fbpx

How To Trace An Email Address

Now a days Email or Electronic mail are the fastest way to communicate, Email are widely used for personal and for business purposes, now consider you have to locate the person who send you an email than how would you do this.

You can trace back an email by using a header of this email, now the question is what actually a header is, and how we use header to trace the location of sender.



Email Header

The Header of an email contain the following information:

  • Information about the sender and receiver email addresses
  • When email was sent
  • Route means where it was sent and how did it arrive to you
  • Detail about the receiver





Below is the process to get and read the header to extract our desired information.

  • Login to your email account
  • Goto your inbox
  • Right click on an email that you want to trace
  • You will see different options
  • Click on View Full Header



Now you can see the header of this email, its time to get the IP of the sender. On header you can see different IP addresses and different routes so how would you identify the IP of the sender. Follow these steps:

  • Scroll down the header
  • Find X-Originating-IP on header
  • Now you come up on X-Originating-IP
  • There is more than one X-Originating-IP
  • So find this one   


X-Originating-IP: [IP of the sender]
From: <email of the sender>

  • Copy this IP and goto IP2location 
  • Paste this IP and get the location of the sender






Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...