How to block referral spam on Google Analytics?

Issue: How can I block referral spam on Google Analytics? referral continuously shows up on the stats. Please help!

Solved Answer

Google Analytics referral spam is considered to be a relatively new phenomenon. However, after initiating a research on this type of spam, we have found out that some of the fake referrals have been circulating on Google Analytics reports since the end of the 2015. One of the first referral spam examples detected is Despite being an old-timer fake referral domain, fake URL has maintained its position and keeps polluting Google Analytics stats thus far. In general, referral spamming is also known as “Ghost Traffic” because it targets Google Analytics accounts directly, meaning that no real visitors have been landing on the website. For this purpose, spammers render Measurement Protocol or spamdexing technique, which injects bogus traffic indications, such as referrals, keywords, fake pages, bounce rate, duration, unique visitors, etc. to attract users’ attention. Therefore, if you have noticed that your website has been visited via in a very unusual way, for example, that the number of visitors from this fake referrer increased from zero to several hundred or more, it’s then clear that your Google Analytics account has become a victim of spammers. It has been noticed that referral spam is spread with a modified URL name, for instance, the name may include various word combinations including words like free, social, traffic, floating, button, and similar. Nevertheless, if the user of spammed Google Analytics account copies the name of this fake URL and enters it in the URL address, will open as a destination site.

Referral spam is not considered to be a crime as it does not affect the website or its position on Google search results. The spammers who spread fake URL seek to drive traffic to their website or affiliates. However, security experts warn that domain might not be safe to visit as its script may contain a malicious code, which may attract malware on your website. If the code gets inserted into the website, the hacker might get access to the victim’s social media account details, record usernames, passwords, and similar personal information. Thus, it’s very important NOT TO ADD SHARE BUTTON provided on referral spam domain. In case you have already visited this URL and doubt about the content that you’ve downloaded on it, initiate a full scan with a professional anti-malware. For this purpose, use FortectMac Washing Machine X9. Once done, sort out referral domain from your Google Analytics stats by performing the steps given below:

How to block referral spam from Google Analytics?

Step 1. Change Filter Pattern

  1. Go to Admin -> All Filters. Then go to New Filter and type in the Filter Name box.
  2. Select Custom Filter Type, then choose Campaign Source from the drop-down Filter Field menu.
  3. Eventually, in the Filter Pattern field, enter and click Save.

Step 2. Alter HTTP settings

  1. Sign in to cPanel account, navigate to File Manager section and click on the checkbox called Document Root for -> your website.
  2. Click on Show Hidden Files and click Go. Once you locate the .htacess file, right-click on it and choose Code Edit. Enter the following text ant click Save Changes.

RewriteCond %{HTTP_REFERER} [NC,OR]
RewriteCond %{HTTP_REFERER}
RewriteRule .* – [F]

Step 3. Modify Language filter

  1. In your Analytics account, go to Admin Tab.
  2. Click VIEW, select Filters and then hit +Add Filter.
  3. In the Filter Name box, type: Language Spam.
  4. In the Filter Pattern box, type in: \s[^\s]*\s|.{15,}|\.|,
  5. Click on Verify this Filter, then Save.

You can apply the same steps for any referral domains that look suspicious to you. Hopefully, you have successfully terminated spam from your Google Account and now can see a clear stats.

Optimize your system and make it work more efficiently

Optimize your system now! If you don't want to inspect your computer manually and struggle with trying to find issues that are slowing it down, you can use optimization software listed below. All these solutions have been tested by team to be sure that they help improve the system. To optimize your computer with only one click, select one of these tools:

do it now!
computer optimizer Happiness
do it now!
computer optimizer Happiness
Compatible with Microsoft Windows Compatible with OS X
Your problem remained?
If you are not satisfied with FortectMac Washing Machine X9 and think that it failed to improve your computer, feel free to contact us! Please, give us all details related to your issue.
Fortect - a patented specialized Windows repair program. It will diagnose your damaged PC. It will scan all System Files, DLLs and Registry Keys that have been damaged by security threats.Mac Washing Machine X9 - a patented specialized Mac OS X repair program. It will diagnose your damaged computer. It will scan all System Files and Registry Keys that have been damaged by security threats.
This patented repair process uses a database of 25 million components that can replace any damaged or missing file on user's computer.
To repair damaged system, you have to purchase the licensed version of Fortect malware removal tool.To repair damaged system, you have to purchase the licensed version of Mac Washing Machine X9 malware removal tool.

Access geo-restricted video content with a VPN

Private Internet Access is a VPN that can prevent your Internet Service Provider, the government, and third-parties from tracking your online and allow you to stay completely anonymous. The software provides dedicated servers for torrenting and streaming, ensuring optimal performance and not slowing you down. You can also bypass geo-restrictions and view such services as Netflix, BBC, Disney+, and other popular streaming services without limitations, regardless of where you are.

Don’t pay ransomware authors – use alternative data recovery options

Malware attacks, particularly ransomware, are by far the biggest danger to your pictures, videos, work, or school files. Since cybercriminals use a robust encryption algorithm to lock data, it can no longer be used until a ransom in bitcoin is paid. Instead of paying hackers, you should first try to use alternative recovery methods that could help you to retrieve at least some portion of the lost data. Otherwise, you could also lose your money, along with the files. One of the best tools that could restore at least some of the encrypted files –  Data Recovery Pro.

About the author
Alice Woods
Alice Woods - Shares the knowledge about computer protection

Alice Woods is a security expert who specializes in cyber threat investigation and analysis. Her mission on Ugetfix - to share the knowledge and help users to protect their computers from malicious programs.

Contact Alice Woods
About the company Esolutions

What you can add more about the problem: "How to block referral spam on Google Analytics?"