Paste raw email headers to trace the full delivery path, identify delays, verify authentication results, and diagnose deliverability problems.
Every email contains two parts: the visible message body and a hidden block of metadata called headers. Headers are key-value pairs prepended to the message that record the complete technical history of how the email was composed, authenticated, routed, and delivered. They are invisible to most email clients by default, but they contain the information mail servers use to make delivery decisions.
Headers are written in RFC 5322 format and fall into two categories: originating headers set by the sender (From, To, Subject, Date, Message-ID) and transit headers added by each server along the delivery path (Received, Authentication-Results, DKIM-Signature). Because each mail server prepends its own Received header, the chain reads chronologically from bottom to top — the oldest hop is at the bottom, the most recent is at the top.
Email headers are the primary diagnostic tool for investigating delivery failures, spam misclassification, authentication errors, phishing analysis, and routing problems. Understanding them is essential for anyone managing a mail server or investigating email security incidents.
The method for viewing raw headers varies by email client. In all cases, you are looking for an option labeled something like "Show original", "View source", "All headers", or "Internet headers".
Open email → three-dot menu → Show original. Copy all content above the blank line before the body.
Open email → three-dot menu → View message source or View → Message details.
Open email → View menu → Message → All Headers (or press Shift+Command+H).
Open email → File → Properties. Copy the Internet headers box at the bottom.
Open email → View menu → Message Source (Ctrl+U). The headers appear at the top.
Open email → three-dot menu → View raw message. Headers appear at the top of the raw source.
You do not need to copy the entire email source — just the header block. Headers end at the first completely blank line. However, pasting the full raw source is also fine; this tool will extract the headers automatically.
Each Received header corresponds to one mail server handoff. A typical email passes through 2-5 hops: the sender's mail client submits to their outbound SMTP server, which relays to the recipient's MX server, which may pass through internal filtering or relay servers before final delivery. Complex setups (mailing lists, forwarding, third-party relays) can add many more hops.
Example Received header:
Received: from mail.sender.com (mail.sender.com [203.0.113.10])
by mx.recipient.com with ESMTPS id abc123
for <[email protected]>;
Mon, 17 Feb 2026 14:32:05 +0000 (UTC)
The delay between consecutive hops is calculated by subtracting the timestamp of one Received header from the next. Sub-second delays are normal. Delays in the range of 1-30 seconds usually indicate queue processing or greylisting. Delays over a minute can indicate temporary failures with retry, rate limiting, or spam filtering queues. This tool highlights the slowest hop so you can immediately identify where time is being lost.
The Authentication-Results header is added by the receiving mail server and summarizes the outcome of all authentication checks performed on the incoming message.
Sender Policy Framework
Verifies that the sending IP is authorized by the domain's DNS SPF record. A pass means the IP is listed. A softfail (~all) is a weak pass. A fail (-all) means the IP is not authorized.
DomainKeys Identified Mail
Verifies a cryptographic signature in the DKIM-Signature header. A pass means the signature is valid and the message body was not altered since signing. The selector field identifies which signing key was used.
Domain-based Message Authentication, Reporting & Conformance
Checks alignment: the From address domain must match the SPF-authenticated domain or the DKIM signing domain. A pass requires at least one aligned method to pass. The policy (none/quarantine/reject) determines what happens on failure.
Authenticated Received Chain
Preserves authentication results through forwarding. Each intermediary server adds ARC headers recording what it saw. The final server can trust the chain even if the original DKIM signature is now invalid due to message modification.
Use the SPF Record Checker, DKIM Record Checker, and DMARC Record Checker to verify your DNS records are correctly configured for each of these authentication methods.
Email delivery delays are one of the most common complaints from both senders and recipients. Headers are the only reliable way to pinpoint exactly where in the delivery chain time is being lost.
Note that server clocks are not always perfectly synchronized. Small negative delays (the next hop appears to arrive before the previous one) are an artifact of clock skew and can be safely ignored. Large negative values may indicate header injection or a misconfigured server.
Email header analysis is one part of a complete email deliverability diagnosis. These tools on DNSChkr cover the full stack:
Look up SPF, DKIM, DMARC, MX, and all other DNS records for any domain.
Check if your mail server IP or domain is listed on 60+ DNS blacklists.
Validate your SPF record syntax, check authorized IP ranges, and test include chains.
Look up DKIM public keys by selector and verify your signing configuration.
Parse and validate your DMARC policy, check alignment settings, and review reporting addresses.
Verify your MX records are correctly configured and resolve to the expected mail servers.