Home/Blog/What are common email phishing indicators I can find in headers?
Cybersecurity

What are common email phishing indicators I can find in headers?

Learn the most common phishing indicators to look for in email headers, including authentication failures, suspicious routing, and red flag patterns that signal malicious intent.

By Inventive HQ Team
What are common email phishing indicators I can find in headers?

The Critical Role of Headers in Phishing Detection

Email remains the primary attack vector for cybercriminals because it offers a direct pathway to victims and is notoriously difficult to secure. Phishing emails—fraudulent messages designed to trick users into revealing sensitive information, downloading malware, or transferring money—arrive by the billions daily. While modern email security solutions use machine learning and content analysis to detect phishing, understanding the indicators visible in email headers provides an additional layer of detection that even sophisticated attacks struggle to hide.

The challenge for attackers is that while they can craft convincing email bodies and fake domain names, the technical metadata embedded in email headers is much harder to fabricate completely. By understanding what legitimate emails look like and learning to spot authentication failures, suspicious routing patterns, and authentication header anomalies, security professionals and educated users can identify phishing attempts before clicking dangerous links or attachments.

Foundational Phishing Indicators

1. Complete Authentication Failures (SPF, DKIM, DMARC All Fail)

The most obvious phishing indicator is when an email claiming to be from a legitimate domain fails all authentication checks:

Authentication-Results: company.com;
    spf=fail smtp.from=company.com;
    dkim=fail header.d=company.com reason="no key for signature";
    dmarc=fail header.from=company.com policy=reject

What this means: The email claims to be from company.com, but:

  • No authorized mail servers sent it (SPF fail)
  • There's no valid cryptographic signature or it's invalid (DKIM fail)
  • The entire DMARC policy fails, and the domain requested rejection

Phishing probability: Extremely high. This is a textbook spoofed email.

Caveat: Legitimate emails from certain service providers (notification systems, older applications) might also fail authentication. The key is comparing it to what you'd expect from the claimed sender.

2. SPF Soft Fail or Missing SPF

An email from a domain that shows SPF softfail or no SPF record:

spf=softfail smtp.from=company.com

or

spf=none smtp.from=attacker.com

What this means:

  • Softfail: The domain's policy says "probably not authorized, but don't reject"
  • None: The domain hasn't published an SPF policy at all

Phishing probability: Medium to high, especially for spoofed domains.

Legitimate context: Older domains or organizations with complex email routing might have softfail policies. Review the complete context before flagging.

3. Domain Misalignment Between Return-Path and From Header

The DMARC alignment check ensures the authentication domain matches what users see:

Example suspicious case:

From: [email protected]
Return-Path: <bounces.attacker.com>
DKIM-Signature: d=attacker.com

Authentication-Results: company.com;
    spf=pass smtp.from=attacker.com;
    dkim=pass header.d=attacker.com;
    dmarc=fail header.from=company.com

What this means: The visible sender is company.com, but authentication passed for attacker.com. This is a classic alignment failure.

Phishing probability: Very high. The email authenticated via a different domain than what users see.

Suspicious IP and Routing Indicators

4. X-Originating-IP from Unexpected Locations

The X-Originating-IP header shows the IP address of the device that initially sent the message:

X-Originating-IP: [203.0.113.45]

Geolocating this IP shows the sender's location:

Phishing indicator: An email claiming to be from your CEO in New York but originating from a datacenter in Romania, combined with other suspicious indicators.

Legitimate context: Employees traveling, using VPNs, or connecting from cloud services will show unexpected IPs. This indicator requires context.

Investigation technique: Compare to the employee's normal location baseline and cross-reference with whether they mentioned traveling.

5. Unusual Received Header Chains

The Received headers trace the email's path through mail servers. Phishing emails often show unusual routing:

Suspicious pattern - Too many hops:

Received: from mail.attacker.com ...
Received: from relay1.third-party.com ...
Received: from relay2.third-party.com ...
Received: from relay3.third-party.com ...
Received: from mail.company.com ...

