The websites: "www.sharebutton.to", "www.sharebutton.org", "www.free-social-buttons.xyz" and "cdn.script.to" are used for referrer spam, or spam or referrer bombing. Referrer spam (also known as log spam or referrer bombing is a kind of spamdexing (spamming aimed at search engines). The technique involves making repeated web site requests using a fake referrer URL to the site the spammer wishes to advertise. Sites that publish their access logs, including referer statistics, will then inadvertently link back to the spammer's site. These links will be indexed by search engines as they crawl the access logs. This technique does not harm the affected sites, just pollutes their statistics.
Please continue reading below.
This type of spamming benefits the spammer because the free link improves the spammer site's search engine ranking owing to link-counting algorithms that search engines use.
A new spam is happening in the digital world, especially in Google Analytics data Called Ghost Spam & Referral Spams with 100% bounce rate. Ghost spam traffic directly interacts with Google Analytics data with measurement protocol system where as referral spam directly influences website traffic. As a result spammers try to increase traffic to their websites.
As with e-mail spam, referrer spam may be filtered or blocked. A website operator may mitigate referrer spam by preventing search engine spiders from crawling the site logs by moving them to a non-public area such as a password-protected area, by using a robot exclusion file, or by appending the nofollow value to the links.
It is found that while some referrer spam pollutes analytics statistics directly, some spammers actually hit the web server. Filtering referrer spam from analytics tools will hide it from the reports but can still continue to consume server bandwidth.to save server bandwidth spammers can be blocked using for example a .htaccess file.
Some information in this article was taken from wikipedia.org.
Please share with us what you know or ask a question about this article, by leaving a comment below. And, forward malicious email messages to us using the following email address: firstname.lastname@example.org .
Tell us if you LIKE this article by clicking the following thumbs-up, or click the thumbs-down if you dislike it:
Submit your comment or question in the box below to share what you know or to get answers about this article.