{"id":300712,"date":"2017-04-25T04:00:00","date_gmt":"2017-04-25T04:00:00","guid":{"rendered":"https:\/\/integralads.com\/insider\/ad-fraud-glossary\/"},"modified":"2025-05-18T17:54:29","modified_gmt":"2025-05-18T17:54:29","slug":"ad-fraud-glossary","status":"publish","type":"post","link":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/","title":{"rendered":"Ad fraud glossary"},"content":{"rendered":"<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Ad fraud is any deliberate activity that prevents the proper delivery of ads to the right people at the right time, in the right place. Most often, ad fraud refers to certain kinds of traffic. From ad injection to traffic sourcing, here&#8217;s your glossary of key ad fraud terms. For more on ad fraud, check out our guide.<\/span><\/span><\/span><\/span><\/p>\n<p><strong>Ad injection<\/strong><br \/>\nInserting ads into an app, web page, etc., without the consent of the publisher or operator of that resource. The ad can be visible or hidden.<\/p>\n<p><strong>Ad stacking<\/strong><br \/>\nPlacing multiple ads on top of each other in a single placement, with only the top ad being viewable. This is a form of impression fraud because the advertiser is paying for impressions even if the end user is not seeing an ad.<\/p>\n<p><strong>Adware traffic\/ad injection<\/strong><br \/>\nA device where a user is present and additional HTML or ad requests are made by the adware independently of the content being requested by the user. Adware may also contain a function to inject an ad from the software onto a web page as the user browses, rather than the ad being delivered by the publisher of the web page.<\/p>\n<p><strong>Auto-refresh<\/strong><br \/>\nA page ad unit enabled to request a new rendered asset more than once and at periodic intervals.<\/p>\n<p><strong>Blacklisting<\/strong><br \/>\nUsing lists of known bad IPs, domains, or other parameters to prevent the serving of ads matching those parameters.<\/p>\n<p><strong>Bot<\/strong><br \/>\nShort for robot; refers to a software program that carries out automated tasks on the Internet. There are good bots and bad bots. They may intentionally or unintentionally view ads, watch videos, click on ads, etc. For more on bots, check out these resources.<\/p>\n<p><strong>Bot detection<\/strong><br \/>\nThe detection and differentiation of bot traffic and bot impressions from human traffic and human impressions.<\/p>\n<p><strong>Bot prevention<\/strong><br \/>\nThe prevention of bot traffic and bot impressions before the inventory is bought or sold.<\/p>\n<p><strong>Bot traffic<\/strong><br \/>\nNonhuman traffic designed to mimic users and inflate audience numbers.<\/p>\n<p><strong>Botnet<\/strong><br \/>\nA group of computers taken over by software.<\/p>\n<p><strong>Browser pre-rendering<\/strong><br \/>\nA device makes HTML or ad requests prior to expected human-initiated navigation to the requested resources.<\/p>\n<p><strong>Cookie stuffing<\/strong><br \/>\nA client is provided with cookies from other domains as if the user had visited those.<\/p>\n<p><strong>Datacenter traffic<\/strong><br \/>\nTraffic originating from servers in datacenters, rather than residential or corporate networks. Typically, no end user is present, though proxy servers or other technologies may result in traffic appearing to originate from datacenters while still being delivered to human users.<\/p>\n<p><strong>Domain spoofing<\/strong><br \/>\nHTML or an ad request that attempts to represent a site, device, etc., other than the actual placement. This tricks advertisers and ad exchanges into thinking the inventory is legitimate. This is also called <i>domain laundering<\/i>.<\/p>\n<p><strong>Hidden ad impressions<\/strong><br \/>\nImpressions that are not actually seen by people because they are hidden behind other ads or website content (as in ad stacking), displayed in tiny iframes (pixel stuffing), or otherwise served in a way that prevents real ad views.<\/p>\n<p><strong>Hijacked device<\/strong><br \/>\nA user\u2019s device (browser, phone, app) is modified to request HTML or make ad requests that are not under the control of a user and made without the user\u2019s consent.<\/p>\n<p><strong>Incentivised browsing<\/strong><br \/>\nA human user may be offered payment or benefits to view or interact with ads or generate traffic on ad-supported sites.<\/p>\n<p><strong>Invalid Traffic (IVT)<\/strong><br \/>\nAlso referred to as <i>Nonhuman Traffic (NHT) <\/i>or <i>Suspicious Activity Detection (SAD)<\/i>, it is online traffic generated from machines or other bot activity that interacts with digital ads.<\/p>\n<p style=\"padding-left: 30px;\"><b>General Invalid Traffic (GIVT) <\/b><br \/>\nTraffic that comes from known, nonhuman sources on publicly available IP lists. It can be identified through routine means of filtration. Key examples include datacenter traffic; bots and spiders or other crawlers masquerading as legitimate users; non-browser user-agent headers; hidden, stacked, covered, or otherwise unviewable ads; pre-fetch or browser pre-rendering traffic; and invalid proxy traffic.