VERY Interesting Results After Spending $9498.14 on Facebook Ads Data [2019]

I’ve spent over $9400 dollars on Facebook Paid Ads. Here are some notes that answer many, many questions you and people might have in regards to what happens IF. What happens WHEN. I’ve done the work, invested my own cash, money (no credit card, no loan, not agency money) to get the answers.

I feel like MYTHBUSTERS. Confirmed, Plausible, or a Myth.

By the way, a few ‘smartiepants’ love to say “OH you need at least 25, 50 conversions to be able to really tell if an adset is a winner or loser.”

That is utter BULLOCKS. (I love that Old-English word btw)

In my 6 years of buying paid ads, every single time when I had a winner, it was a winner from day one -and all my affiliate friends that run campaigns will confirm this. Don’t listen to fake fake gurus that don’t run any campaigns just say they do. DATA doesn’t lie. Here are the screenshots, and below you will find what the data says.

-Purchase LLA’s
-AddtoCart LLA’s
-Watched 95% of video LLA’s
-Targeting Kws
-Targeting Broad + Engaged Shoppers

Ecom Product

1. Lowest CPA was acquired when we used AUTO BID, and not bidding high as fuck with offer payout x3 target CPA.
2. CPM was lowest when the audience was the biggest (3 million or more)
3. Having the cheapest CPM had zero to do with getting the lowest CPA 
4. Going super broad (entire usa, 40+ F) with product related keywords and breaking it down by device brand (iphone, android, etc) got the lowest CPA
5. The average video watch time was NOT the highest for the top 3 best converting ads sets with lowest CPA (28s,22,28s) 
6. The average video watch time with the worst adsets were (25s,22s,27s)

Therefore there’s no coorelation that avg watch time has anything to do with more conversions.

7. Cost per 3 seconds video view for the top 3 best adsets with lowest cpa – 9c,10c,7c
8. Cost per 3 second video view for the worst 3 adsets with highest cpa – 5c,7c,6c

The cost of video views was lower on the lower performing adsets.

9. CTR (ALL) was 8.5% or better for the top performers vs below that for the worst performers.

10. Out of the $9000+ spent, only 350$ was spent during the time the target audience was most likely sleeping. And it rendered one conversion at a super low CPA of $7. Impressions were very few in between, but interestingly enough CTR jumped 20-40% during the night on average.

11. Post Comments/Shares counts were inconclusive as the top 3 performers, and the worst 3 performers got very similar ammount of post shares/likes.

12. Age groups, it seems like they are truly random.

13. Best method was targeting keywords, followed by 1% LLA of profits/video views.

PS: I have also attached screenshot showing how bidding 3x,4x,5x etc offer payout will mean you’r going to pay very high CPA whereas if you use Auto get the lowest price per conversion full get the lowest CPA — i ran a LOT of data for 3 days didn’t just do a $5 test as you can see

How to Manually Upload Conversions to ZeroPark [Quick Tutorial]

If you made a mistake setting up the S2S postback to Zeropark for your PUSH, POPS or Redirect campaigns and the conversions you got on your tracker don’t show up then here’s a quick step by step guide on how you can get them manually sent over to ZP so they appear in the interface.

  1. Copy your Postback URL to any spreadsheet (e.g. Excel, Google Sheets). It can be found in any campaign creation form, under ā€˜Convertion trackingā€™. This URL is for your whole account, it is not campaign specific.

2. Take the list of CIDs that have converted and add it at the end of your Postback URL (Postback URL + CID values)

3. Use any site, browser extension or script that will hit each postback links.

Website e.g.

When the link is opened, you should receive ā€˜okā€™ message that a postback went through.

Did you know your password could’ve been stolen?

I’ve been doing some digging using a ‘different’ angle to uncover some new ideas for some marketing campaigns.

In the process I stumbled on some security sites where they talk about online security. One of these blogs shared a very interesting theory on how Jeff Bezos dick picks got into the hands of the National Enquirer that tried to use their bargaining chip to extort him for financial gain. Well, in case you didn’t hear the story – The Amazon Founder fought back by exposing his dick pics himself in a blog post he published on Medium titled “No thank you, Mr. Pecker“; now the idiots at National Enquirer look really bad. WHAT A GUY!

This fiasco did one thing; it exposed how UNSAFE the internet is and the blog I found explains a theory that the hackers who stole the pictures might have very well used to gain their hands on it.

How many times did you use the exact same password on multiple websites, forums, services, tools, etc AND the same email? Chances are it’s pretty high right?

Most people make this mistake, me included. And this was a big ass awakening for me to abandon that lazy practice.

Want to check if you’ve been compromised and where/how/when? Check out the site called HAVE I BEEN PWNED

Jesus, my email was stolen on 10 separate data breaches and sold on the dark net! SCARY!

so did you check if you were pWNED? What was the result? How many sites have your data?

As you can see, mine is pretty brutal. I’ve been using a program called LastPass for ever and generate a different password for every single site I register on. When I started out 10 years ago, this tool wasn’t around – luckily even though they stole my data, I’m ok as I regularly get prompted to change passwords.

Anyway, back to the story. So the data security guy whose blog I was reading said that they probably didn’t hack Jeff himself, because he’s super wealthy and heavily protected. What they did instead was hack the accounts of his secret love affair. The hackers could have used a site to find all/related emails of this woman, and then look up in the stolen database archives her many emails and see if the passwords she used there would work on current services (as many people use the same password for their icloud, like they use for their favorite forum, and so on).

Very interesting to say the least; I am super glad I read this article and now advised my wife and friends (you guys included) to take care of yourself by being security smart.