What data supports filtering tools clicking on links in emails?
Summary
What email marketers say9Marketer opinions
Email marketer from StackExchange says that sometimes scanners will click on all the links in your email at once, and that it's possible to track the bot's IP address or create honey pot links to block the bot.
Email marketer from Email on Acid notes that many email clients and security programs automatically validate links in emails, resulting in clicks being registered even if a human recipient doesn't click the link.
Email marketer from Email Marketing Tips shares that link cloaking and URL shortening services, while useful for tracking, can also be triggered by automated scanners, leading to inflated click rates.
Email marketer from Validity (formerly Return Path) explains that seed testing for inbox placement involves sending emails to various email providers and tracking whether the emails reach the inbox, spam folder, or are blocked. These tests may also register link clicks due to security scanning.
Email marketer from Reddit discusses the issue of bot clicks on links, stating that these clicks can be triggered by various automated systems, including security scanners and anti-virus software.
Marketer from Email Geeks shares that Proofpoint vaguely mentions checking URL safety in real-time in their marketing materials for URL defense.
Email marketer from Stack Overflow explains that tracking email opens and clicks is generally done using a combination of techniques, including adding a tracking pixel and rewriting URLs to point to a tracking server. The tracking server then redirects the user to the original URL, and the fact that this redirection happens counts as a click.
Email marketer from Litmus shares that image proxying and link tracking can trigger clicks on links within emails as part of security and data collection processes by various email clients.
Email marketer from Mailgun explains that automated link tracking and scanning by email providers may involve clicking on links within emails to check for malicious content or to gather data on user engagement.
What the experts say3Expert opinions
Expert from Spamresource answers that url wrapping and link reputation checks are used by many email receivers to assess the reputation of the sender of the mail.
Expert from Word to the Wise explains that URL wrapping by security tools and some ESPs can result in clicks, and email authentication failures might suggest a possible link between authentication and security scanning.
Expert from Word to the Wise explains that bot clicks are indeed a real thing; security software can scan links, and some ISPs and corporate filters will prefetch URLs. These clicks can be differentiated from legitimate clicks by analyzing the user agent or IP address.
What the documentation says5Technical articles
Documentation from Cisco explains that their Email Security Appliance scans URLs in emails, and this may involve following the links to analyze the content for malicious behavior before delivering the email to the recipient.
Documentation from Spamhaus outlines that they employ various methods to track and detect spam, including analyzing links in emails. This process involves automated systems that may follow links to assess the content and sender reputation.
Documentation from Microsoft Learn details the Safe Links feature in Microsoft Defender for Office 365, which rewrites URLs in incoming email messages. When a user clicks a URL in a message, the URL is checked *before* the website is opened. If the URL is found to lead to a malicious website, the user is warned.
Documentation from Google Web Search Central explains that Google crawls the web by using automated programs called crawlers, and these may follow links in emails if the emails are publicly accessible.
Documentation from Proofpoint outlines that their URL Defense product rewrites URLs and checks the destination website's safety in real-time when a user clicks the link. This can lead to initial clicks being logged by the system as it verifies the link.