Email Parser
Upload suspicious .eml files and get a full breakdown — headers, attachments,
URLs, sender authentication, and IOCs. Built for phishing analysis.
What the EML Parser extracts
Everything you need to triage a suspicious email in one view.
Headers & Metadata
From, To, Subject, Date, Message-ID, Return-Path, X-headers, and the full Received chain to trace the email's path.
Sender Authentication
SPF, DKIM, and DMARC verification results. Instantly see if the sender is authenticated or if the email is spoofed.
URLs & IOCs
All URLs extracted from the email body, plus IP addresses and domains from headers. Each IOC can be searched on mlab for enrichment.
Attachments
File names, MIME types, sizes, and SHA-256 hashes of all attachments. Hashes can be looked up on mlab for known malware matches.
IP Trace
IP addresses extracted from the Received header chain, showing the full route the email took to reach you.
HTML Preview
Safe, sandboxed preview of the email body. View the HTML content without executing scripts or loading external resources.
Why do I need an account?
The EML Parser processes uploaded files on our infrastructure. An account lets us securely store your results, keep your analysis history, and ensure your data is private. It's completely free — no credit card, no trial, no catch.