Email Header Analyzer
Analyze email headers to trace sender location, detect spam, verify authenticity, and check email security. Identify spoofed emails, trace routing path, and understand email authentication.
How to Find Email Headers
Paste Email Headers to Begin
Paste your email headers in the left panel and click "Analyze Headers" to see the sender, route, authentication, and security analysis.
Uncover the Hidden Truth Behind Every Email
Every email you receive contains hidden technical information that reveals its true origin, authenticity, and journey through the internet. While scammers can easily fake the "From" address you see, they cannot fake the email headers—the detailed routing information that shows exactly where an email really came from and whether it passed security checks. This hidden information is your key to spotting fake emails, phishing attempts, and spam.
Our Email Header Analyzer decodes this technical information into easy-to-understand results. Paste any email header and instantly see the sender's real IP address and location, the complete path the email took through mail servers, whether the email passed authentication checks (SPF, DKIM, DMARC), spam indicators and red flags, and whether someone is trying to impersonate a trusted sender. Protect yourself from scams by verifying every suspicious email in seconds.
How to Analyze Email Headers
Get the Email Headers
Open the suspicious email in your email service. Look for "Show Original," "View Source," or "Message Details" option (usually in a menu or More options). Copy all the technical text that appears—this is the email header.
Paste Headers into Analyzer
Paste the complete email header text into our analyzer. Don't worry if it looks confusing—the tool will organize and explain everything. Make sure to paste the entire header for complete analysis.
Review the Analysis Results
See organized information including sender IP location, routing path showing each server the email passed through, authentication results (whether security checks passed), spam indicators and warnings, and a verdict on whether the email appears legitimate or suspicious.
Make an Informed Decision
Use the analysis to decide if the email is safe. Red flags like failed authentication, mismatched locations, or spam indicators mean you should delete the email or report it as spam. Verified emails with passing checks are likely legitimate.
Powerful Email Security Analysis
Trace Sender Location
Extract IP addresses from headers and identify the approximate geographic location of the sending server. See city and country instantly.
Authentication Verification
Check SPF, DKIM, and DMARC authentication results. Passed checks mean legitimate email; failed checks indicate potential fraud.
Spam Detection
Identify spam indicators including suspicious headers, forged information, unusual routing, and known spam patterns in the email path.
Routing Path Visualization
See the complete journey of the email through all mail servers from sender to your inbox. Identify unusual or suspicious routes.
Spoofing Detection
Identify when someone is pretending to be another sender. Compare displayed sender with actual sending server information.
Timestamp Analysis
Review when the email was sent and received at each server. Detect timing anomalies that may indicate tampering or delays.
How to Find Email Headers in Popular Email Services
| Email Service | How to View Headers | Menu Location |
|---|---|---|
| Gmail (Web) | Open email → Click three dots (⋮) → Show original | Top right of email |
| Outlook (Web) | Open email → Click three dots (···) → View → View message details | Top of email |
| Outlook (Desktop) | Open email → File → Properties → Copy from "Internet headers" box | File menu |
| Yahoo Mail | Open email → More (···) → View raw message | Right side of email |
| Apple Mail | Select email → View → Message → Raw Source | Menu bar at top |
| Thunderbird | Open email → View → Message Source (or Ctrl+U) | View menu or keyboard shortcut |
| ProtonMail | Open email → Three dots → View headers | Top right of email |
| iCloud Mail | Open email → View (flag icon) → Show All Headers | Bottom of email |
Tip: Look for options labeled "Show Original," "View Source," "Message Details," "Raw Message," or "View Headers." Copy ALL the text that appears—partial headers give incomplete analysis.
