Decode what actually happened to a message
Email headers are the only reliable trace of a delivery path. They tell you who sent the message, which infrastructure relayed it, and how each security check evaluated the payload. By pasting the raw header block, the analyzer structures the information and highlights the parts that matter: aligned domains, authentication verdicts and forwarding hops.
Participants at a glance
- Visible identities. The tool gathers
From,Sender,Reply-To,To,CcandBccvalues. You can quickly compare the display names with the underlying addresses and spot spoofing attempts. - Return-Path and envelope sender. Seeing the bounce domain alongside the visible From header helps diagnose SPF alignment issues or forwarding loops.
- Message identifiers. The analyzer extracts the subject, message ID and sending date (normalised to RFC 3339 when possible) for precise ticket references.
Authentication verdicts explained
- SPF, DKIM, DMARC. Each mechanism is summarised with the evaluated domain, scope or selector and the result returned by the recipient server. Alignment is clearly flagged so you know whether the visible From matches the authenticated identity.
- Received-SPF trace. When relays add
Received-SPF, you can see the evaluated IP, envelope-from and any upstream comment. This is invaluable when third parties forward messages on your behalf. - Authentication-Results map. Every
Authentication-ResultsandARC-Authentication-Resultsheader is parsed into a readable list. The original raw value stays visible for audit trails.
Follow the routing path
- Received chains. The tool preserves the chronological list of
ReceivedandX-Receivedheaders to show every hop, including MTA handovers or Google-specific relays. - Forwarding hints. Fields such as
Delivered-To,X-Original-To,X-Forwarded-Toand Google forwarding indicators highlight aliasing, catch-alls and mailing list flows.
Use the analyzer whenever you review abuse reports, debug alignment failures or document a deliverability incident. Pair it with the DMARC, DKIM and SPF inspectors to correlate the theoretical configuration with real-world behaviour.