Dating sites top referrers 2016
The next most common was hackers simply bragging that they hacked your site.
In all of these cases the attacker is doing absolutely nothing to obscure what they have done, anyone who visits the site immediately knows that you’ve been hacked.
According to our survey respondents, 19.8% of compromised Word Press sites are used to send email spam.
In many cases the site owner was not aware that it was happening for quite some time.
The web server can be used to run malicious software and host content and the reputation of the domain name and IP address can be leveraged.
Last month we ran a survey that included the following open ended question for people who reported that their site had been compromised: We received a total of 873 responses that could be categorized, which we did by hand. Many of the responses described multiple categories, so the percentages on the chart below deliberately add up to greater than 100%.
The adtech landscape is huge  but the top 20 vendors very likely account for more than 80% of all revenues, and @kingo55's list is a great start...  @dcmnmarc - more useful than grouping it all under the vast expanse of "unknown" IMO.
We often talk to site owners who are surprised that their sites are targeted by attackers.
Most of them assume that if there isn’t any juicy data to steal, like credit card numbers, that compromising their site is a worthless exercise. Aside from data, a compromised site’s visitors can be monetized in various malicious ways.
Also, to confirm, if we use the commercial version of Max Mind, we would have to self host anyway?
We do have a concern about how much effort it requires to self-host these assets?
Also what happens if you detect paid traffic which is on the same time a known referrer type (like a search engine).