When to Analyze Email Headers
Detecting Phishing Emails
- Verify emails claiming to be from your bank
- Check government agency emails for authenticity
- Identify fake PayPal or payment notifications
- Spot fraudulent package delivery emails
- Verify password reset requests are legitimate
Identifying Email Spoofing
- Check if boss/CEO email is actually from them
- Verify emails from company executives
- Detect impersonation of colleagues or vendors
- Identify fake customer support emails
- Spot forged sender addresses
Spam Investigation
- Determine why emails go to spam folder
- Check if marketing emails are legitimate
- Identify sources of unwanted emails
- Report spam with evidence to authorities
- Block specific servers sending spam
Email Troubleshooting
- Track delivery delays and routing problems
- Identify why emails bounce back
- Debug email delivery issues
- Verify emails reached the right server
- Check email client and server information
Understanding Email Authentication (SPF, DKIM, DMARC)
Email authentication methods prove that an email genuinely comes from who it claims to be. These security measures prevent scammers from pretending to be banks, companies, or trusted senders. Understanding these checks helps you identify legitimate vs. fraudulent emails.
SPF (Sender Policy Framework)
SPF lets domain owners list which mail servers are authorized to send email on their behalf. When an email arrives, receiving servers check if it came from an authorized server.
- SPF Pass: Email came from an authorized server for that domain—good sign of legitimacy
- SPF Fail: Email came from unauthorized server—major red flag, likely spoofed or spam
- SPF Neutral/Softfail: Domain doesn't use SPF or has permissive settings—cannot confirm authenticity
DKIM (DomainKeys Identified Mail)
DKIM adds a digital signature to emails, proving they weren't altered during transit and came from the claimed sender's server.
- DKIM Pass: Email has valid signature, content unchanged—strong authenticity indicator
- DKIM Fail: Signature invalid or missing—email may be forged or tampered with
- DKIM Neutral: Domain doesn't use DKIM signatures—common but provides no verification
DMARC (Domain-based Message Authentication)
DMARC combines SPF and DKIM, and tells receiving servers what to do when checks fail (reject, quarantine, or allow).
- DMARC Pass: Email passed SPF or DKIM and domain alignment—highly trustworthy
- DMARC Fail: Failed both SPF and DKIM—very suspicious, likely fake email
- DMARC None: Domain doesn't use DMARC policy—provides no protection guidance
What Results Mean for You
All Checks Pass: Email is very likely legitimate. The sender is who they claim to be.
One or More Checks Fail: Be cautious. Email may be spoofed. Verify through another channel before taking action.
No Authentication: Neutral—some legitimate senders don't use these, but scammers exploit this. Check other indicators.
Email Security Best Practices
Verify Before Clicking Links
Never click links in suspicious emails, even if they look official. Analyze headers first. If you're unsure, go directly to the company's website by typing the URL yourself, not clicking the email link.
Check Mismatched Information
Compare the "From" address with the sending server location. An email claiming to be from your local bank but sent from another country is a huge red flag indicating fraud.
Look for Multiple Red Flags
One failed check might be a technical issue. Multiple failures (failed SPF + failed DKIM + suspicious IP location) almost certainly means a scam. Trust your analysis results.
Verify Urgent Requests Separately
Scammers create urgency ("Your account will be closed!" "Act now!"). If an email claims urgency, analyze the headers, then contact the company through official channels to verify.
Report Confirmed Phishing
After confirming an email is fraudulent through header analysis, report it to your email provider, the impersonated company, and relevant authorities. Help protect others from the same scam.
Educate Family and Colleagues
Share this tool with others who receive suspicious emails. Elderly family members and non-technical colleagues are often targeted. Show them how to verify emails before responding.
Red Flags in Email Headers
Our analyzer automatically checks for these warning signs, but understanding them helps you spot suspicious emails faster:
Major Warning Signs
- Failed Authentication: SPF, DKIM, or DMARC failures indicate the email may be forged
- Mismatched Sender Info: "From" address doesn't match actual sending server domain
- Suspicious IP Location: Email claims to be from local business but sent from foreign country
- Multiple Server Hops: Excessive routing through many countries suggests spam infrastructure
- Generic Greetings: Real companies use your name; scammers use "Dear Customer" or "Dear Sir/Madam"
- Urgent Language: Threats of account closure, suspicious activity, or immediate action required
Technical Red Flags
- Missing or Invalid Message-ID: Legitimate servers include unique message identifiers
- Unusual Time Stamps: Send/receive times that don't make sense or show wrong time zones
- Suspicious Return-Path: Reply address completely different from displayed sender
- No Reverse DNS: Legitimate mail servers have proper reverse DNS records
- Spam Score Present: Some headers include spam scores—high scores indicate known spam
Content Red Flags (Not in Headers)
While not in headers, watch for these in email content:
- Requests for passwords, credit card numbers, or personal information
- Links that look official but have misspellings or odd domains
- Attachments you didn't expect, especially .exe, .zip, or .scr files
- Poor grammar, spelling errors, or awkward phrasing
- Offers that are too good to be true
Real-World Email Scam Examples
Understanding common scam scenarios helps you recognize them before they cause harm. Here are frequent phishing and spoofing attempts that header analysis can detect:
Example 1: Fake Bank Email
What You See: Email appears to be from your bank with their logo. Subject: "Unusual Activity Detected - Verify Now!" Claims someone accessed your account from China.
