Skip to content
Start free trial

Bot Finder dashboard

The Bot Finder dashboard shows everything detected by InboxEagle’s bot analysis pipeline after you connect Bot Finder to your Amazon SES account. Use it to understand how much of your engagement data is real versus bot-driven, identify patterns in bot activity, and review individual detection events.

Open the dashboard from the left sidebar under AWS SES → Dashboard, or go to app.inboxeagle.com/aws-ses/dashboard.


A status indicator at the top of the page shows whether Bot Finder is actively connected to your AWS account:

StatusMeaning
ConnectedBot Finder is ingesting and analyzing SES events
PendingConnected but no events received yet
ErrorConnection issue — check ARN permissions or SES configuration set
DisconnectedBot Finder has been disconnected; set up again to resume

If you see an error state, visit Bot Finder troubleshooting for remediation steps.


The six metric cards at the top of the dashboard summarize bot detection results for the selected date range.

CardWhat it shows
Total analyzedAll email events (opens + clicks) processed by the Bot Finder pipeline
Bots detectedEvents classified as bot (score ≥ 40)
SuspiciousEvents classified as suspicious (score 25–39) — possible bots, lower confidence
Human opensOpen events classified as human (score < 25)
Real open rateOpens attributed to humans as a percentage of total analyzed
Real click rateClicks attributed to humans as a percentage of total analyzed

Bot inflation is the gap between your reported engagement metrics and your real engagement:

  • Bot open inflation = (Bot opens ÷ Total opens) × 100
  • Bot click inflation = (Bot clicks ÷ Total clicks) × 100

High bot inflation (>30%) means your ESP’s reported open and click rates are significantly overstated. Use the real open rate and real click rate from Bot Finder for accurate decisions about content, send time, and list segmentation.


Use the date range control above the charts to change the analysis window:

  • 7 days — Recent activity; good for day-to-day monitoring
  • 30 days — Default; balanced view for campaign reviews
  • 90 days — Trend analysis; useful for spotting seasonal patterns
  • Custom — Choose any start and end date

All charts and cards update immediately when you change the range.


The events chart displays all detected events over time, plotted as a line chart with three series:

SeriesDescription
HumanEvents classified as human engagement
SuspiciousEvents with moderate bot confidence (score 25–39)
BotEvents with high bot confidence (score ≥ 40)

Chart interactions:

  • Zoom — Click and drag on the chart to zoom into a date range
  • Pan — After zooming, drag left or right to pan through time
  • Reset zoom — Double-click to return to the full range

Spikes in the Bot series often coincide with:

  • Security scanner pre-fetching (corporate gateways scanning email links)
  • Apple Mail Privacy Protection (MPP) loading open pixels before users read the email
  • Campaigns sent to stale lists with a high proportion of inactive addresses

The bot trend chart shows the percentage of bot traffic over time as a proportion of all analyzed events. Use it to:

  • Track whether bot rates are stable, increasing, or decreasing
  • Identify specific campaigns that attracted unusually high bot activity
  • Correlate bot spikes with list segments, campaign types, or send times

A steady bot rate of 10–25% is typical for senders using shared IPs with standard list hygiene. Rates above 40% consistently indicate a structural issue — often a stale list, aggressive security scanning, or a provider with high proxy usage.


The Recent detections table lists individual events classified as bot or suspicious, with the most recent first. Each row shows:

ColumnDescription
TimeWhen the event occurred
TypeOpen or Click
VerdictBot Bot, Suspicious Suspicious, or Human Human
ScoreBot confidence score (0–100)
Top reasonThe primary detection rule that fired (e.g. “Apple MPP”, “Cloud IP”, “Sub-second open”)
IP addressThe IP address of the event
RecipientThe email address of the recipient (partially masked for privacy)

Bot Finder uses a 0–100 confidence score. Classification thresholds:

Score rangeClassificationMeaning
0–24HumanVery low bot confidence; treat as real engagement
25–39SuspiciousModerate signals; may be a bot or privacy proxy
40–100BotHigh confidence; exclude from engagement metrics

The score is computed by a 6-layer pipeline that combines deterministic rules, behavioral analysis, IP intelligence, cross-tenant reputation, and per-recipient history. See Bot Finder advanced configuration for details on the scoring model.


Use the Open bots and Click bots sub-views (accessible from the dashboard navigation) to see bot activity broken down by event type.

Open bots are the most common:

  • Privacy proxies (Apple MPP, Gmail Image Proxy) pre-load images without human intent
  • Security gateways scan for malicious content by loading tracking pixels

Click bots are rarer but more impactful to your metrics:

  • Security scanners follow all links in an email to check for phishing or malware
  • Link-clicking bots inflate click rates more severely than open bots

When a bot opens an email but a real human clicks later (a common pattern), Bot Finder records this as a machine-first / human-followup sequence and counts the click as a real human engagement.


The Activity log (accessible from the Bot Finder sidebar under Activity) shows a raw chronological list of all processed events — both bot and human — with full metadata. Use it for:

  • Auditing specific campaigns
  • Investigating anomalies flagged in the events chart
  • Exporting data for your own analysis

The Reports section (accessible under Bot Finder → Reports) lets you generate summary reports covering a selected date range. Reports include:

  • Total events analyzed and classification breakdown
  • Bot and suspicious event percentages
  • Top detection reasons
  • Top bot-generating IPs and ASNs
  • Per-campaign bot rates (if campaign data is available)

Open the Bot Finder dashboard →