what are email headers

Email headers are the hidden part of emails containing vital information to identify and authenticate messages. Learn how to read them to spot spam and stay secure.

Have you received an unexpected email from a strange address? Is it actually from someone you trust, or is it just spam or a phishing attempt? Email headers can help you find out.

We explain what email headers are, what they contain, and how to read them to keep your inbox spam-free and secure.

What is an email header?

An email header is a hidden snippet of code in an email that contains detailed information about the sender, the recipient, and how the message was routed and authenticated.

Emails typically display the Subject, From, To, and Date fields in the visible header at the top.

Visible email header showing Subject, From, To, and Date fields

However, spammers or fraudsters can spoof the displayed From field so the sender appears to be someone you trust. By viewing the hidden full email header of the original message (shown below), you can check the sender’s address and other delivery information to verify it’s legitimate (see how to read an email header below).

Example of an email header showing the To, From, Date, Received, and other fields

What do email headers contain?

An email’s header contains information about the sender, the recipient(s), and how the mail was delivered, including the following mandatory fields:

  • From: the sender’s name and email address
  • Date: the time and date the message was sent
  • To: the recipient’s address (or addresses if the email includes CC or BCC)

Most emails typically contain many other fields, such as:

  • Subject: the title as displayed in the Subject line
  • Reply-Path: the return address of the email if it fails
  • Received: the SMTP servers that the message has passed through. Emails typically pass through multiple servers, each adding a new Received header.
  • Authentication-Results: the results of checks to see if the email originated from the stated sender.

For details about these and other common header fields, see how to read an email header below.

Why are email headers important?

Email headers contain essential information for the correct delivery, authentication, and filtering of messages. With email headers, you can:

Identify the sender and recipients

While an attacker can spoof an email’s display names, the email header helps you trace the sender’s original address and the delivery details. That way, you can check if a sender is genuine and block them if necessary.

Trace email routing

When you send an email, it passes through various servers or mail transfer agents (MTA). Each MTA adds a Received header with its IP address(new window) and other details about that hop of the email’s journey to the recipient. By viewing the header, you can check for suspicious routing. 

Show message authentication

When you receive an email, you want to verify that the sender is genuine. Email headers usually show whether the message passed authentication checks like SPF, DKIM, and DMARC (see below for details).

Spot spam and phishing

Email services use the message details in email headers to determine whether a message is spam or a phishing attack. Typically, the results of spam filters are also included in email headers.

Get Proton Mail button

When to check email headers?

You don’t need to check the headers of every email you receive. But here are some situations where checking email headers can be useful:

Check suspicious email

If you receive a message that looks like spam or a phishing email, you can check the header to investigate whether it’s legitimate. Tracing the sender’s address, domain, IP address, and other details can help you determine whether it’s genuine or a phishing attempt.

Investigate email tampering

If you suspect that someone is intercepting your emails or has gained access to your account, checking email headers can help you investigate. By checking the source of the message and each of the email servers it passed through, you can trace any interception or unauthorized access. 

Identify email delivery issues

If you’re having problems sending or receiving emails, checking the headers can help you find the cause. For example, headers may contain error messages or show that spam filters have rejected a message you’ve sent.

How to view email headers

The header at the top of most emails only contains the main display fields, like Subject, From, To, and Date. Here’s how to reveal the full email header of the original message in popular email services.

View Proton Mail email headers

1. Log in to your account at window) and open an email.

2. Click on the More menu (three horizontal dots), and select View headers.

View headers option to view email headers in Proton Mail

The email header will display in a popup window. You can then download it as a .txt file by clicking Download.

Download button to download email header in Proton Mail

Learn how to check email headers in the Proton Mail web and mobile apps

View Gmail email headers

  1. Log in to your account at window), and open an email.
  2. Click on the More menu (three vertical dots), and select Show original.

Show original option to view email headers in Gmail
  1. Click Copy to clipboard to copy the email header or Download Original to download it.

View Outlook email headers

  1. Log in to your account by going to window) or the Microsoft 365 login page(new window).
  2. Click on the More actions menu (three horizontal dots), and go to View → View message source.