<\/p>\n<p style=\"padding-left: 30px;\"><b>Sophisticated Invalid Traffic (SIVT) <\/b><br \/>\nNonhuman traffic that is more difficult to detect, and requires advanced analytics, multipoint corroboration\/coordination, or significant human intervention to analyze and identify. Key examples include hijacked devices, hijacked tags, adware, malware, incentivized browsing, misappropriated content (if applicable), falsified viewable impression decisions, and cookie stuffing.<\/p>\n<p><strong>Pixel stuffing<\/strong><br \/>\nThe process of serving one or multiple ads in a single 1X1 pixel frame, so that the ad can\u2019t be seen.<\/p>\n<p><strong>Proxy traffic<\/strong><br \/>\nTraffic is routed through an intermediary proxy device or network where the ad is rendered in a user\u2019s device where there is a real human user.<\/p>\n<p><strong>Retargeting fraud<\/strong><br \/>\nBots mimic a human\u2019s intentions, such as an interest in a specific brand, in order to warrant the higher CPM typically associated with retargeting. Advertisers are deceived into believing they are receiving valuable, targeted audiences.<\/p>\n<p><strong>Sophisticated bot<\/strong><br \/>\nA bot not listed in the industry bots and spider list and known browser list.<\/p>\n<p><strong>Traffic sourcing\/Sourced traffic<\/strong><br \/>\nAny method by which publishers acquire more visitors through third parties.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all know ad fraud is a problem, but it\u2019s not always clear what exactly fraud is, how it works, and how we can eliminate it from the digital ecosystem. From ad injection to traffic sourcing, here&#8217;s your glossary of key ad fraud terms.<\/p>\n","protected":false},"author":1,"featured_media":297164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[295,279],"tags":[],"class_list":["post-300712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ad-fraud-uk","category-guides-uk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ad fraud glossary - Integral Ad Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ad fraud glossary\" \/>\n<meta property=\"og:description\" content=\"We all know ad fraud is a problem, but it\u2019s not always clear what exactly fraud is, how it works, and how we can eliminate it from the digital ecosystem. From ad injection to traffic sourcing, here&#039;s your glossary of key ad fraud terms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\" \/>\n<meta property=\"og:site_name\" content=\"Integral Ad Science\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-25T04:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-18T17:54:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IAS TEAM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@integralads\" \/>\n<meta name=\"twitter:site\" content=\"@integralads\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IAS TEAM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\"},\"author\":{\"name\":\"IAS TEAM\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/person\/dbee79df007713b5bab3127e3f349399\"},\"headline\":\"Ad fraud glossary\",\"datePublished\":\"2017-04-25T04:00:00+00:00\",\"dateModified\":\"2025-05-18T17:54:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\/\/integralads.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg\",\"articleSection\":[\"Ad Fraud\",\"Guides\"],\"inLanguage\":\"en-gb\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\",\"url\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\",\"name\":\"Ad fraud glossary - Integral Ad Science\",\"isPartOf\":{\"@id\":\"https:\/\/integralads.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg\",\"datePublished\":\"2017-04-25T04:00:00+00:00\",\"dateModified\":\"2025-05-18T17:54:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#breadcrumb\"},\"inLanguage\":\"en-gb\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-gb\",\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage\",\"url\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg\",\"contentUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg\",\"width\":760,\"height\":760},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/integralads.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ad fraud glossary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/integralads.com\/#website\",\"url\":\"https:\/\/integralads.com\/\",\"name\":\"Integral Ad Science\",\"description\":\"The Hidden Cost of MFA Webinar\",\"publisher\":{\"@id\":\"https:\/\/integralads.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/integralads.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-gb\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/integralads.com\/#organization\",\"name\":\"Integral Ad Science\",\"url\":\"https:\/\/integralads.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-gb\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png\",\"contentUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png\",\"width\":600,\"height\":600,\"caption\":\"Integral Ad Science\"},\"image\":{\"@id\":\"https:\/\/integralads.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/integralads\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/person\/dbee79df007713b5bab3127e3f349399\",\"name\":\"IAS TEAM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-gb\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/255e04bda9c08f76d15834db86e6d973bed5d92c701c65e4e3781e74f8b79551?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/255e04bda9c08f76d15834db86e6d973bed5d92c701c65e4e3781e74f8b79551?s=96&d=mm&r=g\",\"caption\":\"IAS TEAM\"},\"description\":\"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.