referral spam (Improved Instructions) referral spam Removal Guide

What is referral spam?

Why do I need to block referral spam?

You should block referral spam URL because it can easily pollute your Google Analytics data. Also, referral spam URLs are considered insecure because they seek to “invite” websites’ owners and admins to unknown domains and increase their visitors’ traffic. Unfortunately, but there is no guarantee that each of such sites is harmless. So, if you thought that your website received some traffic from because it shows up in your Google Analytics, we will have to disappoint you. In reality, you are dealing with spam bots that can add such referrals without a need to visit a site. Such referral spam technique is also known as Blackhat SEO or Ghost Referral strategy. Unfortunately, but it has been steadily growing while trying to increase visitors’ traffic to needed websites and improve their position in Google Search. That’s why the biggest amount of referral spam is noticed before the biggest feasts, such as Christmas, New Year, Easter and similar occasions.

As we have already mentioned, you should stop referral spam because it may pollute your Google Analytics data. How? As soon as this referrer spam starts compromising your bounce rate, the audience and similar statistics, you may find problems while trying to use this information for improving your site. Also, your site may start loading much slower than previously. Unfortunately, but each of these issues cannot be solved by resetting web browsers or removing malicious files from your device. While it is recommended to make sure that your computer is free of malware, a full system scan cannot protect you from referral spam attacks. They can be prevented by creating an exclude filter and using the .htaccess file. referral spam

Why spammers spread referral spam and disrupt websites’ owners?

The secret behind and similar referrer spam URLs is very simple. Once spammers corrupt them as sites where the traffic to your website comes from, these URLs show up in Google Analytics data. As the owner of the web site, you may be tricked into thinking that this site is giving you visitors and click the URL, which is provided for you. Unfortunately, but this is dangerous because you can never know which website you can be redirected to. To stay safe, you should ignore such referrals.

How to block referral spam?

If referral spam is compromising your Google Analytics data, you should know that you need to block it to prevent the damage, which it may cause for you and your site. For that, you should follow a guide given below. Unfortunately, but there is no guarantee that referrer is harmless. At the moment of writing, it redirects people to but there is no guarantee that you won’t get an “invitation” to an infected website. To protect yourself, you should scan your computer with FortectIntego or Malwarebytes. Now it is time to block referral spam in your Google Analytics. For that, please follow these steps:

How to block referral spam in Google Analytics

Step 1: Stop referrer spam by creating an exclude filter

  1. Open your Google Analytics account. Go to AdminAll Filters.
  2. Click Add Filter button and add to the Filter Name.
  3. Now select the Custom in Filter Type section and set Campaign Source in the Filter Field. Finally, add to the Filter Pattern.
  4. Click Save to save these changes.

Step 2: Block referral spam by using .htaccess file.

  1. Access your .htaccess file.
  2. Add the code, which is provided below:

RewriteCond %{HTTP_REFERER} get-your-social-buttons\.info [NC,OR]
RewriteCond %{HTTP_REFERER} get-your-social-buttons\.info
RewriteRule .* – [F]

If you don’t know how to access the .htaccess file, follow these steps:

  1. Log into cPanel and go to Files section. Here, click the File Manager icon.
  2. Now check the box with Document Root for, select your domain name and click Go.Warning! Make sure you check Show Hidden Files.
  3. Wait for a new tab or window and find the .htaccess file. Right click it and select Code Edit.
  4. Now copy and paste the code that is given above and click Save Changes.
do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

How to prevent from getting spam tools

Stream videos without limitations, no matter where you are

There are multiple parties that could find out almost anything about you by checking your online activity. While this is highly unlikely, advertisers and tech companies are constantly tracking you online. The first step to privacy should be a secure browser that focuses on tracker reduction to a minimum.

Even if you employ a secure browser, you will not be able to access websites that are restricted due to local government laws or other reasons. In other words, you may not be able to stream Disney+ or US-based Netflix in some countries. To bypass these restrictions, you can employ a powerful Private Internet Access VPN, which provides dedicated servers for torrenting and streaming, not slowing you down in the process.

Data backups are important – recover your lost files

Ransomware is one of the biggest threats to personal data. Once it is executed on a machine, it launches a sophisticated encryption algorithm that locks all your files, although it does not destroy them. The most common misconception is that anti-malware software can return files to their previous states. This is not true, however, and data remains locked after the malicious payload is deleted.

While regular data backups are the only secure method to recover your files after a ransomware attack, tools such as Data Recovery Pro can also be effective and restore at least some of your lost data.

About the author
Lucia Danes
Lucia Danes - Virus researcher

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Lucia Danes
About the company Esolutions

Removal guides in other languages