← back to blog

Manual ops vs automation for 100 plus accounts

Manual ops vs automation for 100 plus accounts

running 10 accounts manually is annoying. running 100 manually is a second job. running 300 manually is a slow-motion disaster you don’t notice until something breaks badly, usually on a Friday night. i’ve been through all three stages, and the transition from “i’ll just tab through these” to “the machine does it and i review exceptions” is one of the most consequential infrastructure decisions you can make in this kind of work.

this piece is for people who already have the basics down: you know what an antidetect browser is, you’ve used residential proxies, you understand why you don’t log into 40 accounts from the same IP. what we’re going to cover is the decision framework for when to automate, what automation actually looks like at the 100-plus account scale, where things break in ways that surprise you, and what the real cost differential is between manual and automated ops. i’ll name specific tools and give real numbers where i can.

the stakes are higher than they look. moving to automation prematurely burns accounts because your scripts behave differently than humans in ways you haven’t profiled yet. staying manual too long burns operator time, introduces consistency errors, and creates a ceiling on how large your portfolio can get. getting the timing and architecture right is the difference between a scalable operation and a pile of duct tape that collapses under its own weight.

background and prior art

the multi-account operations space has a longer history than most people acknowledge. dropshipping operators were running parallel eBay and Amazon seller accounts in the early 2010s, social media marketing agencies were managing hundreds of client Facebook pages before Business Manager existed, and grey-hat SEO shops had link farm portfolios in the thousands. the tooling from that era was primitive: spreadsheets of credentials, Firefox profiles manually configured, shared proxies from sketchy resellers. most of it worked until it didn’t, and when it stopped working it stopped catastrophically.

the antidetect browser category formalized around 2018-2019 with tools like Multilogin and what eventually became Dolphin Anty. browser fingerprinting research from the Electronic Frontier Foundation helped practitioners understand exactly what signals they were managing: canvas fingerprint, WebGL renderer, font enumeration, screen resolution, timezone offset, audio context. the EFF’s Cover Your Tracks tool is still the best free reference for checking whether a browser profile is actually isolated. understanding that list is prerequisite knowledge for any automation decision, because automated browsers have systematic fingerprint differences from real human browsers, and those differences are what get you flagged.

the core mechanism

the fundamental unit of a multi-account operation is the browser profile. one profile equals one identity. that identity has: an IP address (usually a residential or mobile proxy tied to a specific geography), a browser fingerprint (canvas hash, WebGL hash, fonts, timezone, screen dimensions, hardware concurrency), cookies and local storage, and behavioral history. manual ops means a human opens that profile, does the work, closes it. automated ops means a script opens it, does the work, and your human reviews exceptions.

the transition point is almost always around 50-80 accounts. below that, a disciplined operator can work through a daily checklist in 2-3 hours. above 100, even if each account only needs 5 minutes of interaction per day, you’re looking at 8+ hours of pure clicking, zero value-add work. the math is brutal and it only goes in one direction.

the automation stack has three layers:

layer 1: profile and proxy management. this is the antidetect browser layer. Dolphin Anty’s Team plan at $89/month supports 10 team members and 10,000 profiles. GoLogin’s Professional plan at $49/month supports 100 profiles, which isn’t enough for serious scale, their Business plan at $99/month gives you unlimited profiles. Multilogin is the enterprise option at around $119/month for the Solo plan with 100 profiles. for 100+ accounts, Dolphin Anty or Multilogin is where most serious operators land. all three expose APIs for programmatic profile management, which is the critical feature.

layer 2: task orchestration. this is where Playwright or Selenium does the work. Playwright is the better choice in 2025-2026: it has better handling of modern web features, a cleaner API, and native support for browser contexts that maps reasonably well onto the antidetect profile model. you connect Playwright to Dolphin Anty by launching the profile through the API, getting back a websocket debugger URL, and attaching Playwright to that session. the code looks like this:

import requests
from playwright.sync_api import sync_playwright

# launch profile via Dolphin Anty API
profile_id = "your_profile_id"
resp = requests.get(f"http://localhost:3001/v1.0/browser_profiles/{profile_id}/start?automation=1")
ws_endpoint = resp.json()["automation"]["wsEndpoint"]

with sync_playwright() as p:
    browser = p.chromium.connect_over_cdp(ws_endpoint)
    page = browser.contexts[0].pages[0]
    page.goto("https://example.com")
    # do your work
    browser.close()

this is the pattern. your task logic sits in the playwright block. profile management sits in the antidetect layer. they’re decoupled, which matters.

