Severity scale:  

Remove referral spam (Removal Guide) - Free Guide

removal by Julie Splinters - - | Type: Spam tools joins the referral spam family

The picture illustrating behavior functions as a referral spam sample. The very domain is fake but is designed to redirect you to the website called According to the definition, it is an online advertising company which “represents a lot of services and solutions on the Internet.”

Though the purpose of the site seems to be promoting their “unique” articles on your sites and, likewise, get profit, the very site causes several concerns: It does not specify:

  • Credentials
  • Terms of Use and Privacy Policy
  • HTTPS protocol

The latter indicates that the site is properly programmed and thus is less vulnerable to website hijacking[1].
Ordinary users are unlikely to get directed to this site as every referral spam targets web administrators.

The aim is to spam the analytical reports of specific sites. Since every website owners watch the traffic in their site and analyze its visitors, they might get interested in discovering why the hike in visitors coming from is unusually high.

As a matter of fact, it is a mere marketing trick[2] to deceive the administrators into visiting Some more gullible web owners may even risk cooperating with the website expecting to earn benefit for their site as well.

However, more experienced administrators know that such referral spam sites only plague their website traffic and deprive them of getting sufficient insights about potential visitors. The sample of seojokes.netSeojokes directly misleads you to which fails to comply with mandatory safe website requirements

The peculiarities of transmission trends referral spam targets websites with poor protection of the website log files. Web pages with no https also risk being targeted by the developers of this type of online felonies.

Google Analytics provides bot filters. You can add websites to exclusion filters to block the traffic coming from them. There is also an identical include filter which lets add trusted websites. However, these functions are only useful if you know the name of referral spam site. Note that you should be vigilant as there is a myriad of such spam sites and not only Russsian[3] sites like or

Block spam traffic

Below instructions will help you get rid of this referral spam. Take note of previously mentioned advice to avoid getting spammed by such shady sites.

Step 1.

  1. Go to Admin -> All Filters.
  2. Navigate to New Filter and enter in the Filter Name box.
  3. Choose Custom Filter Type, then select Campaign Source from the drop-down Filter Field menu.
  4. Finally, in the Filter Pattern field, type in and click Save.

Step 2.

  1. Log into cPanel account, navigate to File Manager section, and mark the checkbox entitled as Document Root for -> your website.
  2. Mark Show Hidden Files and click Go. Once you locate the .htacess file, right-click on it and select Code Edit. Enter the following text and click Save Changes:

RewriteCond %{HTTP_REFERER} [NC,OR]
RewriteCond %{HTTP_REFERER}
RewriteRule .* – [F]

Step 3.

  1. In your Analytics account, go to Admin Tab.
  2. Select View, choose Filters and then press +Add Filter.
  3. In the Filter Name box, enter: Language Spam.
  4. In the Filter Pattern box, type in: \s[^\s]*\s|.{15,}|\.|,
  5. Click on Verify this Filter, and apply changes by clicking on Save.
do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Julie Splinters
Julie Splinters - Malware removal specialist

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Julie Splinters
About the company Esolutions


Your opinion regarding referral spam