Home/Tools/Security/Email Header Analyzer

Email Header Analyzer

Analyze email headers for phishing, spoofing, and authentication failures. Trace email path and verify SPF, DKIM, DMARC.

100% Private - Runs Entirely in Your Browser
No data is sent to any server. All processing happens locally on your device.
Loading Email Header Analyzer...

Paste the raw email headers to analyze for security indicators

Loading interactive tool...

Need Professional Security Testing?

Our penetration testers find vulnerabilities before attackers do. Get a comprehensive security assessment.

What Is Email Header Analysis

Email headers are metadata lines embedded in every email message that trace the message's path from sender to recipient. Headers contain critical information including the originating server, authentication results, routing hops, timestamps, and security verification outcomes. Analyzing email headers is a fundamental skill for investigating phishing attacks, diagnosing delivery issues, and verifying email authenticity.

While the visible "From" address can be easily spoofed, the headers reveal the true origin of a message. Security teams, IT administrators, and forensic analysts rely on header analysis to distinguish legitimate emails from malicious ones.

How Email Headers Work

Email headers are added by each mail server that processes the message. They are read from bottom to top — the oldest headers appear at the bottom, and each server that handles the message prepends new headers at the top.

Key Header Fields

HeaderPurposeSecurity Relevance
ReceivedRecords each server hopTrace the actual delivery path; detect forged routing
FromDisplay sender addressEasily spoofed — do not trust without authentication
Return-PathBounce address (envelope sender)Should match the From domain; mismatches suggest spoofing
Authentication-ResultsSPF, DKIM, DMARC verdictsDefinitive authentication status from the receiving server
DKIM-SignatureCryptographic signatureProves the message was not altered in transit
Received-SPFSPF check resultConfirms the sending IP is authorized for the domain
X-Mailer / User-AgentSending softwareCan reveal phishing tools or unusual sending software
Message-IDUnique message identifierShould contain the sender's domain; mismatches are suspicious
X-Originating-IPOriginal sender IPReveals the actual source, even behind forwarding services

Common Use Cases

  • Phishing investigation: Determine whether a suspicious email actually originated from the claimed sender by examining Received headers and authentication results
  • Delivery troubleshooting: Trace why emails are being delayed, rejected, or sent to spam by following the routing path and reading server responses
  • SPF/DKIM/DMARC verification: Confirm that email authentication is working correctly by checking Authentication-Results headers
  • Forensic analysis: During incident response, extract IP addresses, timestamps, and server identities from headers to build an attack timeline
  • Spam source identification: Identify the originating server and network for spam campaigns to feed into blocklists and abuse reports

Best Practices

  1. Read headers bottom-to-top — The first Received header (at the bottom) is the most trustworthy because it was added by the first server to handle the message. Upper headers can be forged by the sender.
  2. Verify authentication results — Look for the Authentication-Results header added by your receiving mail server. SPF=pass, DKIM=pass, and DMARC=pass together provide strong assurance of legitimacy.
  3. Check for header inconsistencies — Mismatches between the From domain, Return-Path, DKIM signing domain, and originating IP are strong indicators of spoofing.
  4. Extract IOCs for threat intelligence — IP addresses, domains, and Message-IDs from malicious email headers are valuable indicators of compromise (IOCs) for blocklists and SIEM correlation.
  5. Use automated tools for bulk analysis — Manual header analysis is valuable for individual investigations, but use automated tools and mail gateway logs for analyzing patterns across many messages.

References & Citations

  1. IETF. (2014). RFC 7208: Sender Policy Framework (SPF). Retrieved from https://datatracker.ietf.org/doc/html/rfc7208 (accessed January 2025)
  2. IETF. (2011). RFC 6376: DomainKeys Identified Mail (DKIM). Retrieved from https://datatracker.ietf.org/doc/html/rfc6376 (accessed January 2025)
  3. IETF. (2015). RFC 7489: Domain-based Message Authentication (DMARC). Retrieved from https://datatracker.ietf.org/doc/html/rfc7489 (accessed January 2025)
  4. FBI IC3. (2023). Business Email Compromise: The $50 Billion Scam. Retrieved from https://www.ic3.gov/PSA/2023/psa230609 (accessed January 2025)

Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.

Frequently Asked Questions

Common questions about the Email Header Analyzer

Email headers contain metadata about email's journey from sender to recipient: Key header fields: (1) From: Display name and address (easily spoofed!), what user sees in mail client, not authenticated by default. (2) Return-Path: Where bounces go, indicates sending server, often different from "From" in phishing. (3) Received: Chain of mail servers that handled message, timestamped hops from sender to recipient, most reliable for tracing origin. (4) Authentication-Results: SPF/DKIM/DMARC check results, pass/fail for each mechanism, critical for detecting spoofing. (5) Message-ID: Unique identifier for email, format reveals sending system. (6) X-Originating-IP: Original sender's IP address, useful for geolocation and reputation checks. Security value: (1) Detect spoofing - "From" says CEO but Return-Path is suspicious external domain, authentication failures indicate forged sender. (2) Trace origin - Follow "Received" headers backwards to source, identify compromised mail servers, geolocate attacker infrastructure. (3) Identify phishing patterns - Free email services for business emails, mismatched domains, suspicious routing through unexpected countries. (4) Forensic analysis - Incident response investigations, evidence collection, attribution. (5) Validate legitimacy - Verify email came from claimed sender, check authentication pass rates. What attackers manipulate: Display name in "From" (easy), actual "From" address (harder, caught by DMARC), can't manipulate "Received" chain (added by infrastructure), can't forge DKIM signatures without private key. Use cases: Investigate suspicious emails before clicking links, verify wire transfer requests (CEO fraud), analyze phishing campaigns, compliance audits (email retention), troubleshoot delivery issues.

⚠️ Security Notice

This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.