OSINT Email Header Analyzer Free
Analyze email headers for spoofing detection, sender tracing, and routing intelligence.
Paste headers, drag & drop .eml files, or browse to upload — all processing happens in your browser.
Ctrl+K or / to focus · Ctrl+Enter to analyze
How to Extract Email Headers
Step-by-step instructions for the most popular email clients.
Gmail
1. Open the email
2. Click the three-dot menu (More)
3. Click "Show original"
4. Click "Download Original" to save as .eml — or copy the headers
Outlook (Web)
1. Open the email
2. Click the three-dot menu (Actions)
3. View > View message source
4. Select all and copy — or use "Save as" (.eml) if available
Outlook (Desktop)
1. Drag the email from your inbox to a folder to save as .eml
2. Or: double-click the email > File > Save As > choose .msg or .eml
3. Upload the saved file here for best results
Yahoo Mail
1. Open the email
2. Click the three-dot menu (More actions)
3. "View raw message"
4. Select all and copy — or right-click the page and "Save As" to save the raw source
Apple Mail
1. Select the email
2. File > Save As… > choose "Raw Message Source" format
3. Or: View > Message > All Headers, then select all and copy
Thunderbird
1. Select the email
2. File > Save As > File (.eml)
3. Upload the saved .eml file here — or use View > Message Source (Ctrl+U) and copy
What Email Headers Reveal for OSINT
Email headers contain a wealth of metadata that goes far beyond what's visible in an email client.
Sender Identification
Headers reveal the true sending server, originating IP address, email client, and operating system — metadata the sender may not realize they're exposing.
Route Tracing
Every server that handled the email adds a "Received" header. This creates a complete audit trail from sender to recipient, showing the geographic and network path.
Spoofing Detection
Authentication protocols (SPF, DKIM, DMARC) in headers reveal whether the sender is who they claim to be. Failed checks are strong indicators of phishing or impersonation.
Timeline Evidence
Timestamps on each hop create a precise timeline of email delivery. Unusual delays or time inconsistencies can indicate tampering or queueing.
How It Works Without Sending Your Data
Every other header analyzer sends your data to a remote server. Ours doesn't. Here's why that's possible — and why you can trust the results.
You paste the headers — they stay in your browser
When you paste email headers or upload an .eml file, the text never leaves your device. There are zero network requests — you can disconnect from the internet after the page loads and the tool works exactly the same.
Authentication results are already in the headers
The SPF, DKIM, and DMARC results you see here were already computed by the receiving mail server (Gmail, Outlook, etc.) when the email was delivered. The server ran the DNS lookups, checked the cryptographic signatures, and wrote the verdict directly into an Authentication-Results header. We simply read and interpret what's already there — no live DNS queries or server-side verification needed.
Everything else is text parsing
Routing analysis, IP extraction, spoofing scoring, delay calculations, and sender profiling are all done through pattern matching on the raw text you provided. The spoofing risk score, for example, checks whether the Reply-To domain matches the From domain — that's a simple string comparison, not an internet lookup.
Verify it yourself
Open your browser's Developer Tools (F12), switch to the Network tab, then paste headers and click Analyze. You'll see exactly zero requests fired. This is by design — for investigators handling sensitive email evidence, privacy isn't optional.
Red Flags to Look For
Key indicators that an email may be spoofed, phished, or otherwise suspicious.
Authentication Failures
Failed SPF, DKIM, or DMARC checks mean the email failed the sender verification tests that legitimate email should pass. A DMARC failure with p=REJECT policy is especially concerning.
Address Mismatches
When the Reply-To address, Return-Path, or envelope sender doesn't match the From address, someone may be redirecting responses. This is a classic phishing technique.
Display Name Spoofing
If the display name contains an email address like "CEO@company.com" but the actual sending address is different, the sender is trying to trick the recipient.
Unusual Routing
Excessive delays between hops, time-travel (timestamps going backwards), or routing through unexpected countries can indicate message manipulation or suspicious relay servers.
For Cybersecurity & Criminal Investigators
This tool is a first-response triage instrument — not a forensic lab. Understanding its boundaries will make you a better investigator.
What This Tool Does Well
Quickly determine if an email warrants deeper investigation. The spoofing risk score and authentication summary give you an instant read on legitimacy.
Extracts every IP address with source context (which hop, which header). Click through to IP Lookup for geolocation and ISP — the information you need to draft a preservation request or subpoena.
Hop timestamps create a precise delivery timeline. Correlate these with access logs, victim activity, and other case evidence to establish when events occurred.
The visual risk score, plain-English explanations, and structured layout make it easy to brief prosecutors, judges, management, or non-technical team members on email evidence.
