For Sales: 888-800-4644 For Support: 973-777-7227 “YOUR TECHNOLOGY MANAGED”
Free Email Header Analyzer
Paste raw email headers to trace the delivery path, verify SPF/DKIM/DMARC authentication, measure hop-by-hop latency, and flag potential anomalies. This tool parses multiple authentication sources including gateway, relay, and ARC results for a complete picture. Everything runs in your browser — no data is sent to any server. Built for IT teams managing email security for businesses in NJ, NY, PA, and FL.
How to get email headers
Gmail: Open the email → Click the three dots (⋮) → "Show original"
Outlook (desktop): Open the email → File → Properties → Copy from "Internet headers"
Outlook (web): Open the email → Click the three dots (…) → View → "View message source"
Apple Mail: Open the email → View → Message → "All Headers"
Thunderbird: Open the email → View → Message Source (Ctrl+U)
Email Authentication & DMARC Alignment
Delivery Path (Hop-by-Hop Trace)
Key Header Fields
Anomalies & Warnings
Need Help Investigating an Email Threat?
Our co-managed IT team works alongside your internal staff to investigate phishing attempts, configure SPF/DKIM/DMARC, and harden your email security posture.
What are email headers and why should I analyze them?+
Email headers are metadata attached to every email message that record the complete delivery path from sender to recipient. They include server names, IP addresses, timestamps, and authentication results. Analyzing headers helps IT staff verify whether an email is legitimate, diagnose delivery delays, identify spoofing attempts, and troubleshoot routing issues. For businesses handling sensitive data or subject to compliance requirements, header analysis is a critical part of email security.
What do SPF, DKIM, and DMARC mean in email headers?+
SPF (Sender Policy Framework) verifies that the sending server is authorized to send mail for the domain. DKIM (DomainKeys Identified Mail) uses cryptographic signatures to verify the message was not altered in transit. DMARC (Domain-based Message Authentication, Reporting and Conformance) ties SPF and DKIM together with a policy that tells receiving servers what to do when checks fail. When all three pass, you can be more confident the email is legitimate and has not been tampered with.
Why might SPF or DKIM fail at the destination but pass at a gateway?+
When email flows through a security gateway or relay (like Proofpoint, Mimecast, or Barracuda), the gateway evaluates SPF and DKIM against the original sending server. After the gateway processes and forwards the email, the destination server sees the relay IP (not the original sender IP) for SPF, and the message body may have been modified (breaking DKIM signatures). This is why checking both gateway and destination authentication results gives you the full picture. Our tool shows results from all available authentication sources so you can see exactly where and why checks passed or failed.
Is my email data safe when I use this tool?+
Yes. This tool runs entirely in your web browser using client-side JavaScript. The email headers you paste are never sent to our servers or any third party. All parsing and analysis happens locally on your device. When you close or refresh the page, the data is gone. This makes it safe to use with headers from sensitive or confidential emails.
How do I find email headers in Outlook or Gmail?+
In Gmail, open the email, click the three-dot menu in the top right, and select "Show original." In Outlook desktop, open the email, go to File, then Properties, and copy the text from the "Internet headers" box. In Outlook on the web, open the email, click the three dots, go to View, then "View message source." The full header text can then be copied and pasted into the analyzer above.
What does it mean if SPF or DKIM fails?+
An SPF failure means the sending server's IP address is not listed in the domain's authorized senders. A DKIM failure means the cryptographic signature on the email could not be verified, suggesting the message may have been altered after it was sent. Either failure can indicate a spoofed or phishing email, though legitimate emails can sometimes fail these checks due to forwarding, mailing lists, relay gateways, or misconfigured DNS records. If you see failures on business-critical emails, it is worth investigating further or consulting your IT team.
This tool provides informational analysis only and does not constitute security advice. For a comprehensive email security assessment, contact our team. On-Site Technology serves businesses with 5–250 users across NJ, NY, PA, and FL.