\",\"sameAs\":[\"https:\/\/integralads.com\"],\"jobTitle\":\"TEST\",\"url\":\"https:\/\/integralads.com\/uk\/insider\/author\/ias2023\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ad fraud glossary - Integral Ad Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/","og_locale":"en_US","og_type":"article","og_title":"Ad fraud glossary","og_description":"We all know ad fraud is a problem, but it\u2019s not always clear what exactly fraud is, how it works, and how we can eliminate it from the digital ecosystem. From ad injection to traffic sourcing, here's your glossary of key ad fraud terms.","og_url":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/","og_site_name":"Integral Ad Science","article_published_time":"2017-04-25T04:00:00+00:00","article_modified_time":"2025-05-18T17:54:29+00:00","og_image":[{"width":760,"height":760,"url":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg","type":"image\/jpeg"}],"author":"IAS TEAM","twitter_card":"summary_large_image","twitter_creator":"@integralads","twitter_site":"@integralads","twitter_misc":{"Written by":"IAS TEAM","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#article","isPartOf":{"@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/"},"author":{"name":"IAS TEAM","@id":"https:\/\/integralads.com\/#\/schema\/person\/dbee79df007713b5bab3127e3f349399"},"headline":"Ad fraud glossary","datePublished":"2017-04-25T04:00:00+00:00","dateModified":"2025-05-18T17:54:29+00:00","mainEntityOfPage":{"@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/"},"wordCount":816,"publisher":{"@id":"https:\/\/integralads.com\/#organization"},"image":{"@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage"},"thumbnailUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg","articleSection":["Ad Fraud","Guides"],"inLanguage":"en-gb"},{"@type":"WebPage","@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/","url":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/","name":"Ad fraud glossary - Integral Ad Science","isPartOf":{"@id":"https:\/\/integralads.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage"},"image":{"@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage"},"thumbnailUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg","datePublished":"2017-04-25T04:00:00+00:00","dateModified":"2025-05-18T17:54:29+00:00","breadcrumb":{"@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#breadcrumb"},"inLanguage":"en-gb","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/"]}]},{"@type":"ImageObject","inLanguage":"en-gb","@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#primaryimage","url":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg","contentUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/06\/surveillance-camera-1-760-760-2.jpg","width":760,"height":760},{"@type":"BreadcrumbList","@id":"https:\/\/integralads.com\/uk\/insider\/ad-fraud-glossary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integralads.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Ad fraud glossary"}]},{"@type":"WebSite","@id":"https:\/\/integralads.com\/#website","url":"https:\/\/integralads.com\/","name":"Integral Ad Science","description":"The Hidden Cost of MFA Webinar","publisher":{"@id":"https:\/\/integralads.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integralads.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-gb"},{"@type":"Organization","@id":"https:\/\/integralads.com\/#organization","name":"Integral Ad Science","url":"https:\/\/integralads.com\/","logo":{"@type":"ImageObject","inLanguage":"en-gb","@id":"https:\/\/integralads.com\/#\/schema\/logo\/image\/","url":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png","contentUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png","width":600,"height":600,"caption":"Integral Ad Science"},"image":{"@id":"https:\/\/integralads.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/integralads"]},{"@type":"Person","@id":"https:\/\/integralads.com\/#\/schema\/person\/dbee79df007713b5bab3127e3f349399","name":"IAS TEAM","image":{"@type":"ImageObject","inLanguage":"en-gb","@id":"https:\/\/integralads.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/255e04bda9c08f76d15834db86e6d973bed5d92c701c65e4e3781e74f8b79551?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/255e04bda9c08f76d15834db86e6d973bed5d92c701c65e4e3781e74f8b79551?s=96&d=mm&r=g","caption":"IAS TEAM"},"description":"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.","sameAs":["https:\/\/integralads.com"],"jobTitle":"TEST","url":"https:\/\/integralads.com\/uk\/insider\/author\/ias2023\/"}]}},"_links":{"self":[{"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/posts\/300712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/comments?post=300712"}],"version-history":[{"count":0,"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/posts\/300712\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/media\/297164"}],"wp:attachment":[{"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/media?parent=300712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/categories?post=300712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integralads.com\/uk\/wp-json\/wp\/v2\/tags?post=300712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}