Field | Value |
---|---|
{{ key }} |
{{ value || '—' }}
|
# | From | By | Protocol | Delay (s) | |
---|---|---|---|---|---|
{{ hop.idx }} | {{ hop.from }} | {{ hop.by }} | {{ hop.with }} | {{ hop.delay ?? '—' }} |
Email headers are the routing footprints and policy proofs that accompany every message you receive. They preserve each server hop, authentication outcome, and content hint mandated by internet standards such as RFC 5322. Examining them is indispensable when diagnosing spoofing attempts, unexplained delivery delays, or failing compliance checks, yet manual inspection remains error-prone and time-consuming.
This analyzer accepts the raw header block, unfolds multi-line fields, and parses every record into structured sets. It computes hop-to-hop delays, extracts SPF, DKIM, DMARC, and ARC verdicts, and assembles a concise summary table. Visual timelines rendered by a lightweight charting layer reveal bottlenecks while one-click exports supply clean comma-separated reports for further study.
You might use the tool when a campaign lands in spam, an auditor requests proof of domain alignment, or a customer questions message timing. Paste the header, inspect delays and passes, and forward the CSV to operations in seconds. Avoid sharing personally identifiable addresses publicly; headers often expose sender and recipient domains.
Email transport relies on a chain of Mail Transfer Agents (MTAs) that stamp a new “Received” header and, where implemented, append Authentication-Results lines for SPF, DKIM, DMARC, and ARC. These records form a chronological ledger of server hops, IP addresses, and policy verdicts. Comparing adjacent timestamps quantifies network latency, while inspecting verdict tags reveals alignment failures that degrade deliverability or enable impersonation.
Authentication-Results
verdicts for SPF, DKIM, DMARC, and ARC.Received
clauses and derive hop order.Authentication verdicts appear as pass, fail, or n/a. Hop delays display in whole seconds; a dash indicates a missing or invalid timestamp. Summary metrics such as “Domain match” and “Auth pass count” help you spot alignment gaps at a glance.
Parameter | Meaning | Datatype |
---|---|---|
header_text | Raw RFC 5322 header block supplied by the user | string |
received | Array of individual Received clauses | string[] |
auth_results | Extracted SPF, DKIM, DMARC, ARC verdicts | object |
hop_delay | Time between consecutive hops in seconds | number |
summary_fields | Key metrics assembled for quick review | object |
Authentication-Results
block is evaluated.Received
lines cannot compute timing.Methodology aligns with RFC 5322 (Message Format), RFC 7208 (SPF), RFC 6376 (DKIM), RFC 7489 (DMARC), and RFC 8617 (ARC). Comparative studies by the Messaging, Malware and Mobile Anti-Abuse Working Group validate timestamp-derived latency for forensic analysis.
The tool handles only header text and performs every calculation inside your browser, supporting GDPR and similar data-minimisation principles.
Follow these steps to transform a raw header into actionable diagnostics.
.eml
/.txt
file.No. All parsing and visualisation run locally; the header never leaves your device.
The analyzer accepts plain .txt
or raw .eml
message files containing RFC 5322-compliant headers.
A dash means the tool could not compute a numeric delay, usually because a hop lacks a valid or sequential timestamp.
Process one message at a time to maintain accurate sequencing; paste a new header or clear the field before analysing the next.
pass means the sending domain’s policy validated; fail indicates a misalignment that may lead to spam filtering.