00:00","article_modified_time":"2026-04-22T17:38:49+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/Adex_IP_Blacklists.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@adexsaas","twitter_site":"@adexsaas","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#article","isPartOf":{"@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/"},"author":{"name":"admin","@id":"https:\/\/adex.com\/blog\/#\/schema\/person\/6656430251ede436e24e1d7cea415d47"},"headline":"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists?","datePublished":"2021-11-16T09:53:00+00:00","dateModified":"2026-04-22T17:38:49+00:00","mainEntityOfPage":{"@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/"},"wordCount":1065,"publisher":{"@id":"https:\/\/adex.com\/blog\/#organization"},"image":{"@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#primaryimage"},"thumbnailUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/Adex_IP_Blacklists.png","articleSection":["Current risks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/","url":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/","name":"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists? - ADEX","isPartOf":{"@id":"https:\/\/adex.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#primaryimage"},"image":{"@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#primaryimage"},"thumbnailUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/Adex_IP_Blacklists.png","datePublished":"2021-11-16T09:53:00+00:00","dateModified":"2026-04-22T17:38:49+00:00","breadcrumb":{"@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#primaryimage","url":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/Adex_IP_Blacklists.png","contentUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/Adex_IP_Blacklists.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/adex.com\/blog\/what-is-wrong-with-anti-fraud-tools-relying-only-on-ip-blacklists\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adex.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Wrong with Anti-Fraud Tools Relying Only on IP Blacklists?"}]},{"@type":"WebSite","@id":"https:\/\/adex.com\/blog\/#website","url":"https:\/\/adex.com\/blog\/","name":"ADEX - Ad Fraud & Invalid Traffic Prevention Platform","description":"","publisher":{"@id":"https:\/\/adex.com\/blog\/#organization"},"alternateName":"ADEX","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adex.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/adex.com\/blog\/#organization","name":"ADEX - Ad Fraud & Invalid Traffic Prevention Platform","url":"https:\/\/adex.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adex.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/CDD2258_copy-48-1.svg","contentUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/CDD2258_copy-48-1.svg","width":148,"height":30,"caption":"ADEX - Ad Fraud & Invalid Traffic Prevention Platform"},"image":{"@id":"https:\/\/adex.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/adexsaas\/","https:\/\/x.com\/adexsaas"]},{"@type":"Person","@id":"https:\/\/adex.com\/blog\/#\/schema\/person\/6656430251ede436e24e1d7cea415d47","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/287cc094533349e9a15d72518e384a145a98fad1f9732127eb7387ef54f3c015?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/287cc094533349e9a15d72518e384a145a98fad1f9732127eb7387ef54f3c015?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/287cc094533349e9a15d72518e384a145a98fad1f9732127eb7387ef54f3c015?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/adex.com"]}]}},"_links":{"self":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":1,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts\/95\/revisions"}],"predecessor-version":[{"id":5468,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts\/95\/revisions\/5468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/media\/96"}],"wp:attachment":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/media?parent=95"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/categories?post=95"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/tags?post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}