I want to know the full list of analytics and advertising tools that Analytics Proof can detect during a web compliance scan. Does it detect my CMP too?
I want to know the full list of analytics and advertising tools that Analytics Proof can detect during a web compliance scan. Does it detect my CMP too?
The web compliance scanner detects 19 analytics and advertising vendors by analyzing network requests and cookies. Here's the full list:
| Vendor | Detected Via |
|---|---|
| Google Analytics (GA4) | google-analytics.com requests, _ga/_gid cookies |
| Google Tag Manager | googletagmanager.com/gtm.js requests |
| Adobe Analytics | omtrdc.net, 2o7.net requests |
| Adobe Launch | assets.adobedtm.com requests |
| Matomo | matomo.php/piwik.php requests |
| Plausible | plausible.io/api/event requests |
| Fathom | cdn.usefathom.com requests |
| Vendor | Detected Via |
|---|---|
| Google Ads | googleadservices.com, googlesyndication.com requests |
| Meta Pixel | connect.facebook.net, facebook.com/tr requests, _fbp cookie |
| TikTok Pixel | analytics.tiktok.com requests, _ttp cookie |
| LinkedIn Insight | snap.licdn.com, px.ads.linkedin.com requests |
| Pinterest Tag | ct.pinterest.com requests |
| Seznam Sklik | c.seznam.cz requests |
| Criteo | dis.criteo.com requests |
| Heureka | im9.cz requests |
| Vendor | Detected Via |
|---|---|
| Microsoft Clarity | clarity.ms requests, _clck/_clsk cookies |
| Hotjar | script.hotjar.com requests, _hjid cookie |
| Exponea/Bloomreach | api.exponea.com requests |
| HubSpot | js.hs-analytics.net requests |
The scanner monitors all network requests and cookies during three phases:
Each detected vendor gets a compliance status:
The scanner also extracts vendor-specific property IDs (like GA4 measurement IDs, Meta Pixel IDs) so you can identify exactly which accounts are active.
For Android app scanning (Professional plan), the mobile scanner detects 46+ analytics SDKs including Firebase GA4, Adjust, AppsFlyer, Branch, Amplitude, Mixpanel, Meta SDK, Braze, Sentry, and many more. Mobile detection uses TLS SNI-based analysis for cert-pinned domains and HTTP-level traffic interception for others.