Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Email Security

Email Header Analysis

The process of examining RFC 5322 email headers to trace a message's delivery path, verify authentication results, and identify anomalies indicating abuse or compromise.

Definition

Email headers are structured metadata fields prepended to a message as defined by RFC 5322. They record the routing path through mail servers via Received headers, carry authentication results (SPF, DKIM, DMARC, ARC), and expose envelope-level information such as the originating IP, message ID, and timestamps. Analyzing these headers is the foundational step in any phishing or email fraud investigation.

Why It Matters

Headers cannot be suppressed by the sender and reveal the true origination point of a message, even when the visible From address is forged. Discrepancies between header fields—such as timezone inconsistencies, unexpected relay hops, or mismatched Message-IDs—are reliable indicators of spoofing, compromised infrastructure, or malicious forwarding.

How It Works

Each MTA prepends its Received header to the top of the existing headers as the message passes through. Reading them top-to-bottom shows the path from final destination back to origin (newest hop first); reading bottom-to-top traces the path from origin to destination. Authentication headers such as Authentication-Results are added by receiving servers and record the outcome of SPF, DKIM, and DMARC checks. Analysts cross-reference the envelope sender (Return-Path), the header From address, and Reply-To to detect alignment failures. IP addresses extracted from Received headers can be queried against reputation databases and geolocated. Timestamps across Received headers are checked for inconsistencies that may indicate header injection or forgery.

DFIR Platform

Phishing Email Checker

The Phishing Email Checker parses RFC 5322 headers as the foundation of its 26+ analysis modules, surfacing routing anomalies, authentication failures, and header inconsistencies. A free version is available at dfir-lab.ch/phishing-check.

View Documentation

Related Concepts

SPF (Sender Policy Framework)DKIM (DomainKeys Identified Mail)DMARC (Domain-based Message Authentication, Reporting and Conformance)ARC AuthenticationPhishing Analysis

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free