Why would a phishing email from company.com route through three external relays? It shouldn't. Legitimate company emails should go directly from company.com to the recipient's mail server, maybe with one or two intermediate hops.

Suspicious pattern - Loops or backtracking:

Received: from mail.company.com ...
Received: from external-relay.com ...
Received: from mail.company.com ...

An email shouldn't leave a mail server and then re-enter it. This suggests routing manipulation.

Suspicious pattern - Spoofed internal mail server:

Received: from mail.company.com (mail.company.com [203.0.113.45])

When you WHOIS this IP, it resolves to an external hosting provider, not your company. The attacker is using a fake hostname claiming to be your internal mail server.

6. No Reverse DNS Match

For each IP in a Received header, check if reverse DNS matches:

Received: from mail.company.com (mail.company.com [203.0.113.45])

Legitimate mail servers usually have reverse DNS that matches their hostname. If:

  • The IP's reverse DNS is "generic-hosting-123.amazonaws.com"
  • But the hostname claims to be "mail.company.com"
  • This is a mismatch suggesting spoofing

Authentication Header Anomalies

7. DKIM Signature from Unexpected Domain

A legitimate email from your domain should have a DKIM signature from your domain:

dkim=pass header.d=company.com

Suspicious cases:

dkim=pass header.d=google.com (if email claims to be from company.com)

or

From: [email protected]
dkim=pass header.d=attacker.net

The domain field in DKIM doesn't match the From: header. This is a domain mismatch suggesting impersonation.

8. Multiple DKIM Signatures with Mismatched Domains

Some forwarding services add multiple DKIM signatures. However, see multiple signatures from different domains for the same sender is suspicious:

DKIM-Signature: v=1; a=rsa-sha256; d=attacker1.com; s=selector1; b=...
DKIM-Signature: v=1; a=rsa-sha256; d=attacker2.com; s=selector2; b=...
From: company.com

Multiple signatures from different attacker domains suggests the email was signed by intermediaries trying to add legitimacy.

9. ARC Failures

ARC (Authenticated Received Chain) headers are added by forwarding services to preserve authentication information:

ARC-Seal: i=1; cv=none; ...
ARC-Authentication-Results: i=1; ...; dmarc=fail

If ARC shows upstream authentication failures (cv=none or cv=fail), but the message still arrived, it's suspicious.

Content-Based Header Indicators

10. Mismatched Subjects and Sender Information

Phishing emails often use common subject lines that don't match the sender:

Subject: Verify Your Account
From: [email protected]
Date: Wed, 1 Jan 2025 00:30:00 +0000

A CEO sending "Verify Your Account" urgently at 12:30 AM is highly suspicious.

11. Suspicious Message-ID Patterns

Each email has a unique Message-ID:

Message-ID: <[email protected]>

Phishing emails often have:

  • Generic Message-IDs: <message@localhost>
  • Fabricated or duplicate Message-IDs: Multiple emails with the same ID
  • No Message-ID at all

Legitimate mail servers always generate unique Message-IDs.

12. Missing or Suspicious User-Agent Headers

The User-Agent header shows what software sent the email:

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)

Suspicious patterns:

  • Missing User-Agent entirely
  • User-Agent showing outdated software (Outlook 2003)
  • User-Agent contradicting the claimed sender (personal email client for a corporate account)

Advanced Pattern Combinations

13. Authentication Passes but Content is Suspicious

The most sophisticated phishing attacks compromise legitimate accounts or use legitimate infrastructure:

spf=pass smtp.from=company.com
dkim=pass header.d=company.com
dmarc=pass header.from=company.com

All authentication passes, but:

  • X-Originating-IP is from Romania
  • Timestamp is 3 AM
  • Email is requesting urgent wire transfer to new vendor
  • Recipient is finance team, not normal communication pattern

This indicates: Likely compromised account (Business Email Compromise rather than spoofing).

