Learn how Biteg.xyz referral spam affects Google Analytics data
Biteg.xyz referral spam is a type of fake traffic that appears in your Google Analytics, which is also frequently identified as “ghost spam.” It doesn’t damage your website in any way but also doesn’t add anything useful because the website that is presented as referrer doesn’t actually drive traffic to your website. It is quite new and confusing way to attract traffic to websites that belong to an infamous spammer known as Vitaly Popov. He is a creator of such bogus sites such as ilovevitaly.com, o-o-8-o-o.com, lifehacĸer.com and Secret.ɢoogle.com. The spammer seems to be obsessed with the idea to smash Google’s popularity into pieces. The scammer has discovered a way to insert fake referral URLs into webmasters’ Google Analytics to make people think that certain website is driving traffic to their sites, while in reality, they do not deliver any additional traffic. The point of injecting such fake data into Google Analytics is that people are curious and most likely they will click on an unknown domain that ostensibly drives traffic to their websites. This way, the spam imitates traffic while it actually attracts it to a particular website using Google Analytics. In this article, we will describe how can your remove Biteg.xyz referral spam virus and make your Analytics data accurate again.
Biteg.xyz referrer spam is bad because it prevents you from seeing actual statistics, which can result in bad decisions regarding your site’s improvement. It is a well-known fact that fake traffic is generated by bots meanwhile real traffic comes from people who actually visit your website. Referral spam can be recognized from 100.00% indicator in bounce rate and new sessions fields. If you noticed suspicious new sources that unexpectedly started driving traffic to your website, do not rush to click on them. These URLs can be dangerous, and you might end up installing a dangerous spyware or malware type program on the system. Therefore, if the suspicious URLs started emerging in Google Analytics, do not waste any more time and use the removal tutorial provided below to remove Biteg.xyz referral spam immediately.
Questions about Biteg.xyz referral spam
Biteg.xyz referral spam is very annoying, but the traffic that it fakes doesn't affect your website in any way.
Reasons why referral spam targets you
If you had a chance to encounter referral spam, you probably want to know why did you become a target. The reason why people become targets is simply spammers’ greed to make money in quite unfair ways. Once you click on the link in your GA, you will reach a website controlled by a spammer. Most of Vitaly’s websites cause redirects to AliExpress or Alibaba websites, and once you buy something there, he gets a commission. You can also experience redirects to dangerous websites. Therefore, we recommend you to ignore shady URLs that mess up your GA data and take actions to remove Biteg.xyz spam from it.
Learn to remove Biteg.xyz referral spam from Google Analytics
The guide provided below explains how to block Biteg.xyz referral spam so that it would never emerge in your Analytics reports again. Follow the steps carefully and do not make mistakes such as creating a referral exclusion list. The guide we prepared can be used to remove all kinds of Google Analytics spam. You will need to create a filter for ghost spam, crawler spam, and filter for other spam types, such as language spam.
We will start by creating a valid hostname filter:
- First of all, find a list of your hostnames. Go to Network Report and select Audience. Then click on Technology to see hidden options and select Network.
- Click Hostname next to Primary Dimension section. Then, make a list of all important host names provided there. Do not include websites that you do not control, for example, bbc.com or google.com. Include only those that have added tracking code. Examples of such websites can be Youtube, Bing Translate, Paypal, etc.
- Create a list of hostnames by separating each of them with | character. Make sure you insert \ before dots and hyphens in URLs you collected, for example, youtube\.com|[next hostname here]|
- Don’t leave any spaces. If you want, use this filter in a test view for a few days to be sure that you’re not losing any valid data.
- Go to GA > Admin Tab. Choose a view where you want to enable the filter. Under the View column, select Filters and click + Add Filter. Entitle the filter as Valid Hostnames.
- Choose Custom for the Filter Type. Select Include option and then Hostname. You will see a Filter Pattern box, and this is where you need to enter the list of valid hostnames you created.
- Save. Do not forget to update the list whenever you add tracking ID to new domains or services.
Create a Filter for Crawler Spam:
- Go to Admin Tab. Under VIEW column, choose Filters and click +Add Filter.
- Entitle it as Crawler Spam.
- Choose Custom Filter type and opt for Exclude.
- In Filter Field, choose Campaign Source.
- In Filter Pattern, paste this expression:
Access your website securely from any location
When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.
The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login.
VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.
Backup files for the later use, in case of the malware attack
Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.
When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.