IsThisAScam
ホームBlog料金概要HistoryAPI
Upgrade
JA
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
製品
  • Home
  • Blog
  • Pricing
  • 概要
  • History
Resources
  • APIドキュメント
  • Phishing brief
  • Romance scams
  • Tech support
法務
  • プライバシーポリシー
  • 利用規約
  • product@zeplik.com

© 2026 Zeplik, Inc. All rights reserved.

Built for the calm, the cautious, and the careful.

Home/Blog/Security Tips
Security Tips

How to Check Email Headers: Step-by-Step

IsThisAScam Research TeamApril 1, 20261 min read
Contents
  1. How to View Headers
  2. The Three Checks: SPF, DKIM, DMARC
  3. SPF
  4. DKIM
  5. DMARC
  6. The "Received" Chain
  7. From vs. Return-Path
  8. Practical Example
  9. Header Analysis Tools

Email headers are hidden metadata attached to every message — the digital equivalent of a postal stamp trail. They show where the email originated, which servers it passed through, and whether it was authenticated. Reading headers is the most reliable way to determine if an email actually came from who it claims.

Want the quick version? Paste the email into IsThisAScam.to — it analyzes headers, links, and content automatically.

How to View Headers

  • Gmail: Three dots > "Show original"
  • Outlook Web: Three dots > "View message source"
  • Outlook Desktop: File > Properties > Internet headers
  • Apple Mail: View > Message > All Headers

Think it might be a scam?

Paste it here for a free, instant verdict.

Free · No signup required · Cmd+Enter to scan

The Three Checks: SPF, DKIM, DMARC

SPF

Checks if the sending server is authorized by the sender's domain. Look for Received-SPF: pass. "Fail" means unauthorized.

DKIM

Cryptographic signature confirming the email was not tampered with. Look for dkim=pass.

DMARC

Ties SPF and DKIM together with a policy. dmarc=pass (p=reject) is the gold standard.

The "Received" Chain

Read from bottom to top — the bottom-most header is the originating server. Check that the originating domain matches the claimed sender.

From vs. Return-Path

If "From: Apple Support <noreply@apple.com>" but "Return-Path: <bounce@random-domain.xyz>" — the email is spoofed.

Practical Example

A "PayPal" phishing email: Return-Path was marketing-notify.xyz. SPF: fail. DKIM: fail. DMARC: fail. Originating server: budget VPS in Eastern Europe. Every check failed.

Header Analysis Tools

  • Google Admin Toolbox: toolbox.googleapps.com/apps/messageheader
  • MXToolbox: mxtoolbox.com/EmailHeaders.aspx
  • IsThisAScam: Comprehensive analysis beyond headers — 6-layer detection

See email legitimacy guide and email security tools.

Received something suspicious? Check it now for free →

Share this article
XLinkedInFacebookWhatsApp
email headersSPFDKIMDMARCemail security
Related Articles
Product Updates3 min

Free Phishing Check Tools: Complete List

Guides3 min

VirusTotal for Emails: How to Check Messages

Security Tips4 min

How to Secure Your Email Account in 15 Minutes

Check any suspicious message

Six detection layers. Instant verdict. Free.

Free · No signup required · Cmd+Enter to scan