HackWatch

Email header analyzer

Email Header Analyzer for SPF, DKIM, DMARC and Reply-To Mismatch

Use this page when you have full mail headers and need a faster answer to whether sender authentication, relay history or reply routing looks suspicious.

The email header analyzer parses raw headers into an evidence-led view of SPF, DKIM, DMARC, From, Reply-To, Return-Path and Received-chain anomalies.

Best for: raw email headers, spoofed sender investigations, Reply-To mismatch review and fast SPF, DKIM, DMARC triage before trusting a message.

How this tool helps

What the header analyzer checks

This tool turns raw mail headers into a reader-friendly breakdown of sender-authentication results, mailbox-routing anomalies and impersonation markers often missed in the visible email body.

  • SPF, DKIM and DMARC outcomes from Authentication-Results
  • Reply-To, Return-Path and From-domain alignment
  • Received chain depth and traceability clues

Why headers matter in phishing analysis

Visible sender names and message text are easy to fake. Header data shows whether the message actually passed sender checks and where the reply or bounce path is trying to send the victim.

Frequently asked questions

Can this prove an email is legitimate?

No single header view proves legitimacy, but failed SPF, DKIM or DMARC checks plus reply-path mismatches are strong reasons to treat the message as suspicious until verified independently.

What should I paste into the analyzer?

Paste the full raw headers from your mail client, especially Authentication-Results, Received, From, Reply-To and Return-Path fields.

Related workflows

Scam checker

Scam Checker for Suspicious Messages

Check suspicious SMS, fake delivery updates, payment prompts and urgent verification messages to spot scam pressure before you click, pay or reply.

Open tool page

Email review

Email Reputation and Sender Review

Review suspicious senders, domain clues and phishing language to triage risky email campaigns before anyone opens links, attachments or login pages.

Open tool page

Email posture

Email Security Posture Checker (SPF, DKIM, DMARC, MX)

Check SPF, DKIM, DMARC and MX records to find email spoofing gaps, strengthen domain trust and improve business email security posture.

Open tool page

URL checker

Free Phishing Link Checker and Domain Intelligence Report

Check suspicious links before you click with hostname, redirects, DNS, TLS, ASN, hosting provider and phishing-pattern analysis in one report.

Open tool page

Brand impersonation

Brand Impersonation Checker for Lookalike Domains and Fake Support Pages

Check suspicious domains, senders and fake support portals for brand impersonation, lookalike patterns, punycode, typosquatting and recent-registration risk.

Open tool page

Recovery center

Phishing Recovery Center and Account Takeover Guides

Follow step-by-step recovery after phishing, hacked accounts, breach exposure, identity theft and scam incidents across Google, Microsoft, Meta and banking scenarios.

Open tool page

Breach checker

Breach Exposure Checker for Email and Password Reuse Risk

Check whether exposed email or reused passwords create real breach risk, then follow a practical 24-hour containment plan and next-step checklist.

Open tool page

Identity theft planner

Identity Theft Recovery Planner

Build a step-by-step identity theft response plan after exposed personal data, fraudulent accounts, mailbox compromise, SIM swap or document leaks.

Open tool page

Crypto scam checker

Crypto Scam Checker for Fake Investments and Recovery Fraud

Check suspicious crypto projects, fake exchange messages, guaranteed-return claims and recovery-fee demands before sending funds or identity documents.

Open tool page

Ransomware triage

Ransomware Triage and Decryptor Finder

Triage encrypted-file incidents with isolation steps, ransom-note analysis, extension review, backup checks and decryptor guidance before recovery decisions.

Open tool page

Report incident

Incident Report Intake

Submit suspicious phishing pages, malicious senders, brand impersonation attempts and emerging attack patterns so new scam clusters surface faster.

Open tool page