How to Block Referral Spam from Google Analytics Reports?


Issue: How to Block Referral Spam from Google Analytics Reports?

I have a suspicion that is not a reliable URL. It seems to be attracting visitors to visit my site as there are several hundred of new visitors from this domain shown on Google Analytics reports, but I don‘t know anything about this URL. Tried visiting it, but the URL redirects to other sites, but not Have you heard something about it?

Solved Answer

Google Analytics is a website management assistant, which provides information about web traffic generated, new visitors’ rate, the period spent on the site, domains that attracted visitors, and much more. Therefore, website owners and managers are using this tool on a daily basis. However, recent activities recorded on the Google Analytics prompt us to warn people that the stats provided on GA should not be trusted in every way. Nowadays, Google Analytics users often get surprised when they discover a huge traffic from referral domain. Usually, the indexes are very high, for example, counting hundred of new visitors. While an increased visitor‘s rate is an encouraging thing, it‘s advisable to check referral domains that exhibit outstanding indexes. That‘s because Google Analytics reports are often polluted by referral spam, which is a type of spam generated by computers using spamdexing techniques and targeting GA stats directly. It means that all indexes are fake and the indicated traffic can be referred to as ‚Ghost Traffic.‘

The figure standing behind such activity is Vitaly Popov, who have found a way to increase traffic to affiliate websites by injecting false results into Google Analytics reports thus attracting the attention of websites‘ owner/managers and making him/her search for the given URL. In a nutshell, is a referral spam, which pollutes Google Analytics stats and prompts people to visit the shady URL.

While referral spam is not malevolent (does not steal traffic, decrease website‘s rank on Google search results, etc.), having it listed on the Google Analytics reports is not useful either. It distorts the results and prevents the user of Google Analytics from evaluating the indexes of his/her website properly. Besides, fake URL may redirect to a doubtful third-party website, which may be involved in malware distribution or similar activities. It has been found that such domains may contain malicious codes, so visiting referrer might lead to serious issues. Luckily, referral spam can be blocked quite easily, so if you have found URL on your Google Analytics stats, do not wait long and perform the three steps given below:

How to Block Referral Spam from Google Analytics Reports?

Optimize now! Optimize now!
To restore your computer's peak performance, you have to purchase licensed version of Fortect Mac Washing Machine X9 repair software.

Step 1. Change Filter Pattern

  1. Select Admin -> All Filters. Later on, enter New Filter and type in the Filter Name box.
  2. Choose Custom Filter Type, then choose Campaign Source from the drop-down Filter Field menu.
  3. Lastly, in the Filter Pattern field, type and click Save.

Step 2. Change HTTP settings

  1. Sign into cPanel account, navigate to File Manager section and click on the checkbox called Document Root for -> your website.
  2. Click on Show Hidden Files and then Go. Once you locate the .htacess file, right-click on it and select Code Edit. Enter the following text ant click Save Changes.

RewriteCond %{HTTP_REFERER}
RewriteCond %{HTTP_REFERER}
RewriteRule .* – [F]

Step 3. Modify Language filter

  1. In your Analytics account, navigate to Admin Tab.
  2. Click VIEW, select Filters and then click +Add Filter.
  3. In the Filter Name box, type: Language Spam.
  4. In the Filter Pattern box, type in: \s[^\s]*\s|.{15,}|\.|,
  5. Click on Verify this Filter and save the changes.

Optimize your system and make it work more efficiently

Optimize your system now! If you don't want to inspect your computer manually and struggle with trying to find issues that are slowing it down, you can use optimization software listed below. All these solutions have been tested by team to be sure that they help improve the system. To optimize your computer with only one click, select one of these tools:

do it now!
computer optimizer Happiness
do it now!
computer optimizer Happiness
Compatible with Microsoft Windows Compatible with OS X
Your problem remained?
If you are not satisfied with Fortect and think that it failed to improve your computer, feel free to contact us! Please, give us all details related to your issue.
Fortect - a patented specialized Windows repair program. It will diagnose your damaged PC. It will scan all System Files, DLLs and Registry Keys that have been damaged by security threats.Mac Washing Machine X9 - a patented specialized Mac OS X repair program. It will diagnose your damaged computer. It will scan all System Files and Registry Keys that have been damaged by security threats.
This patented repair process uses a database of 25 million components that can replace any damaged or missing file on user's computer.
To repair damaged system, you have to purchase the licensed version of Fortect malware removal tool.To repair damaged system, you have to purchase the licensed version of Mac Washing Machine X9 malware removal tool.

Access geo-restricted video content with a VPN

Private Internet Access is a VPN that can prevent your Internet Service Provider, the government, and third-parties from tracking your online and allow you to stay completely anonymous. The software provides dedicated servers for torrenting and streaming, ensuring optimal performance and not slowing you down. You can also bypass geo-restrictions and view such services as Netflix, BBC, Disney+, and other popular streaming services without limitations, regardless of where you are.

Don’t pay ransomware authors – use alternative data recovery options

Malware attacks, particularly ransomware, are by far the biggest danger to your pictures, videos, work, or school files. Since cybercriminals use a robust encryption algorithm to lock data, it can no longer be used until a ransom in bitcoin is paid. Instead of paying hackers, you should first try to use alternative recovery methods that could help you to retrieve at least some portion of the lost data. Otherwise, you could also lose your money, along with the files. One of the best tools that could restore at least some of the encrypted files –  Data Recovery Pro.

About the author
Julie Splinters - Computer optimization specialist

When it comes to computer optimization, Julie Splinters is the expert. Whether it is a slow smartphone, Windows, Mac or Linux operating system, she will find a solution within minutes.

Contact Julie Splinters
About the company Esolutions

What you can add more about the problem: "How to Block Referral Spam from Google Analytics Reports?"