Use Campaign Analysis mode to batch-compare headers from multiple phishing or spam samples. Automatically identifies shared sending IPs, common routing domains, and consistent infrastructure patterns — evidence that emails originate from the same attacker or coordinated campaign.
What This Tool Cannot Do
Reading an Authentication-Results header is not the same as independently verifying a DKIM signature. For evidentiary proof that an email is authentic (or forged), you need cryptographic verification against the signing domain's public key.
Headers give you IP addresses, not people. Mapping an IP to a subscriber requires ISP records obtained through legal process (subpoena, court order, or MLAT for foreign IPs).
This tool processes whatever text you paste. It cannot tell whether headers were altered, truncated during forwarding, or fabricated entirely. Chain of custody must be established separately.
SPF records, DKIM keys, and DMARC policies may have changed since the email was delivered. The Authentication-Results header reflects a point-in-time check that may no longer be reproducible.
Any header added before the email reaches the first trusted server (the receiving mail provider) could have been fabricated by the sender — including fake Received hops that look like legitimate internal routing.
Evidence Integrity Warning
Headers are plain text — anyone can modify them before handing them to you. For evidentiary purposes, always obtain the original .eml file directly from the mail server or the recipient's mailbox (not forwarded), and document your chain of custody. This tool accepts whatever text is pasted in and has no way to verify provenance.
Time Is Evidence
ISP subscriber records typically have 90-day to 1-year retention periods. DKIM public keys are rotated regularly. DNS records change. Use this tool to quickly identify the IPs and timestamps you need, then initiate legal process immediately — the evidence window is closing from the moment the email was sent.
Frequently Asked Questions
It doesn't need to. When the email was originally delivered, the receiving mail server (e.g., Gmail or Outlook) already performed the DNS lookups, verified the cryptographic signatures, and recorded the results in the "Authentication-Results" header. This tool reads those pre-computed verdicts directly from the headers you provided. No live DNS queries or external verification is required — everything you need is already embedded in the headers.
Yes — your email headers never leave your device. Whether you paste headers, drag & drop an .eml file, or browse to upload, all parsing, scoring, and analysis runs entirely in your browser using JavaScript. Nothing is sent to any server, and nothing is stored or logged. You can verify this yourself: open your browser's Developer Tools (F12), go to the Network tab, then analyze some headers. You'll see zero network requests. This makes the tool safe to use with sensitive investigation data, even in air-gapped environments.
Yes. Since all processing is 100% client-side, your headers stay on your device. It's worth knowing that email headers contain routing metadata (server names, IP addresses, timestamps) but never the email body or attachments. You can also disconnect from the internet after loading the page — the tool works identically offline.
You can upload .eml files (standard email format exported from Gmail, Thunderbird, Apple Mail, and others), .txt files containing raw header text, and .msg files (Microsoft Outlook format). You can either drag & drop files directly onto the upload area or click "Browse Files" to select them. For .eml files, the tool automatically strips the message body and analyzes only the headers.
Email headers reveal the servers the email passed through, the sender's IP address (sometimes), the email client and operating system used, authentication results (SPF, DKIM, DMARC), and timing information. For OSINT investigations, this can help identify the true origin of an email, detect spoofing attempts, profile the sender's technical environment, and provide leads for further investigation.
Look for failed SPF, DKIM, or DMARC checks, mismatches between the From address and Return-Path, suspicious Reply-To addresses pointing to different domains, and display name spoofing (where the display name contains a fake email). Our spoofing risk score automatically evaluates ten weighted factors — including typosquatting/look-alike domain detection and thread authenticity verification — and gives you a single confidence rating from 0 to 100, with a plain-English explanation for each factor.
SPF (Sender Policy Framework) checks if the sending server is authorized to send for the claimed domain — like checking if a letter carrier's badge is valid. DKIM (DomainKeys Identified Mail) uses a cryptographic signature to verify the email hasn't been tampered with in transit — like a wax seal on an envelope. DMARC (Domain-based Message Authentication) ties SPF and DKIM together and tells receiving servers what to do when checks fail (accept, quarantine, or reject). Together, they form the standard for verifying a sender's identity.
Some headers can be forged by the sender, particularly the "From" and "Reply-To" fields. However, "Received" headers added by intermediate servers are much harder to fake since each server in the chain appends its own. The Authentication-Results header is especially trustworthy because it's computed by the receiving server — the sender cannot control what it says. Our header completeness check will flag any missing critical headers that might indicate tampering or truncation.
X-headers are non-standard headers added by mail clients and servers. They can reveal the email client and version (X-Mailer), the sender's IP (X-Originating-IP), the email provider (X-Google-DKIM-Signature, X-MS-Exchange-*), and spam assessment scores. This metadata can be invaluable for profiling the sender's environment and corroborating other evidence.
