Forum Moderators: open
[edited by: phranque at 3:26 pm (utc) on Apr 1, 2017]
[edit reason] email notifications [/edit]
This is not typical referral spam, these are actual server calls on my server and not simply GA pings.Actually that is typical referer spam, old-style :). It's the fake analytics requests that are new-style atypical referer spam. But this gives you a huge advantage: if they are "really" visiting, you can "really" block them.
....index.html HTTP/1.1" 200 47214 "https://slifty.github.io/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/603.1.30 (KHTML, like Gecko) Version/10.1 Safari/603.1.30" 2040
But GA is so easy.
SetEnvIf Referer slifty bad_ref
.io is a tld that is commonly used for tech companies such as github.
This is not typical referral spam, these are actual server calls on my server and not simply GA pings.
I have only ever encountered the "new style" up to this point.
So I fail to see the point of referral spam if the referrer information doesn't show up in analytics. What's the point?
github.io is blocked as refer in my htaccess file
The point is that analytics is not everyone's be-all and end-all.
only works if the offender is actually visiting your site.
...it is impossible to predict an unknown threatUnknown but predictable. That's why we block known server farms*, the source of 85% of all the malicious activity. The remaining threats usually come from compromised ISP accounts or just people using tools to get our files. These can be blocked by malformed header fields, behavior patterns or UA string attributes.