Field | Value |
---|---|
{{ key }} |
{{ value || '—' }}
|
# | From | By | Protocol | Delay (s) | |
---|---|---|---|---|---|
{{ hop.idx }} | {{ hop.from }} | {{ hop.by }} | {{ hop.with }} | {{ hop.delay ?? '—' }} |
Email headers are structured text blocks defined by RFC 5322 that record routing, authentication, and content metadata for every message that travels through the Simple Mail Transfer Protocol. They reveal the servers that handled the message, the sender’s claimed identity, and numerous trust-signals used by spam filters and incident responders.
This tool unfolds line-wrapped fields, builds a canonical key-value map, and uses pattern matching to extract the “Received” chain, authentication outcomes, and salient envelope attributes. A lightweight charting layer visualises hop-to-hop delays, while export helpers transform each view into clipboard-ready or downloadable comma-separated values for further analysis.
For instance, a deliverability engineer can paste a problematic header, instantly confirm whether SPF or DKIM failed, and identify the longest transport delay within seconds, but always corroborate findings with server logs before escalating false-positive spoofing alerts.
SMTP relays append a new “Received” header every time a message transits a server. Each record may include originating host, receiving host, protocol, timestamp, and IP address. Authentication headers summarise independent checks: Sender Policy Framework, DomainKeys Identified Mail, Domain-based Message Authentication Reporting and Conformance, and Authenticated Received Chain. By parsing these elements you can trace the full delivery path, measure cumulative latency, and judge whether the claimed sender aligns with policy.
received:
block; extract from, by, with, timestamp, and IP.authentication-results:
field; record SPF, DKIM, DMARC, and ARC verdicts.Indicator | Value Band | Meaning |
---|---|---|
Hop delay | 0–1 s | Normal network latency |
Hop delay | 1–5 s | Congestion or grey-listing likely |
Hop delay | > 5 s | Server throttling or queue backlog |
Auth result | pass | Check succeeded |
Auth result | fail | Check failed—investigate |
.eml
/.txt
.Sample delay calculation (three hops):
Concepts are grounded in RFC 5321, RFC 5322, RFC 7208, RFC 6376, RFC 7489, and RFC 8617, which collectively define SMTP transport and modern email authentication measures.
This analysis operates entirely in-browser and never transmits header data to external services.
Follow these steps to inspect a header.
.eml
or .txt
extension.No. All processing occurs locally; nothing leaves your browser.
At minimum include the entire block from Return-Path
down to the first blank line before the body.
One relay’s clock may drift or use a different time-zone, producing apparent negative values.
No. It only shows the sending IP is authorised for the domain; content may still be malicious.
Process each header individually, then merge the exported CSVs in your preferred spreadsheet.