TOOLS / EMAIL HEADERS
Email Header Analyzer
Paste raw email headers (from your client’s “view source” or “show original”). We trace the Received: chain, check SPF/DKIM/DMARC pass status, and flag common spoofing indicators.
What it does
Email headers tell the full delivery story: every hop the message traversed, the authentication results at the receiving end, the From/Return-Path/Reply-To trinity that phishing-aware analysts inspect. Our analyzer takes raw headers (the “Show Original” or “View Source” output from your mail client), parses them per RFC 5322, reconstructs the Received chain in chronological order, and surfaces spoofing red flags like mismatched From vs Return-Path domains.
How to use it
- In Gmail: open message → 3-dot menu → "Show original".
- In Outlook: open message → File → Properties → "Internet Headers" pane.
- Copy ALL the headers (everything before the empty line that precedes the body).
- Paste in the textarea here and click "Analyze headers".
- Read the Received chain (oldest hop first), the authentication-results panel, and any red flags raised.
Common use cases
Frequently asked questions
What is the "Received chain"? +
What does Authentication-Results mean? +
Why does From != Return-Path matter? +
Should I trust SPF/DKIM pass? +
Is my email content read? +
Related tools
Related coverage on Ciphers Security
- Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes
- Costa Rica Joins Have I Been Pwned as the 42nd Government
- LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures
- Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics
- Vercel's v0.dev AI Tool Weaponized for Phishing Campaigns Targeting Microsoft, Nike Users
Free for everyone, no signup required. Tool runs at /tools/email-header-analyzer/ — bookmark or share.