View message source option to view email headers in Outlook

View Apple iCloud email headers

  1. Log in to your account at window), and open an email.
  2. Click on the Reply icon, and select Show All headers.

Show All Headers option to view email headers in Apple iCloud

How to read an email header

After opening an email header, you’re faced with a daunting block of code — a list of fields that show essential information (metadata(new window)) about the message, like where it came from and how it was routed and authenticated.

To find specific information in an email header, you can search using the keyboard shortcut Control + F (Windows/Linux) or Command + F (Mac). For example, search for “Authentication” to find the Authentication-Results fields in the email header below:

Email header showing the word Authentication highlighted to find Authentication-Results fields in the header

But which fields should you look at and why?

Email header fields explained

Here are the main types of metadata to look for in email headers and what they mean.

MetadataWhat it means
FromThe address the message was sent from. Note that this can be spoofed.
ToThe display names and email addresses of all the recipients, including CC and BCC addresses. As above, these details can be spoofed.
SubjectThe title of the email as displayed in the Subject line of the email.
DateThe timestamp showing the day and date an email was sent; for example, Wed, 8 Mar 2023 06:07:58 +0000 
ReceivedThe names and IP addresses(new window) of all the email servers the message passed through to get to the recipient(s). A Received header is added automatically to the top of the list after a server accepts an email. So read from the bottom up — check the bottom Received field to find the original sender’s IP address.
Return-PathThe address to which an email that can’t be delivered should be returned, like a return address in regular mail.
Reply-ToAn optional address for recipients to reply to. If there is no Reply-To field, the Return-Path address is used.
DKIM signatureA DKIM (DomainKeys Identified Mail) signature is an authentication method that cryptographically verifies that the email hasn’t been changed since it was DKIM signed, which helps to detect spoofed emails. The Authentication-Results field should read dkim=pass with header d=[sender’s domain].
SPFSPF (Sender Policy Framework) is an authentication protocol that checks that an email was sent from an authorized IP address(new window). Like DKIM, the Authentication-Results field should show spf=pass.
DMARCDMARC (Domain-based Message Authentication Reporting and Conformance) is an authentication protocol that prevents email spoofing by combining the results of DKIM and SPF checks. DMARC allows senders to define what happens to their emails if they fail DKIM and SPF checks.
Authentication-ResultsShows the results of authentication checks like DKIM, SPF, and DMARC (see above).
ARC-Authentication-ResultsARC is a way to preserve the authentication results (DKIM, SPF, and DMARC) of an email when it is forwarded. ARC should show dkim, spf, and dmarc=pass.
Message-IDA unique identifier created for each email message. 
Various spam ratings depending on the anti-spam platform used. For example, the Spam-Action field may display inbox (for non-spam), spam, or phishing.
Content-TypeShows the email format, such as text/html to indicate an HTML message (rich text) or text/plain for plain text (no formatting).
Message-BodyThe main content of the message. In Proton Mail end-to-end encrypted emails, this appears as unreadable ciphertext.
Types of email header metadata

Email header analyzers

Rather than searching the text of an email header manually, an easier way to find key fields is to use an email header analyzer, like the one by MxToolbox or 

Copy and paste an email header into the analyzer tool and hit the analyze button. They not only locate the main fields for you but may also show if the message was authenticated.

Reading Proton Mail email headers

The headers in Proton Mail end-to-end encrypted messages differ slightly from those in regular emails. We include minimal metadata, so the headers are shorter, and the body of the message appears as unreadable ciphertext (starting from BEGIN PGP MESSAGE).

Proton Mail email header showing PGP-encrypted ciphertext

As with all emails, you can check the origins of a message in the email header if you think it looks suspicious.

Check the displayed sender and email addresses

First, does the displayed sender’s name match the corresponding email addresses? In this phishing email pretending to be from the UN, the displayed name “United Nations Compensation” is clearly very different from the random sender address and the Reply-To address.