Header Analysis Reveals: SPF and DKIM both failed. Sending IP is from Russia, not your bank's servers. Return-path shows completely different domain. This is a phishing attempt to steal your login credentials.
Example 2: CEO Impersonation (Business Email Compromise)
What You See: Email from your CEO asking you to urgently wire money or send gift cards. Seems to come from CEO's email address.
Header Analysis Reveals: Email sent from free webmail service (Gmail, Yahoo) not company mail server. Authentication checks failed. IP location shows another country. Scammer spoofed the display name but couldn't fake the technical details.
Example 3: Fake Package Delivery
What You See: Email from "FedEx" or "DHL" saying package can't be delivered. Asks you to click link to reschedule or pay customs fees.
Header Analysis Reveals: Not sent from official delivery company servers. Domain looks similar but isn't exact (fedex-delivery.com instead of fedex.com). Failed authentication. Clicking link would install malware or steal payment information.
Example 4: Tax/Government Scam
What You See: Email claiming to be from IRS, tax authority, or government agency. Says you owe money or are getting a refund—click link to claim/pay.
Header Analysis Reveals: Government agencies rarely email citizens directly. Email shows completely unrelated server location. No proper authentication. Real government communications come by mail, and legitimate email communications pass authentication checks.
Privacy and Security of Email Header Analysis
We understand that email headers can contain sensitive information. Here's how we protect your privacy:
Complete Browser-Based Processing
All email header analysis happens entirely in your web browser. When you paste headers into our tool:
- Headers are never uploaded to our servers
- No data is stored, saved, or transmitted anywhere
- Analysis completes on your device using your computer's processing power
- Close the browser tab and all data is immediately erased
- No login required means no tracking of which emails you analyze
What Information Headers Contain
Email headers include technical routing information but not the email message content. Headers show:
- Email addresses (sender and recipient)
- IP addresses of mail servers
- Server names and routing path
- Timestamps and technical identifiers
- Subject line (but not email body content)
Safe to Use for Sensitive Emails
Because processing is local and nothing is stored, you can safely analyze headers from:
- Work emails and business correspondence
- Banking and financial institution emails
- Medical and healthcare communications
- Legal and attorney-client emails
- Any confidential or private email
How to Report Phishing and Scam Emails
After confirming an email is fraudulent through header analysis, reporting it helps protect others and can lead to the shutdown of scam operations.
Report to Your Email Provider
- Gmail: Click Report spam or Report phishing in the email menu
- Outlook/Hotmail: Click Report → Phishing or Report junk
- Yahoo Mail: Click More → Report spam or Phishing
- Apple Mail: Message → Report Junk or Move to Junk
Report to Authorities
- United States: Forward to reportphishing@apwg.org (Anti-Phishing Working Group) and spam@uce.gov (FTC)
- United Kingdom: Forward to report@phishing.gov.uk (National Cyber Security Centre)
- European Union: Report to your country's national cybercrime reporting center
- Australia: Report to ReportCyber (www.cyber.gov.au/report)
- Canada: Report to Canadian Anti-Fraud Centre (antifraudcentre-centreantifraude.ca)
Report to Impersonated Company
If scammers impersonated a real company (bank, retailer, delivery service):
- Forward the email to the company's official security or phishing email address
- Most companies have addresses like phishing@company.com or abuse@company.com
- Include the full email with headers so they can investigate
- Companies want to know about impersonation to protect their brand and customers