Settings & Configuration

Configure IP rules, traffic filtering, tags, and account-level settings to optimize your NextLinks setup.

IP Rules

Traffic Filtering

IP Rules allow you to filter traffic and flag suspicious activity. Use them to:

  • Mark bot traffic for analytics separation
  • Flag suspicious or fraudulent IPs
  • Exclude internal traffic (your office IP)

Rule Types

Bot

Marks traffic as bot. Still tracked but flagged in analytics.

Fraud

Flags suspicious IPs. Useful for tracking potential fraud.

Ignore

Excludes from analytics entirely. Use for your own IPs.

Creating an IP Rule

  1. Go to Settings → IP Rules
  2. Click Add Rule
  3. Enter the IP address (single IP or CIDR notation)
  4. Select the rule type (Bot, Fraud, or Ignore)
  5. Add an optional note for reference
  6. Click Save

Tag Management

Organize with Tags

Tags help you organize links and filter data in reports. Create a consistent tagging system for better analytics.

Suggested Tag Categories

By Channel

facebook, google, tiktok, email, influencer

By Campaign

spring-2024, black-friday, product-launch

By Client

client-acme, client-xyz, internal

By Status

active, testing, paused, archived

Creating Tags

  1. Go to Settings → Tags
  2. Click Create Tag
  3. Enter a name (use lowercase and hyphens)
  4. Optionally select a color
  5. Click Create

Filtering by Tags in Reports

In the Reports section, use the tag filter to show data for specific tags. You can use AND logic (must have all selected tags) or OR logic (has any of the selected tags).

Custom Domains

Branded Links

Use your own domain for professional, branded tracking links. Custom domains increase trust and click-through rates.

Quick Setup

  1. Add your subdomain in Settings → Domains
  2. Create a CNAME record pointing to cname.nextlinks.ai
  3. Verify domain ownership
  4. SSL is automatically provisioned

Account Settings

Workspace Configuration

Default Domain

Set which domain is selected by default when creating new links.

Timezone

Configure your workspace timezone for accurate reporting.

Team Members

Invite team members and manage their roles (Owner, Admin, Member).

API Keys

Generate and manage API keys for programmatic access.

Security Best Practices

API Key Security

Never expose API keys in client-side code. Store them in environment variables and rotate periodically.

Use Server-Side Postbacks

For high-value conversions, use server-side postbacks instead of client-side pixels for more reliable tracking.

Monitor for Anomalies

Regularly review your analytics for unusual patterns that might indicate bot traffic or fraud.