A wide range of filtering tools, security software, ESPs, and email receivers click links in emails for various reasons, including security scanning, reputation assessment, engagement tracking, and inbox placement testing. Google crawlers, Microsoft's Safe Links, Cisco's Email Security Appliance, Proofpoint's URL Defense, and Spamhaus all actively analyze links for malicious content, spam detection, and reputation. Automated systems, including those used for link tracking, image proxying, and URL wrapping, trigger clicks. These bot clicks, often caused by security software pre-fetching URLs or validating links, can inflate click rates, but can be differentiated from legitimate clicks by analyzing user agents and IP addresses. Email authentication failures and the use of link cloaking or shortening can also be indicators of automated scanning.
9 marketer opinions
Filtering tools, security scanners, and email providers often click on links in emails for various reasons, including checking for malicious content, tracking user engagement, validating links, and gathering data for inbox placement testing. This automated link clicking can be triggered by URL defense mechanisms, image proxying, link tracking, seed testing, and even link cloaking/shortening services. Consequently, these automated clicks may inflate click rates, requiring careful analysis of user agents and IP addresses to differentiate them from genuine user interactions.
Marketer view
Email marketer from StackExchange says that sometimes scanners will click on all the links in your email at once, and that it's possible to track the bot's IP address or create honey pot links to block the bot.
23 May 2023 - StackExchange
Marketer view
Email marketer from Email on Acid notes that many email clients and security programs automatically validate links in emails, resulting in clicks being registered even if a human recipient doesn't click the link.
29 Dec 2021 - Email on Acid
3 expert opinions
Filtering tools, security software, ISPs, and email receivers actively click links in emails for security scanning and reputation assessment purposes. Bot clicks are a tangible phenomenon, often triggered by security software and filters pre-fetching URLs or wrapping URLs to check their reputation. Distinguishing these bot clicks from legitimate user clicks is possible through analysis of user agents and IP addresses, especially in the context of potential email authentication failures which might indicate security scanning.
Expert view
Expert from Spamresource answers that url wrapping and link reputation checks are used by many email receivers to assess the reputation of the sender of the mail.
28 Apr 2022 - Spamresource
Expert view
Expert from Word to the Wise explains that URL wrapping by security tools and some ESPs can result in clicks, and email authentication failures might suggest a possible link between authentication and security scanning.
4 Oct 2023 - Word to the Wise
5 technical articles
Email filtering tools, including those from Google, Microsoft, Cisco, Proofpoint, and Spamhaus, actively click on links in emails for various security and analytical purposes. Google's crawlers may follow links in publicly accessible emails. Microsoft's Safe Links feature checks URLs before opening them. Cisco's Email Security Appliance scans URLs for malicious content. Proofpoint's URL Defense rewrites URLs and checks destination safety, logging initial clicks. Spamhaus employs automated systems to analyze links for spam detection and reputation assessment. These processes all result in data showing that filtering tools are clicking on links in emails.
Technical article
Documentation from Cisco explains that their Email Security Appliance scans URLs in emails, and this may involve following the links to analyze the content for malicious behavior before delivering the email to the recipient.
14 Oct 2022 - Cisco
Technical article
Documentation from Spamhaus outlines that they employ various methods to track and detect spam, including analyzing links in emails. This process involves automated systems that may follow links to assess the content and sender reputation.
26 Mar 2023 - Spamhaus
Can link security checkers cause false no-js reports in email analytics?
Do email security software solutions click hyperlinks in emails?
Do free email services click links in emails to check for spam?
How can I identify and handle bot clicks and opens, particularly from Microsoft/Outlook domains, in email marketing campaigns?
How can I intentionally deliver emails to the spam folder?
How long does it typically take for anti-spam bots to click links in emails?