A method of detecting fraudulent Internet traffic sent from a first web
site to a second web site including providing a first web site database
having a list of first web sites likely to send bad traffic, providing a
link to the second web site on the first web site, after an Internet user
having a web browser clicks on the link, transferring the Internet user
to an intermediate web site that gathers information from the Internet
user web browser; and determining if a validation request is required.