Nine days later, and DFP (Google is still blocking A-Ads for malvertisements). See notice:
Our system has disabled this creative because it detected suspicious malware-related activity, which may include viruses, trojans, suspicious URLs, and/or fake .gif or .swf (Flash) files found to contain malicious code. You will not be able to re-enable this creative until it is automatically cleared by our system. Please follow up with the third party that supplied you with the infected creative. Once the creative is found to be clean, we will send you another email letting you know that you can safely re-enable the creative. For more information visit
http://www.anti-malvertising.com/.
Checking ads once, upon placement does nothing to filter malware if the ads have javascript, Flash or iframes.
As owner/manager of A-Ads, I think you are being a bit cavalier about this issue. Google, and others, will block (or warn rather, with a huge red pre-entry page that this domain is full of malware - you've all seen them) your ENTIRE domain when it catches these ads being displayed - they did it to me and I lost approximately 3 days of traffic. And don't forget DFP (Doubleclick for Publishers) IS Google - their data is shared with all Google properties.
This also has nothing to do with the destination URL of the ad, of course you can't control that. This is malware IN the ads themselves coming from your network, and harming the publisher's site reputation.
You should be reaching out to DFP, Google el al, and working on this problem as most other ad networks have discovered they must do. At his point, YOUR entire ad network/domain (A-Ads) is starting to populate lists of known malware providers/distributors.
Okay, at this point, you can tell me to just not use A-Ads. Sure, but where does that leave your business in the near future? A business, I've said before, I like and want to contribute traffic. You've got to get a handle on this and take it seriously.