14. Timezone Inconsistencies Across Headers

Date: Wed, 1 Jan 2025 10:00:00 -0500 (Eastern Time)
X-Originating-IP: [202.0.113.100] (Singapore ISP)
Received: ... [timestamp UTC] (Processing in Asia timezone)

The email claims to originate from Eastern Time but the IP is from Singapore and processing timestamps are in different timezone. Timezone mismatches suggest location spoofing.

15. Encoding and Language Inconsistencies

Content-Type: text/plain; charset=iso-8859-1 (Western European)
Content-Language: zh-CN (Chinese)
From: [email protected]
Subject: [Contains Cyrillic characters]

The email from an American company has mixed character encodings and languages. This suggests mass phishing campaigns translated poorly or using compromised systems.

Time-Based Phishing Indicators

16. Unusual Send Times for the Sender

Build a baseline of when legitimate users typically send emails:

  • Your CEO normally sends emails 9 AM - 6 PM New York time
  • An urgent "verify your account" email arrives at 2 AM New York time
  • Combined with other indicators, this suggests phishing

Investigation: Check the user's Outlook/Gmail activity logs to see if they were actually active at that time.

17. Processing Delays Between Hops

Each Received header has a timestamp. Look at the time progression:

Received: from server1.com ... Wed, 1 Jan 2025 10:00:00 -0500
Received: from server2.com ... Wed, 1 Jan 2025 10:00:01 -0500
Received: from server3.com ... Wed, 1 Jan 2025 10:00:02 -0500

Normal (quick processing - seconds between hops). But:

Received: from server1.com ... Wed, 1 Jan 2025 10:00:00 -0500
Received: from server2.com ... Wed, 1 Jan 2025 12:00:00 -0500
Received: from server3.com ... Wed, 1 Jan 2025 10:00:05 -0500

2-hour delay between hops, then a hop with earlier timestamp? This suggests timestamp manipulation or unusual routing.

Visual Red Flag Summary

When analyzing headers, look for this combination pattern:

IndicatorLegitimatePhishing
SPFPass or SoftfailFail
DKIMPass or None (if no DKIM)Fail or Neutral
DMARCPassFail
Domain alignmentFrom = Auth domainFrom ≠ Auth domain
X-Originating-IPMatches employee baselineUnknown location, datacenter
Received chain2-3 hops5+ hops or loops
Reverse DNSMatches hostnameMismatch
Message-IDUnique formatGeneric or duplicate

The more indicators that point to phishing, the higher the confidence in your assessment.

Practical Response Actions

When you identify multiple phishing indicators:

  1. Don't click links: Even if it looks legitimate, phishing indicators in headers are a strong warning
  2. Report to security: Forward the email to your security team
  3. Request full headers: Forward with complete headers to your security/IT team
  4. Warn the organization: If it's impersonating an executive, alert the team
  5. Check if credentials were compromised: If it's BEC (passes auth but suspicious patterns), check for account compromise
  6. Preserve evidence: Don't delete the email, it may be needed for investigation

Conclusion

Email headers contain a wealth of forensic indicators that can identify phishing attempts before users click malicious links. Authentication failures (SPF, DKIM, DMARC) are the most obvious indicators. Domain misalignment, unusual routing patterns, geographic anomalies, and timing inconsistencies provide additional evidence.

The most sophisticated attacks (Business Email Compromise) may pass all authentication checks but reveal themselves through patterns like unusual timestamps, unexpected originating IP addresses, or content requesting unusual actions. By learning to recognize these header-based indicators and combining them with user awareness training, organizations can dramatically reduce successful phishing attacks. The combination of technical header analysis and user judgment provides the most effective defense against email-based threats.

Need Expert Cybersecurity Guidance?

Our team of security experts is ready to help protect your business from evolving threats.