| Field | Value | Copy |
|---|---|---|
| {{ key }} | {{ value || '—' }} |
| # | From | By | Protocol | Delay (s) | Copy |
|---|---|---|---|---|---|
| {{ hop.idx }} | {{ hop.from }} | {{ hop.by }} | {{ hop.with }} | {{ hop.delay ?? '—' }} | |
| No Received headers found. | |||||
| Mechanism | Result | Copy |
|---|---|---|
| {{ key }} | {{ value || '—' }} |
| Field | Value | Copy |
|---|---|---|
| {{ row.label }} | {{ row.value }} |
{{ headerBlock }}
Email headers are structured records that show who sent a message, how it moved between servers, and what those servers concluded about authenticity. Reading them helps confirm sender identity, spot forwarding, and explain slow delivery without opening the body.
The header tells a story in timestamps and domains, so you can compare what the sender claimed with what receiving systems observed. A quick scan often reveals alignment with common authentication checks and whether routing introduced unusual delays or clock issues.
Paste a full header and review a concise summary, then look at the path hop by hop and the main authentication outcomes. If an address looks right but alignment fails, treat it with caution and seek corroboration before trusting the content.
Use consistent samples from the same source when comparing results. Repeating the check after a resend can show whether a transient network delay or a misconfigured sender caused a previous warning.
Email headers (also called the Internet Message Format header) contain routing lines and verdicts added by mail transfer agents. Key mechanisms referenced here are Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), Domain‑based Message Authentication, Reporting, and Conformance (DMARC), and the Authenticated Received Chain (ARC).
The analyzer extracts each Received line to reconstruct the path and computes hop delays in seconds, a total path time, and a count of hops. It also parses SPF, DKIM, DMARC, and ARC results from Authentication‑Results, and checks relaxed DMARC alignment by comparing organizational domains using an eTLD‑plus‑one approximation.
Results are presented as pass, fail, or none for each mechanism and as simple warnings for clock inconsistencies, missing required fields, unusually high hop counts, and long end‑to‑end times. A 0–10 quality score summarizes these signals, rewarding passes and reasonable timing while penalizing missing data or anomalies.
Interpret timing and alignment together. Passing authentication with poor alignment suggests forwarding or configuration gaps, while clean alignment with long delays points to route congestion or slow intermediaries rather than spoofing.
from, by, with, IP, and date.| Symbol | Meaning | Unit/Datatype | Source |
|---|---|---|---|
| Δti | Hop‑to‑hop delay at step i | seconds (integer) | Derived |
| Ttot | Total path delay (first minus last hop time) | seconds (integer) | Derived |
| Nhop | Number of Received hops | count (integer) | Derived |
| Aspf, Adkim, Admarc | Authentication verdicts | categorical | Parsed |
Total path delay Ttot is computed as the difference between the first and last hop times. Negative hop delays indicate clock or ordering anomalies and are surfaced as warnings, not accumulated.
| Field | Type | Min | Max | Step/Pattern | Error Text |
|---|---|---|---|---|---|
| Header textarea | text | — | — | Unfolding of continuations; no regex constraints | — |
| File upload | .eml, .txt | — | — | Accepts RFC 5322 headers; reads text only | — |
| Hop limit | number | 0 | — | step 1 | — |
| Input | Accepted Families | Output | Encoding/Precision | Rounding |
|---|---|---|---|---|
| RFC 5322 header text | Paste or load .eml/.txt | Summary, path, auth snapshots | CSV strings and DOCX documents | Nearest second for timing |
with= protocol tokens or custom notations.i= sequence gaps or cv=fail notes.h= list missing From or Subject.No data is transmitted or stored server‑side. Use test headers when assessing sensitive messages and avoid sharing live identifiers unnecessarily.
Email header inspection yields a routing view and authentication snapshot you can triage quickly.
No. Parsing and exports occur on your device, and generated files are created locally. No server receives your data.
Avoid pasting sensitive content not needed for analysis.Delays are computed from hop timestamps and rounded to seconds. Accuracy depends on sender and relay clocks; negative gaps are flagged but not summed.
Paste a full RFC 5322 header or load a .eml or .txt message file. Only the header portion is parsed; the body is ignored.
No. It inspects header fields for DKIM parameters and presence but does not fetch keys or validate signatures.
Yes, once loaded. All operations are performed locally and do not require requests to external services for parsing.
There is no sign‑in or payment flow in this component. Availability and hosting terms are set by the site where it runs.
The organizational domain in Header.From does not match the domains used by SPF or DKIM. Forwarding or misconfiguration is possible; verify sender intent.
Copy individual values or export summaries, path tables, and authentication snapshots as documents you can attach to tickets or incidents.