Free email header analyser — analyse SPF, DKIM, DMARC and trace email routing
Every email message carries a block of metadata called headers, added by each mail server that handles it. These headers record who sent it, who received it, when, and via which route — along with authentication results that prove (or disprove) the message is legitimately from its claimed sender. This tool parses that raw header text and presents the information in a structured, human-readable format.
The Authentication tab shows SPF, DKIM, and DMARC results at a glance — the three standards that together define modern email authentication. A message with all three passing is authenticated end-to-end. Any failure is worth investigating: it may indicate a spoofed sender, a phishing attempt, a misconfigured mail server, or a legitimate message caught by a configuration error.
The Routing tab reconstructs the delivery path in chronological order from the originating server to your inbox, with per-hop timing. Unusual delays, unexpected relay servers, or unrecognised origin IPs can all be spotted here. The origin IP — extracted from the oldest Received header — represents the actual network address that first injected the message, which cannot be spoofed the way the From header can.
Authentication results explained -- what each outcome means
The Authentication-Results header determines whether an email is legitimate. These are the most common result combinations.
SPF pass confirms the sending server is authorised by the domain's DNS. DKIM pass confirms message content was not modified in transit. DMARC pass with p=reject means the domain enforces its policy. Two hops and under one second total delivery time indicates clean, direct delivery with no suspicious relay involvement.
The From: header claims the email is from victim.com but the actual infrastructure belongs to attacker.com. SPF fails because attacker.com's servers are not authorised for victim.com. DKIM is absent entirely. This is a classic Business Email Compromise (BEC) attempt. The p=reject DMARC policy caused receiving servers to block delivery.
SPF softfail (~all) means the sending server is not in the authorised list but the domain has not explicitly blocked it. DKIM still passes and DMARC passes on DKIM alignment. The p=none policy means no enforcement action is taken. This is typical of domains in DMARC monitoring mode before upgrading to quarantine or reject.
Email forwarding breaks SPF because the forwarding server's IP is not in the original sender's SPF record. DKIM passes because the signature travels with the message intact. DMARC passes on DKIM alignment so the message is delivered despite the SPF failure. This is normal behaviour for alumni forwarding, mailing lists, and server-side redirect rules.
Legitimate email from major providers typically delivers in 1-30 seconds via 2-4 hops. Twelve hops and a four-hour delay strongly suggest the message was held in a spam queue or passed through multiple untrusted relay servers. The absence of DKIM and a neutral SPF result add to the suspicion.
Frequently asked questions about email header analysis
Need a disposable email address?Generate a free, instant throwaway — zero signup, zero trace.
Get Free Temp Mail ->