OSINT Email Header Analyzer Free

Analyze email headers for spoofing detection, sender tracing, and routing intelligence.
Paste headers, drag & drop .eml files, or browse to upload — all processing happens in your browser.

100% Client-Side ProcessingNo Data Sent to Any ServerComplete Privacy
info3 of 3 free uses remaining· Sign up free for 100 uses/month — no credit card required
Try a sample:
cloud_uploadDrag & drop file hereTap to browse filesor
.eml.txt.msg
security Your data never leaves your browser. All processing is 100% client-side.

Ctrl+K or / to focus · Ctrl+Enter to analyze

Save history

How to Extract Email Headers

Step-by-step instructions for the most popular email clients.

mailGmail

1. Open the email

2. Click the three-dot menu (More)

3. Click "Show original"

4. Click "Download Original" to save as .eml — or copy the headers

mailOutlook (Web)

1. Open the email

2. Click the three-dot menu (Actions)

3. View > View message source

4. Select all and copy — or use "Save as" (.eml) if available

mailOutlook (Desktop)

1. Drag the email from your inbox to a folder to save as .eml

2. Or: double-click the email > File > Save As > choose .msg or .eml

3. Upload the saved file here for best results

mailYahoo Mail

1. Open the email

2. Click the three-dot menu (More actions)

3. "View raw message"

4. Select all and copy — or right-click the page and "Save As" to save the raw source

mailApple Mail

1. Select the email

2. File > Save As… > choose "Raw Message Source" format

3. Or: View > Message > All Headers, then select all and copy

mailThunderbird

1. Select the email

2. File > Save As > File (.eml)

3. Upload the saved .eml file here — or use View > Message Source (Ctrl+U) and copy

What Email Headers Reveal for OSINT

Email headers contain a wealth of metadata that goes far beyond what's visible in an email client.

person_pin

Sender Identification

Headers reveal the true sending server, originating IP address, email client, and operating system — metadata the sender may not realize they're exposing.

route

Route Tracing

Every server that handled the email adds a "Received" header. This creates a complete audit trail from sender to recipient, showing the geographic and network path.

gpp_bad

Spoofing Detection

Authentication protocols (SPF, DKIM, DMARC) in headers reveal whether the sender is who they claim to be. Failed checks are strong indicators of phishing or impersonation.

schedule

Timeline Evidence

Timestamps on each hop create a precise timeline of email delivery. Unusual delays or time inconsistencies can indicate tampering or queueing.

How It Works Without Sending Your Data

Every other header analyzer sends your data to a remote server. Ours doesn't. Here's why that's possible — and why you can trust the results.

1

You paste the headers — they stay in your browser

When you paste email headers or upload an .eml file, the text never leaves your device. There are zero network requests — you can disconnect from the internet after the page loads and the tool works exactly the same.

2

Authentication results are already in the headers

The SPF, DKIM, and DMARC results you see here were already computed by the receiving mail server (Gmail, Outlook, etc.) when the email was delivered. The server ran the DNS lookups, checked the cryptographic signatures, and wrote the verdict directly into an Authentication-Results header. We simply read and interpret what's already there — no live DNS queries or server-side verification needed.

3

Everything else is text parsing

Routing analysis, IP extraction, spoofing scoring, delay calculations, and sender profiling are all done through pattern matching on the raw text you provided. The spoofing risk score, for example, checks whether the Reply-To domain matches the From domain — that's a simple string comparison, not an internet lookup.

4

Verify it yourself

Open your browser's Developer Tools (F12), switch to the Network tab, then paste headers and click Analyze. You'll see exactly zero requests fired. This is by design — for investigators handling sensitive email evidence, privacy isn't optional.

Red Flags to Look For

Key indicators that an email may be spoofed, phished, or otherwise suspicious.

Authentication Failures

Failed SPF, DKIM, or DMARC checks mean the email failed the sender verification tests that legitimate email should pass. A DMARC failure with p=REJECT policy is especially concerning.

Address Mismatches

When the Reply-To address, Return-Path, or envelope sender doesn't match the From address, someone may be redirecting responses. This is a classic phishing technique.

Display Name Spoofing

If the display name contains an email address like "CEO@company.com" but the actual sending address is different, the sender is trying to trick the recipient.

