Email Header Analysis: Trace the Origin of Any Email

Decode the hidden metadata in every email to reveal its true path across the internet

What Email Headers Are and Why They Matter

Every email carries two distinct parts: the visible message you read and a set of hidden metadata called headers. Headers are appended by every mail server that handles the message, creating a complete audit trail from sender to recipient. They reveal the originating IP address, the mail servers it passed through, authentication results (SPF, DKIM, DMARC), timestamps at each hop, and much more.

Email headers are indispensable for:

Most email clients hide headers by default. In Gmail, open a message, click the three-dot menu, and select "Show original." In Outlook, open the message properties and look for "Internet headers." The raw header block will look like a wall of technical text — but once you know what to look for, it tells a clear story.

Reading Received Headers: Tracing the Mail Path

The most important headers for tracing email origin are the "Received:" headers. Each mail server that handles the message prepends a new Received header, so you read them from bottom to top — the oldest (closest to the origin) is at the bottom, and the most recent (your mail server) is at the top.

A typical Received header looks like:

Received: from mail.attacker.com (mail.attacker.com [198.51.100.45])
        by mx.gmail.com with ESMTP id abc123
        for <victim@gmail.com>;
        Fri, 4 Apr 2026 10:23:14 -0700 (PDT)

This tells you: the server called mail.attacker.com with IP 198.51.100.45 connected to Gmail's mail server and delivered the message. The IP address in brackets is the critical piece — it cannot be forged because it is recorded by the receiving server from the actual TCP connection. The hostname in parentheses, however, is whatever the sending server claims to be — it can be forged.

Take the IP from the bottom-most Received header and look it up using our IP lookup tool to find the true geographic origin, ISP, and organization behind the email.

🛡️

Investigate Suspicious IPs and Servers

Run a free IP lookup to trace the origin of any email back to its source network.

Hide My IP Now

Authentication Headers: SPF, DKIM, and DMARC Results

Modern mail servers add an "Authentication-Results" header that summarizes whether the message passed SPF, DKIM, and DMARC checks. This is one of the most useful headers for quickly determining whether an email is legitimate.

Authentication-Results: mx.google.com;
  dkim=pass header.i=@paypal.com header.s=pp-dkim1;
  spf=pass (google.com: domain of service@paypal.com designates 66.211.169.3
             as permitted sender) smtp.mailfrom=service@paypal.com;
  dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=paypal.com

Understanding the results:

A phishing email claiming to be from your bank will often show dmarc=fail or missing authentication entirely — use our HTTP headers tool for additional header inspection capabilities.

Detecting Email Spoofing

Email spoofing is the practice of forging the "From" address to make a message appear to come from a trusted source. It is the foundation of most phishing attacks. Headers reveal the discrepancy between what is claimed and what is real.

Key indicators of spoofing:

Analyzing Delays and Diagnosing Delivery Issues

Headers also serve a practical operational purpose: diagnosing why a message took hours to arrive or was delayed. Each Received header includes a timestamp. Comparing timestamps between consecutive hops reveals exactly where the delay occurred.

For example, if the first Received header has a timestamp five minutes after the second-to-last one, there was a five-minute processing delay at that particular mail server. Common causes of delay include:

For persistent delivery failures, cross-reference the sending IP in our IP lookup tool and check it against known blacklists. A blacklisted IP will cause most receiving servers to reject or heavily delay messages.

Special Offer

Frequently Asked Questions

Can email headers be completely faked?

The visible headers like 'From,' 'Subject,' and even some 'Received' headers can be fabricated by the sender. However, the Received header added by the final receiving server (your mail provider) cannot be forged — it records the IP of the actual TCP connection. The originating IP in that header is trustworthy.

How do I view full email headers in Gmail?

Open the message in Gmail, click the three-dot menu (More) in the top-right of the message, and select 'Show original.' This opens a new tab with the complete raw headers and message source.

What does 'X-Spam-Score' mean in email headers?

Many mail servers run SpamAssassin or similar tools that assign a numerical spam score based on dozens of checks (sender reputation, content analysis, authentication failures, etc.). A higher score means the message looks more like spam. Scores above a threshold (often 5.0) cause the message to be marked as spam or rejected.

How can I find the real sender of an anonymous email?

Check the bottom-most Received header for the originating IP address — this is the IP of the server that first injected the message. Look it up with our <a href="/lookup">IP lookup tool</a> to find the ISP and location. If the sender used webmail, the X-Originating-IP header may reveal their actual client IP. Law enforcement can subpoena ISPs for subscriber records tied to that IP.

Special Offer×