Email header showing the sender's name as "United Nations Compensation", but the corresponding email address is a dubious address, and the Reply-To address is a random address

Is the sender’s address from a domain that you trust? For example, the message below was from a Proton Mail address ( and was delivered by (a trusted Proton Mail domain).

Email header showing the From and Received fields with known trusted domain names

Check the Received fields

Most emails (like messages sent between Proton Mail and non-Proton Mail users) pass through several SMTP servers. Each server adds a new Received field to the top of the email header with a timestamp and server IP address(new window)

Reading from bottom to top, you can trace each “hop” of the email’s journey to its final destination. If there are long delays between hops or any record of the message being redirected to another address, the message may have been spoofed or tampered with.

In Proton Mail headers, we add the topmost Received field, so you can be sure it’s genuine.

Spam filtering and phishing

Finally, email service providers may include details of spam filtering in email headers. But at Proton Mail, we use a multi-tiered anti-spam system, so the spam fields in an email header won’t give you the complete picture.

You don’t need to check headers for spam because we automatically filter known spam into your Spam folder and clearly flag suspected phishing emails.

Proton Mail warning flagging this message as a phishing attempt

Check email headers, stay secure

Email headers contain vital details about the routing and authentication of messages. By viewing an email’s header, you can investigate a suspicious sender and check whether the message is genuine.

Yet message headers can only tell you so much. You need an email service with comprehensive anti-spam features, like Proton Mail, to beat spammers and stay secure. With Proton Mail, you get:

Sign up for a free Proton Mail account, and you get encrypted Proton Calendar, Proton Drive, and Proton VPN(new window) included to protect your privacy and security. Stay secure!

Create a free Proton Account button

Email header FAQs

Can email headers be spoofed?

You can’t spoof whole headers but can spoof individual fields in headers. Hackers can use an SMTP server to edit many header fields, like From, Reply-To, and Return-Path, to make a fake email appear to be from a legitimate sender.

The best email providers, like Proton Mail, have comprehensive spam filtering and phishing protection to flag potentially malicious messages. Still, you can investigate a suspicious message yourself by checking the email header.

What are X-headers in email headers?

X-headers are fields added to email headers in addition to standard headers like From, To, Date, etc. For example, email providers add X-headers to include authentication results and spam filtering information.

X-headers like the X-Originating-IP field, which shows the sender’s IP address, can provide useful clues when investigating suspicious messages.

Why are there so many Received fields in email headers?

When you send an email, it passes through various servers or mail transfer agents (MTA) in a series of hops. The SMTP server of each MTA adds a new Received field to the top of the email header with a timestamp and server IP address(new window).

Starting from the bottom Received header, you can check the sender’s email address and trace each hop of the email’s journey in the Received headers.

Can you trace an email to a specific person from the email header?

You can’t trace an email to an individual just by looking at the email header.

However, email providers, internet service providers (ISPs), and law enforcement agencies may be able to identify you from your public IP address and other metadata(new window). Learn more about how emails can be traced.

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

People and companies are generally subject to the laws of the country and city where they are located, and those laws can change when they move to a new place. However, the situation becomes more complicated when considering data, which can be subjec
Your online data is no longer just used for ads but also for training AI. Google uses publicly available information to train its AI models, raising concerns over whether AI is even compatible with data protection laws. People are worried companies
iPhone stores passwords in iCloud Keychain, Apple’s built-in password manager. It’s convenient but has some drawbacks. A major issue is that it doesn’t work well with other platforms, making it hard for Apple users to use their passwords and passkeys
There are many reasons you may need to share passwords, bank details, and other highly sensitive information. But we noticed that many people do this via messaging apps or other methods that put your data at risk. In response to the needs of our com
Large language models (LLMs) trained on public datasets can serve a wide range of purposes, from composing blog posts to programming. However, their true potential lies in contextualization, achieved by either fine-tuning the model or enriching its p
is Google Docs secure
Your online data is incredibly valuable, particularly to companies like Google that use it to make money through ads. This, along with Google’s numerous privacy violations, has led many to question the safety of their information and find alternative