Browser & Tracking

Tracking Pixel

About 3 min read

What Are Tracking Pixels

A tracking pixel is a transparent 1x1 pixel image embedded in web pages or emails, used to track user behavior. They are also known as web beacons, pixel tags, or clear GIFs.

The mechanism is simple. When a page or email is displayed, the browser or email client downloads this tiny image from a server. The information included in that request (IP address, User-Agent, access time, referrer, etc.) is recorded on the server side, allowing user behavior to be monitored.

Technical Implementation Methods

Tracking pixels have several implementation patterns:

  • 1x1 transparent GIF: The most classic method. A transparent GIF image of just 43 bytes is loaded via an <img> tag. User IDs or campaign IDs are appended as query parameters in the URL, and access logs are analyzed on the server side.
  • Transparent PNG: Similar to GIF but uses PNG format. The HTTP response header sets Cache-Control: no-store to prevent measurement gaps caused by caching.
  • CSS-based tracking: Uses the background-image property to specify an external URL. This can bypass countermeasures that block <img> tags, but since it fires when CSS is loaded, it may not accurately reflect actual viewing.
  • JavaScript beacon: Sends data using navigator.sendBeacon() or fetch(). Can collect more information than image requests (scroll position, time on page, click coordinates, etc.).

Information Collected by Tracking Pixels

  • Email open detection: The most widely used application in email marketing. When an email is opened, the image is downloaded, recording "when, on which device, and from which IP address the email was opened."
  • IP address: The IP address from the image request is used to estimate approximate geographic location.
  • Device and browser information: The User-Agent header reveals the OS, browser type, and version.
  • Browsing behavior: On web pages, combined with cookies, tracking pixels can build cross-site user behavior histories. Ad networks use this technique to create detailed user profiles.

It is not uncommon for multiple tracking pixels to be embedded in a single email or web page, as advertisers, analytics services, and social media platforms each deploy their own pixels.

The Reality of Email Tracking

In the email marketing industry, measuring open rates via tracking pixels is standard practice. A unique image URL containing a per-recipient ID is embedded near the end of HTML emails.

A more advanced technique is "link decoration," where links in the email are rewritten to redirect URLs via a tracking server. When a recipient clicks a link, they first access the tracking server, which records the click time and recipient ID before forwarding to the actual destination. This allows precise tracking of who clicked which link and when.

Caution is also needed when forwarding emails. If the forwarded email is opened by the recipient, tracking fires under the original recipient's ID, potentially being miscounted as the forwarder's open.

Cross-Site Tracking by Ad Networks

Ad networks track users' web browsing behavior comprehensively by chaining tracking pixels across multiple sites.

In a typical flow, when you browse a product on e-commerce site A, the ad network's pixel embedded on that page fires and records the product category you viewed. When you then visit news site B, the same ad network's pixel matches the third-party cookie, identifying you as "the user who was looking at shoes on site A." As a result, shoe ads appear in site B's ad slots - this is how retargeting advertising works.

Tracking codes from major platforms like the Facebook Pixel and Google Tag are installed on millions of sites, capturing the behavior of internet users on a massive scale.

How to Detect Tracking Pixels

Tracking pixels are invisible, so they go unnoticed during normal browsing. The following methods can detect them:

  • Browser developer tools: Check the Network tab for image requests and look for 1x1 pixel images or URLs containing pixel, beacon, or track.
  • View email source: Examine the HTML source of an email and look for <img> tags loading images from external servers.
  • Dedicated extensions: Extensions like Ugly Email (for Gmail) and PixelBlock automatically detect and warn about tracking pixels in emails.

Countermeasures

  • Disable automatic image loading in emails: Turning off automatic external image downloads in your email client settings prevents tracking pixel loading. Apple Mail's Mail Privacy Protection feature loads images through a proxy to prevent IP address leaks.
  • Install an ad blocker: Ad blockers like uBlock Origin manage blocklists of known tracking pixel domains and prevent them from loading.
  • Email client proxy features: Apple Mail (iOS 15+) and Proton Mail relay image requests through proxy servers. The sender only sees the proxy's IP address, protecting the recipient's actual IP address and location. However, the fact that the email was opened is still detected.
  • Use plain text email: Displaying emails in plain text format instead of HTML prevents images from loading, completely blocking tracking.

To learn more about this topic, see Ad Tracking Protection: How to Stop Being Followed Online.

Common Misconceptions

Tracking pixels are a type of malware
Tracking pixels are ordinary image files with no ability to execute code. While they raise privacy concerns, they do not directly harm your device.
Incognito mode prevents tracking pixels
In incognito mode, tracking pixel images are still downloaded normally, and your IP address and device information are sent to the server. Only cookies are not saved; pixel-based tracking itself is not prevented.

Difference Between Tracking Pixels and Cookies

Tracking Pixel

Records information on the server side. Stores nothing in the user's browser. Works in emails too. Cannot be directly deleted by users.

Cookie

Stores data in the user's browser. Can be deleted or blocked by users. Works only on websites. Consent is required under GDPR and similar regulations.

Share

Related Terms

Related Articles