Online email header analyzer


This tool will make email headers human readable by parsing them according to RFC 822.


Email headers are present on every email you receive via the Internet and can provide valuable diagnostic information like hop delays, anti-spam results and more. If you need help getting copies of your email headers, just read this tutorial.

Access online email header analyzer here:

How to Get Email Headers – A Guide from MxToolBox

When reporting spam that slips past the filters, it is essential that we receive the full message headers from a message. Additionally, sometimes our Support department may request the full headers from an email message in order to troubleshoot mail delivery problems. Please follow these instructions to obtain and forward full message headers to

Every single Internet e-mail message is made up of two parts the header and the message body of the email. Every single email you send or receive on the Internet contains an Internet Header, a full and valid e-mail header provides a detailed log of the network path taken by the message between the mail sender and the mail receiver(s) (email servers).

Your email client program will usually hide the full header or display only lines, such as From, To, Date, and Subject, see below for more information on pulling headers for your email client:

Note: Please put a short but descriptive note in the subject or the body of the message so we can quickly assess your issue or problem.

Note: If you need assistance in understanding email headers, please feel free to use our Email Header Analyzer.

Outlook 2003
Outlook 2007
Outlook 2010
Outlook Express
Outlook 97
Outlook 98
Outlook 2000
Outlook 2002
Microsoft Exchange
Mac OS X Mail
Outlook Express for Macintosh
Gmail (works for Google Apps as well)
Netscape, Mozilla or Thunderbird
Lotus Notes
Pegasus Mail
Claris Emailer
Mail Warrior
Novell Groupwise

For Screen Shots and more on this HowTo:

Access online email header analyzer here:

Free Account for Cloud File Sharing:

Cloud Hosting and Security:

blog comments powered by Disqus