Click any IP address in the hop timeline or IP intelligence table to automatically open our IP Lookup tool in a new tab with that IP pre-filled and searched. Use "Investigate All IPs" to look up every public IP found in the headers at once. This gives you geolocation, ISP, and network details for each server in the delivery chain — all without leaving your analysis.
Most email header analysis tools are built for IT administrators troubleshooting deliverability. This tool is purpose-built for OSINT and cybersecurity investigators. Key differences: (1) Composite spoofing risk scoring (0-100) with ten weighted factors including typosquatting detection and thread authenticity — not just raw pass/fail. (2) Visual hop-by-hop timeline with delay visualization and anomaly detection. (3) Automatic IP extraction with one-click geolocation lookup via our IP Lookup tool. (4) Campaign analysis mode — compare multiple emails to identify shared infrastructure, common IPs, and coordinated phishing campaigns. (5) Full JSON export of structured analysis data for integration with SIEM, ticketing, or OSINT platforms. (6) Sender profiling from X-headers (email client, OS, provider detection). (7) Defanged IOC export for safe sharing in reports and ticketing systems. (8) SHA-256 evidence hashing for chain-of-custody documentation. (9) RFC 2047 encoded display name decoding and thread header (In-Reply-To/References) parsing. (10) 100% client-side — no data ever leaves your browser, making it safe for sensitive investigations. Other tools send your headers to their servers for processing.
Yes. Once the page has loaded in your browser, you can disconnect from the internet and the tool works identically. All analysis — header parsing, spoofing scoring, authentication checking, IP extraction, and timeline rendering — runs entirely in your browser. This makes it suitable for air-gapped forensic workstations and environments where sensitive data must not leave the network.
If the original receiving server didn't include an Authentication-Results header — or if the email was forwarded in a way that stripped those headers — this tool will have less data to work with and will flag the missing information as a header completeness warning. However, the spoofing risk score also evaluates non-authentication signals like Reply-To mismatches, Return-Path discrepancies, display name tricks, typosquatting/look-alike domain detection, thread authenticity (Re:/Fwd: without threading metadata), and routing anomalies, so it can still flag suspicious emails even without authentication headers.
Campaign Analysis mode lets you paste headers from multiple emails and analyze them together to identify shared infrastructure. It finds common IP addresses, shared routing domains, and consistent patterns across a set of phishing or spam samples. Use it when you receive multiple suspicious emails and want to determine if they originate from the same attacker or infrastructure — shared sending IPs and routing domains are strong indicators of coordinated campaigns.
The "Export JSON" button downloads the complete analysis as a structured JSON file. It includes the message summary, spoofing risk assessment (with all factor scores), authentication results, hop details, extracted IPs, IOCs, and sender profile. This structured format is designed for integration with SIEM platforms, incident response ticketing systems, threat intelligence databases, or custom OSINT workflows. You can also use it to archive analysis results for case documentation.
The spoofing risk score includes a "Look-alike Domain" check that detects typosquatting — when an attacker registers a domain that looks nearly identical to a trusted brand (e.g., "gmai1.com" instead of "gmail.com"). It uses three techniques: (1) a database of known typosquat patterns for major email providers, (2) Levenshtein distance to catch single-character substitutions, and (3) confusable character normalization (e.g., "rn" looks like "m", "0" looks like "o", "1" looks like "l"). If the From domain closely resembles a well-known domain, it will be flagged.
In-Reply-To and References are threading headers defined in RFC 5322. They contain Message-IDs of earlier emails in a conversation thread. Legitimate replies always include these headers, so if an email has a Subject starting with "Re:" or "Fwd:" but no In-Reply-To or References header, it was likely fabricated to look like part of an existing conversation — a social engineering technique. This tool automatically checks for this mismatch as part of the spoofing risk score.
When you analyze headers, the tool generates a SHA-256 cryptographic hash — a unique fingerprint of the exact text that was analyzed. Record this hash in your case notes alongside the timestamp. If the same headers are re-analyzed later and produce a different hash, the input was modified. This helps establish that the evidence you documented matches what was originally examined. For best results, upload the original .eml file rather than pasting text, since copy-paste can inadvertently alter whitespace or encoding.
Learn More: How to Detect a Spoofed Email
A step-by-step guide covering SPF, DKIM, and DMARC verification, routing path analysis, originating IP examination, and common spoofing patterns investigators encounter in real cases.
Read the Full GuideLevel Up Your OSINT Investigation Toolkit
Forensic OSINT provides professional-grade investigation tools — email header analysis, IP geolocation, username search, and more — with privacy-first, client-side processing.