layer 3: scheduling and state management. at 100+ accounts, you need something tracking what each account has done, what it needs to do, and whether it succeeded. i’ve seen people use Airtable for this at smaller scale, but the query limitations become painful. a simple PostgreSQL database with a tasks table and accounts table handles this cleanly. each run logs start time, end time, status, and any error codes. you can query “all accounts that haven’t posted in 72 hours” or “all accounts where the last 3 runs returned a 403” without hitting API rate limits or paying per-seat for a SaaS tool.

the scheduler can be as simple as cron on a Linux box, or n8n if you want a visual workflow editor. cron is more reliable and has zero ongoing cost. n8n running self-hosted on a $6/month Hetzner VPS is a reasonable middle ground if you want observability without complexity.

worked examples

example 1: social media content distribution, 120 accounts

a Singapore-based content network running 120 Twitter/X accounts for a client. accounts were segmented into three tiers: 40 seed accounts (high-follower, manually curated), 50 amplifier accounts (mid-tier, semi-automated), and 30 engagement accounts (lower tier, fully automated). the client was spending 6 hours/day on manual ops for the amplifier and engagement tiers alone.

the automation build took three weeks: one week on the Playwright scripts for posting and engagement actions, one week on the proxy rotation logic (they used Bright Data residential proxies at roughly $8.40/GB on the Pay As You Go tier), one week on exception handling and the logging database. after deployment, manual ops time dropped to 45 minutes per day, covering the seed accounts and exception review. the engagement and amplifier tiers ran on a 4-hour cycle. account loss rate in the first 90 days was 4 accounts (3.3%), all in the engagement tier. acceptable given baseline.

example 2: e-commerce review operation, 60 marketplace accounts

an operator running 60 accounts across two Asian e-commerce marketplaces. each account needed to perform specific browsing sequences before any review action, log consistent purchase history, and operate within platform-specific daily action limits. manual ops was taking 4-5 hours/day and the operator was making consistency errors, doing actions in the wrong order on stressed days.

they moved to full automation using GoLogin Business ($99/month), a Python/Playwright task runner, and a simple SQLite database for state (small enough scale that SQLite was fine). the key insight was building a “persona warmup” module that ran randomized browsing sessions 3-4 times per week per account, independent of any task work. this kept behavioral profiles looking live. they estimated the automation build cost them 80 hours of developer time at SGD 80/hour, so SGD 6,400 upfront. ongoing infrastructure cost was under SGD 200/month. at 60 accounts doing meaningful daily work, the manual time cost would have been roughly 3 hours/day at SGD 30/hour equivalent, so SGD 2,700/month. payback period was under 3 months.

example 3: airdrop farming portfolio, 200 wallets and 200 associated accounts

this one is worth including because the coordination requirements are more complex. running 200 wallets for crypto airdrop farming involves not just browser profiles but wallet isolation, gas fee management, and task sequencing across protocols. antidetectreview.org covers the browser tooling side of airdrop setups in more detail if you need a primer. the operator in this case used Dolphin Anty Team ($89/month) for browser profiles, MetaMask with per-profile seed phrases managed in an encrypted local store, and a custom Python scheduler that processed wallets in randomized batches of 15-20 rather than sequentially. sequential processing is a fingerprint pattern that platforms detect. the batching with randomized inter-action delays brought detected/blocked wallet rate from 12% to under 4% over a 60-day period.

edge cases and failure modes

failure mode 1: automated behavioral fingerprinting

the most common mistake is assuming that if your browser fingerprint passes the EFF Cover Your Tracks test, you’re fine. browser fingerprinting is one signal. behavioral fingerprinting is a separate, harder problem. platforms analyze: typing cadence, mouse movement patterns, scroll velocity, time-on-page distributions, click coordinates relative to element bounds (humans rarely click exactly in the center of a button), and inter-session timing patterns. Playwright’s default click() method clicks the center of the element. real users don’t. a batch of 200 accounts all clicking button centroids with 0ms variance will get flagged regardless of their canvas hash.

counter-strategy: add randomized delay functions and use mouse.move() with bezier curve interpolation before clicks. libraries like [playwright](https://playwright.dev/)-extra with the stealth plugin handle some of this, but they’re not sufficient alone. the Playwright documentation on mouse events gives you the primitives; you have to build the human-mimicry layer yourself.

failure mode 2: proxy quality degradation over time

residential proxies that work great in week 1 start returning elevated error rates by week 6, because other operators on the same pool burned those IPs before you. this is especially true with cheaper providers. the symptom is gradual: your success rate goes from 96% to 89% to 78% over a month and you don’t notice until you check the logs.