Unusual Routing

Excessive delays between hops, time-travel (timestamps going backwards), or routing through unexpected countries can indicate message manipulation or suspicious relay servers.

shield

For Cybersecurity & Criminal Investigators

This tool is a first-response triage instrument — not a forensic lab. Understanding its boundaries will make you a better investigator.

check_circleWhat This Tool Does Well

speed
Rapid Triage

Quickly determine if an email warrants deeper investigation. The spoofing risk score and authentication summary give you an instant read on legitimacy.

dns
IP Identification for Subpoena

Extracts every IP address with source context (which hop, which header). Click through to IP Lookup for geolocation and ISP — the information you need to draft a preservation request or subpoena.

timeline
Timeline Reconstruction

Hop timestamps create a precise delivery timeline. Correlate these with access logs, victim activity, and other case evidence to establish when events occurred.

groups
Stakeholder Briefing

The visual risk score, plain-English explanations, and structured layout make it easy to brief prosecutors, judges, management, or non-technical team members on email evidence.

hub
Campaign Analysis

Use Campaign Analysis mode to batch-compare headers from multiple phishing or spam samples. Automatically identifies shared sending IPs, common routing domains, and consistent infrastructure patterns — evidence that emails originate from the same attacker or coordinated campaign.

warningWhat This Tool Cannot Do

verified
Prove Authenticity in Court

Reading an Authentication-Results header is not the same as independently verifying a DKIM signature. For evidentiary proof that an email is authentic (or forged), you need cryptographic verification against the signing domain's public key.

person_search
Attribute Beyond the IP

Headers give you IP addresses, not people. Mapping an IP to a subscriber requires ISP records obtained through legal process (subpoena, court order, or MLAT for foreign IPs).

fact_check
Verify Header Provenance

This tool processes whatever text you paste. It cannot tell whether headers were altered, truncated during forwarding, or fabricated entirely. Chain of custody must be established separately.

history
Check Historical DNS State

SPF records, DKIM keys, and DMARC policies may have changed since the email was delivered. The Authentication-Results header reflects a point-in-time check that may no longer be reproducible.

lock_open
Detect Forged Pre-Delivery Headers

Any header added before the email reaches the first trusted server (the receiving mail provider) could have been fabricated by the sender — including fake Received hops that look like legitimate internal routing.

gavel

Evidence Integrity Warning

Headers are plain text — anyone can modify them before handing them to you. For evidentiary purposes, always obtain the original .eml file directly from the mail server or the recipient's mailbox (not forwarded), and document your chain of custody. This tool accepts whatever text is pasted in and has no way to verify provenance.

When You Need Forensic-Grade Certainty

For cases heading to court, incident response reports, or attribution that must withstand scrutiny, these additional steps go beyond what any client-side tool can provide:

enhanced_encryption
Independent DKIM Verification

Fetch the DKIM public key from DNS and cryptographically verify the signature. If it verifies, you have mathematical proof that the signed headers and body haven't been tampered with since the signing server processed the email. This is the gold standard for email authenticity in court.

storage
Mail Server Log Acquisition

Obtain the receiving mail server's actual logs (not just the headers) to corroborate the Authentication-Results header independently. This also provides connection metadata not captured in headers.

travel_explore
IP Reputation & Blocklist Checks

Use our free IP Lookup tool to get geolocation, ISP, and network data for every sending IP — click any IP in the results above to go there directly. Combine with blocklist queries (Spamhaus, AbuseIPDB, VirusTotal) for a complete reputation profile.

Open IP Lookup Tool arrow_forward
history_edu
Historical DNS Records

Services like SecurityTrails or passive DNS databases can show what the SPF/DKIM/DMARC records looked like at the time the email was sent — critical when current DNS no longer matches.

timer

Time Is Evidence

ISP subscriber records typically have 90-day to 1-year retention periods. DKIM public keys are rotated regularly. DNS records change. Use this tool to quickly identify the IPs and timestamps you need, then initiate legal process immediately — the evidence window is closing from the moment the email was sent.

Frequently Asked Questions

menu_book

Learn More: How to Detect a Spoofed Email

A step-by-step guide covering SPF, DKIM, and DMARC verification, routing path analysis, originating IP examination, and common spoofing patterns investigators encounter in real cases.

Read the Full Guide arrow_forward

Level Up Your OSINT Investigation Toolkit

Forensic OSINT provides professional-grade investigation tools — email header analysis, IP geolocation, username search, and more — with privacy-first, client-side processing.

Minimum Requirements:

  • 8 Characters
  • 1 Upper
  • 1 Lower
  • 1 Digit