If you are interested in determining how cookies were set without human interaction, I/O Labs records the full backtrace so you can get a better understanding of how it happened. This log shows a domain (lose34pounds.com) cookie-stuffing users by presenting them with an eBay affiliate link, and then having a JavaScript function that "clicks" the link 4 seconds after the page loads.
You can see from the backtrace that visitors are forced to click an eBayListing.php URL 4 seconds after the page loads. This "click" was initiated by a script embedded within the page source. The backtrace will even tell you that the click happened within a function called myTimer, that starts on line 25 of the page source.
Looking at the page source, you can see that the I/O Labs backtrace is exactly correct:
What's your use case?
Example: Amazon does not use a tracking cookie, however we can see clicks happening by analyzing our spider's backtrace to see if an Amazon click-tracking URL was fetched.
Has our spider seen your click-tracking cookie?
Example: A new ad platform wants to see which sites currently use Taboola. Additionally, you are able to see which websites have used Taboola in the past, but no longer do.
Locate anything by cookie or JavaScript object.
Example: A commerical forum vendor, vBulletin wants to know all the sites using vBulletin so they can compare it against their licensed customers.
Example: WebTrends wants to see all the domains that have the WebTrends analytics system installed and in-use.
Locate anything by cookie or JavaScript object.