Unusual click activity concentrated on a single link, predominantly from Amazon EC2 IPs, likely stems from a combination of automated security measures, bot activity, and email client behavior. Security solutions, including those from email providers like Gmail and Microsoft Safe Links, actively scan and rewrite URLs for malicious content, often utilizing AWS infrastructure. These scans, along with bot management tools (Cloudflare, Akamai) and evolving bot mitigation efforts, contribute to artificial clicks. Bot traffic itself can skew metrics, especially if targeting specific vulnerabilities. Additionally, prefetch clicks and changes in email client security protocols play a role. Analyzing IP addresses, MX records, and the link's attributes helps pinpoint the source and nature of the activity.
7 marketer opinions
Unusual click activity concentrated on a single link, originating primarily from Amazon EC2 IPs, can be attributed to several factors related to automated security measures, bot traffic, and email client behavior. Security protocols, such as automated click protection and link scanning by email providers and security services, generate artificial clicks while assessing URLs for malicious content. Furthermore, bot traffic, actively targeting vulnerabilities, and prefetch clicks, where email clients load links preemptively, can inflate click counts. Evolving bot mitigation efforts and aggressive email verification also contribute to this phenomenon.
Marketer view
Email marketer from Marketing Forum user JohnS suggests that email providers are actively scanning links for malicious content. A surge in clicks from AWS IPs could be a new security feature which is scanning and validating links.
28 Mar 2023 - Marketing Forum
Marketer view
Email marketer from Litmus shares that automated click protection mechanisms used by email providers can generate artificial clicks. Security protocols sometimes prefetch or scan URLs, which may manifest as concentrated click activity from particular IP ranges.
10 Oct 2023 - Litmus
5 expert opinions
Unusual click activity concentrated on a single link, primarily originating from Amazon EC2 IPs, points towards automated security measures and potential third-party involvement. Analyzing the IPs reveals the source of activity, which is likely security software or third-party threat monitoring services rewriting URLs for scanning and validation. Examining MX records and the specific link's attributes can help pinpoint if the issue is related to specific email providers or a suspicious link. The activity indicates aggressive link scanning by security tools.
Expert view
Expert from Email Geeks suggests, based on Amazon IPs (EC2), a potential third-party threat monitoring or filtering service is involved.
6 Jul 2023 - Email Geeks
Expert view
Expert from Email Geeks suggests checking the IP addresses associated with the clicks to identify the source of the activity.
2 Sep 2021 - Email Geeks
5 technical articles
Unusual click activity concentrated on a single link in an email campaign, originating primarily from Amazon EC2 IPs, is likely due to automated security scans and bot management tools. Amazon EC2 provides the infrastructure for running security tools and custom scripts, including those used by email providers like Gmail and Microsoft (Safe Links) to scan links for malicious content. Security solutions such as Cloudflare's bot management and Akamai's web application firewall also prefetch and analyze URLs, generating clicks as part of their security process.
Technical article
Documentation from Microsoft explains the Safe Links feature in Microsoft Defender for Office 365 rewrites URLs in incoming email messages. When a user clicks a link in a message, the URL is checked before the site is opened. If the URL is found to lead to a malicious website, the user is taken to a warning page, this scan will register as a click.
25 Jan 2022 - Microsoft Documentation
Technical article
Documentation from Google Support shares that Gmail's built-in security features may scan links in emails to protect users from phishing or malicious content. These scans can originate from Google's servers, which sometimes utilize cloud infrastructure, potentially including AWS.
1 Feb 2022 - Google Support
How can honeypots be used in B2B emails to identify and filter out bot clicks effectively without impacting deliverability?
How can I detect and segment bot clicks in email campaigns?
How can I identify and handle suspicious bot clicks in email marketing campaigns?
How can I prevent bot clicks from hurting my email reputation?
How can I prevent bots from signing up for my newsletter and marking it as spam?
How do I identify and handle spam bot clicks in email reporting and how can they affect deliverability?