"Traps," as the name suggests, are instances of logic which analyse every click or impression which goes through Botman.
These traps are threat handlers - traps that handle high-level threat, medium-level threat, and low-level threat.
Once a trap identifies a certain threat, it can neutralise it or forward it for analysis. These settings are left to the customer. Having the concept of traps helps in being selective for the type of traffic which is being handled. There are some traps that must be enabled, and there are some which can be optional for the type of campaign which is running.
Some examples of traps are the following:
Data Center Trap - Identifies traffic from data centers
Botnet Trap - Identifies traffic from C&C botnets
1x1 Trap - Identifies traffic from invisible 1x1 source pixels
Non-viewable Trap - Identifies traffic from non-viewable sources
Click Flood Trap - Identifies click flood in campaigns
Emulators Trap - Identifies emulator and fake device traffic
Domain Spoof Trap - Identifies spoofed domain traffic
Pop Trap - Identifies pop traffic
Torrent Trap - Identifies torrent traffic
Malware Trap - Identifies malware-originated traffic
AdWare Trap - Identifies adware-originated traffic
Non-Brand Safe Trap - Identifies non-brand safe traffic
Proxy Trap - Identifies public P\proxy, TOR exit nodes traffic
Trojan Trap - Identifies Trojan, spam traffic, etc.
Having these traps enabled strengthens the analysis of campaign traffic and helps in decision making.