counter-strategy: log per-proxy success rates in your state database. rotate out proxies that drop below your threshold (i set mine at 85% over a 7-day window). proxyscraping.org has technical breakdowns of proxy pool health metrics that are useful for building your monitoring logic. budget for 10-15% proxy churn per month if you’re doing anything at meaningful volume.

failure mode 3: rate limit cascades

automated ops are faster and more consistent than humans, which means they hit rate limits harder. a human doing 20 actions per account per day will naturally spread those across 8 waking hours with irregular spacing. a script doing 20 actions will do them in 4 minutes with 1-second delays unless you deliberately prevent that. the second pattern triggers rate limiting at a different threshold than the first.

counter-strategy: model your action budget per account per day, then distribute actions across a realistic human active window (say 8am to 11pm in the account’s profile timezone), with jittered delays drawn from a distribution that resembles human activity. a simple approach: randomly sample from a normal distribution centered on your target inter-action delay, clamp the values to a reasonable range, never let the variance be zero.

failure mode 4: session state corruption

when a script fails mid-task, it can leave the account in an inconsistent state. a partially completed form, a dangling authenticated session, or a failed transaction that the platform has partially recorded. if your retry logic doesn’t account for this, the next run may attempt to repeat an action the platform already registered, which triggers duplicate detection.

counter-strategy: implement idempotency at the task level. before performing any action, check whether it already succeeded. log task completion with enough detail to know exactly where a sequence was interrupted. this is boring to build and critical to get right.

failure mode 5: antidetect browser updates breaking API integration

Dolphin Anty, GoLogin, and Multilogin all update their browser engines regularly to stay ahead of detection. those updates occasionally break the CDP endpoint behavior or change the websocket URL format. in 2024, a Dolphin Anty update changed how the start endpoint returned the debugger URL and broke every automation setup that hadn’t pinned their API parsing logic to the response schema.

counter-strategy: pin your API integration code to a specific response schema and add a validation step at startup that checks the response shape before running any tasks. when an update drops, check the vendor’s changelog before running production workloads.

what we learned in production

the biggest operational insight after running 100+ account portfolios for a few years is that automation is an amplifier, not a solution. if your manual ops are inconsistent or your account hygiene is poor, automation makes those problems happen faster and at greater scale. the right sequence is: build good manual practices, document them precisely enough that you could hand them to a contractor and get consistent results, then automate from that documented process. operators who automate before documenting are essentially encoding their bad habits into a script that runs 24/7.

the second thing i’d emphasize is the cost of exceptions. at 200 accounts running automated daily tasks, you’ll typically see 5-15 exceptions per day that need human review. an exception is: a CAPTCHA that wasn’t handled, an account that received an unusual verification prompt, a task that failed 3 consecutive times, an account that got a terms-of-service warning. if you don’t have a clean exception review interface, your human ops time doesn’t drop as much as you think it does. you just spend it differently, firefighting instead of executing. build the exception dashboard early. it’s worth more than any additional automation you can add. see the blog index for related tooling writeups, and the proxy setup guide covers the infrastructure layer in detail.

the accounts that survived longest in my portfolios were the ones that had the most “boring” behavioral profiles: consistent, predictable, no sudden spikes, no unusual geographic jumps, no abrupt changes in action frequency. the antidetect browser comparison covers tooling differences in more detail, but the tooling is secondary to the behavioral model. the best antidetect browser running a poorly-designed behavioral profile will still get flagged. a mid-tier tool running a well-designed behavioral profile will outperform it. airdropfarming.org covers how this principle applies specifically to DeFi protocol farming, if that’s your vertical.

references and further reading

  1. Electronic Frontier Foundation, Cover Your Tracks - the authoritative public tool for testing browser fingerprint isolation. essential for verifying profile setup before automation.

  2. Playwright official documentation - the primary reference for browser automation. the CDP connection docs are specifically relevant for antidetect browser integration.

  3. PostgreSQL documentation - the official Postgres docs. relevant for designing the state management layer at scale.

  4. MDN Web Docs: User-Agent header - understanding the User-Agent string and how it interacts with browser fingerprinting is fundamental; MDN’s documentation is the cleanest reference.

  5. Bright Data proxy documentation - the technical reference for Bright Data’s residential proxy network, including zone configuration and IP rotation behavior.

Written by Xavier Fok

disclosure: this article may contain affiliate links. if you buy through them we may earn a commission at no extra cost to you. verdicts are independent of payouts. last reviewed by Xavier Fok on 2026-05-19.

need infra for this today?