Blog · Tactics

Connection limits and warm-up: a 2026 field guide

If you take one thing away from this post: 25 connection requests per account per day, 100 messages per account per day. Those are the safe ceilings in 2026. Operate under them and your accounts stay healthy. Push past them and you're rolling dice with a half-decade of relationship-building work.

The rest of this post explains why those numbers, what triggers a warning, the warm-up curve we use for new senders, and the fingerprint hygiene most operators get wrong. Bookmark it.

The daily caps, and why they are what they are

LinkedIn doesn't publish an official "send N connection requests per day" number. They never have. What they publish is vague language about "unusual activity" and a "weekly invitation limit" that, in practice, kicks in around 100 connection requests per week per account.

That's where the 25-per-day default comes from. It's the platform-wide safe ceiling — well under the published weekly limit, with enough head-room that an occasional surge (say, 30 in a day after you skipped a day) doesn't trip the anomaly detection. Run at 25 a day, six days a week, and you're at 150 weekly invites, which is above the published cap but below the threshold that triggers the warning, because the published cap is conservative and the actual cap floats with account quality.

For messages, the safe ceiling is higher: 100 per account per day. Messages don't have the same hard limit as connection requests because they're sent inside an existing conversation, not as cold contact. The 100 cap exists more to prevent the kind of mass-blast behaviour that triggers the abuse detector than to prevent legitimate outreach.

What actually triggers a warning

The "weekly invitation limit" warning isn't a single threshold. It's a model. The variables we've watched it react to, in rough order of impact:

  • Acceptance rate. Sending 50 invites and getting 5 accepts is normal cold-outreach behaviour. Sending 50 and getting 1 is a red flag. The model interprets low acceptance as the recipients not knowing you, which is what a spammer looks like.
  • Burst behaviour. 25 invites at consistent gaps over an 8-hour window looks human. 25 invites in 90 seconds looks like a bot. Random 30–120 second gaps between actions is the floor.
  • Time of day. 100 messages between 2am and 4am local time looks bad even at the right pace. Limit sending to working hours in the sender's timezone.
  • Ramp curves. An account that suddenly jumps from 5 invites a day to 25 invites a day looks compromised. New volume should ramp gradually.
  • Withdrawal rate. Sending an invite, then withdrawing it 48 hours later because it wasn't accepted, used to be a clever workaround. LinkedIn now treats the withdraw as a signal that you're trying to game the limit, and it counts against you.

The single biggest mistake people make is to fixate on the daily cap as if it's a hard wall. It's a soft wall. The model is what matters.

The warm-up curve

New LinkedIn accounts — anything under three months old, or any account that has been dormant for over six months — should never start at the full 25-invite cap. The curve we run by default:

  • Week 1: 5 invites/day, 20 messages/day
  • Week 2: 8 invites/day, 35 messages/day
  • Week 3: 11 invites/day, 50 messages/day
  • Week 4: 14 invites/day, 65 messages/day
  • Week 5: 17 invites/day, 80 messages/day
  • Week 6: 20 invites/day, 90 messages/day
  • Week 7+: 25 invites/day, 100 messages/day (full speed)

The curve is +3 invites per week. We've tested faster ramps and slower ramps. Faster (say, +5/week) tips into warning territory in our cohort data. Slower (say, +2/week) leaves volume on the table without measurable safety improvement.

One important rule: warm-up is per-account, not per-organisation. If you add a brand-new sender to an existing campaign, that sender starts at week 1, even if the campaign is humming. Don't shortcut this.

The fingerprint check most operators miss

Daily caps are necessary but not sufficient. The other half of account safety is session-level hygiene — making sure each LinkedIn session looks like a human at a consistent location.

In rough order of impact:

  • Residential proxy in the right country. Datacenter IPs are flagged at scale. Residential IPs are not, but only if the IP geolocates to the same country (and ideally the same city) the account was created in. A US-created account suddenly appearing on a Bulgarian residential IP gets challenged within days.
  • Stable browser fingerprint. Viewport dimensions, user-agent, screen depth, installed fonts, language headers, and timezone should all stay consistent across sessions. Most session-management failures are not the proxy — they're the fingerprint drifting because the operator switched between a managed browser and a personal one.
  • Cookie age. A LinkedIn session cookie that's been alive for six months looks more human than one that gets re-issued daily. Stay logged in. Don't clear cookies between sessions.
  • Mobile vs desktop ratio. Real LinkedIn users hit the platform from mobile sometimes. Accounts that are 100% desktop, 100% of the time, look slightly off. We've not seen this trigger warnings on its own, but it's a contributing signal.

Sales Navigator — does it raise the limits?

No. This is the most common myth in the space. Sales Navigator gives you better targeting (advanced filters, saved searches, lead lists), and it gives you 50 InMail credits per month, but it does not raise the connection-request cap or the message cap. Both are tied to account standing, not subscription tier.

What Sales Navigator does change is the unit economics of cold outreach. With better targeting, your acceptance rate goes up, which (per the section above) gives you more headroom on the weekly invitation limit. So in practice, Sales Navigator users can sustain the 25-invite-per-day pace longer without triggering warnings. Not because the cap is higher, but because the model is friendlier to them.

What to do when LinkedIn shows a warning

The two warnings you're most likely to see:

  • "You've reached the weekly invitation limit." Connection requests are blocked for ~7 days. Messages still work. Don't try to bypass — wait it out, then resume at half the previous pace.
  • "Please confirm you're a real person" (captcha). Stop everything on that account immediately. Log in via a real browser from the same residential IP, complete the captcha by hand, and then leave the account quiet for 48 hours before resuming automation. Resuming too fast usually escalates to a suspension.

What you should never do: power through, send more, or rotate to a different proxy. All three look like evasion to the detector and accelerate the path to a permanent ban.

The pre-launch checklist

Before pressing "start" on a new campaign, verify:

  • Each sender's daily caps are set at or below 25 invites / 100 messages
  • Each sender has a residential proxy that geolocates to its account's home country
  • New accounts are slotted into the warm-up curve, not full speed
  • Sending hours are restricted to the sender's local working hours (we default to 9am–6pm)
  • Random gaps of 30–120 seconds are enabled between actions
  • The first message in your sequence is genuinely personalised, not templated — acceptance rate matters more than send volume
  • You have a kill switch ready: a way to pause every campaign on the affected sender within 30 seconds if a warning surfaces

Run that checklist for every campaign. The five minutes it takes saves accounts.