Mail header analyzer

Paste the full header block exactly as received. The body is optional.

Paste the headers of a received message to decode the participants, authentication verdicts and routing path.

Decode what actually happened to a message

Email headers are the only reliable trace of a delivery path. They tell you who sent the message, which infrastructure relayed it, and how each security check evaluated the payload. By pasting the raw header block, the analyzer structures the information and highlights the parts that matter: aligned domains, authentication verdicts and forwarding hops.

Participants at a glance

  • Visible identities. The tool gathers From, Sender, Reply-To, To, Cc and Bcc values. You can quickly compare the display names with the underlying addresses and spot spoofing attempts.
  • Return-Path and envelope sender. Seeing the bounce domain alongside the visible From header helps diagnose SPF alignment issues or forwarding loops.
  • Message identifiers. The analyzer extracts the subject, message ID and sending date (normalised to RFC 3339 when possible) for precise ticket references.

Authentication verdicts explained

  • SPF, DKIM, DMARC. Each mechanism is summarised with the evaluated domain, scope or selector and the result returned by the recipient server. Alignment is clearly flagged so you know whether the visible From matches the authenticated identity.
  • Received-SPF trace. When relays add Received-SPF, you can see the evaluated IP, envelope-from and any upstream comment. This is invaluable when third parties forward messages on your behalf.
  • Authentication-Results map. Every Authentication-Results and ARC-Authentication-Results header is parsed into a readable list. The original raw value stays visible for audit trails.

Follow the routing path

  • Received chains. The tool preserves the chronological list of Received and X-Received headers to show every hop, including MTA handovers or Google-specific relays.
  • Forwarding hints. Fields such as Delivered-To, X-Original-To, X-Forwarded-To and Google forwarding indicators highlight aliasing, catch-alls and mailing list flows.

Use the analyzer whenever you review abuse reports, debug alignment failures or document a deliverability incident. Pair it with the DMARC, DKIM and SPF inspectors to correlate the theoretical configuration with real-world behaviour.