Page contents
Instantly validate email headers with Sendmarc’s advanced analyzer Email headers are lines of metadata attached to every message that record its routing, sender and recipient details, timestamps, and authentication results. While hidden by default, they can be viewed to confirm an email’s legitimacy and trace its delivery path.
Email headers reveal where a message was sent from through the Received fields, mapping each server it passed through. This routing data, combined with the authentication results of Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC), helps expose fraudulent emails and verify sender legitimacy.
Start by locating the header you want to analyze. Then check whether the From field matches the original Received line, review the Date for unusual timestamps, and confirm SPF, DKIM, and DMARC have passed.
Each Received line records a server that handled the message. Reading them from bottom to top shows the full delivery path.
A raw email header reveals the full, unformatted metadata – including routing hops, authentication outcomes, and server details – enabling a precise analysis of the message’s path and integrity.
Ready to analyze your own headers?
Use Sendmarc’s email header analyzer to validate email headers in seconds – no manual parsing required.
0101019a6e25344-863a0ee4-797e-498c-8dfb-1a9cfad6abce-000000@mail.example.com[email protected][email protected]Meeting ReminderTue, 11 Nov 2025 09:00:00 +0000<[email protected]>spf=pass (sender IP is 2b00:1450:4884:20::602) smtp.mailfrom=example.com; dkim=pass (signature was verified) header.d=example.com;dmarc=pass action=none header.from=example.com;compauth=pass reason=100This header represents a trustworthy, authenticated email.
0101019a6e25344-863a0ee4-797e-498c-8dfb-1a9cfad6abce-000000@mail.phishyexample.com[email protected][email protected]Tue, 11 Nov 2025 09:00:00 +0000<[email protected]>spf=fail (sender IP is 192.0.2.123) smtp.mailfrom=trustedbank.com; dkim=none (no signature) header.d=trustedbank.com; dmarc=fail action=reject header.from=trustedbank.comThese inconsistencies point to a phishing attempt.
Combining email header analysis with SPF, DKIM, and DMARC builds a stronger defense against impersonation and phishing. Regularly reviewing headers and authentication results helps your organization detect threats early and prevent domain spoofing.
Protect your domain now – book a demo to see how Sendmarc’s enterprise DMARC solution can secure your inbox and strengthen your email environment.
How do I check the source of an email?
To check the source of an email, inspect the Received lines in the header and find the last trusted “hop”. This helps confirm whether the message originated from a legitimate server.
What does “Received” mean in a header?
The Received field in an email header lists every email server that handled the message on its journey. Each entry helps trace where the email was relayed.
How do I read email “hops”?
To read email hops, review the Received lines from bottom to top. The first line at the bottom shows the original sending server, revealing the complete route to your inbox.
How do I read raw email data?
To read raw email data, open the full header in your email client and examine fields such as From, Return-Path, and Authentication-Results.
How do I read email headers to detect phishing?
To detect phishing through email headers, look for failed SPF, DKIM, or DMARC results, suspicious IP addresses, unknown relays, and mismatched From and Return-Path domains. These red flags often indicate impersonation or spoofing attempts.