Sherlock Forensics EML Viewer applies the same forensic rigor to .eml files that examiners expect from enterprise forensic suites. Every EML opened receives an automatic forensic readout alongside the standard message preview.
SMTP Transport Chain
Every Received: header in the EML file is parsed into a chronological hop-by-hop trail. Each entry shows the sending host, receiving host, IP address and protocol used. The viewer reconstructs the complete path from origin to destination, presenting a single-line summary that answers "where did this message actually come from" at a glance. Forged headers and inconsistent timestamps are visible immediately when the full chain is laid out in sequence.
Authentication Results
SPF, DKIM and DMARC verdicts are extracted from the Authentication-Results header and displayed with plain-English explanations. A passing SPF result means the sending IP was authorized by the domain owner. A valid DKIM signature confirms the message body was not altered in transit. DMARC alignment ties SPF and DKIM together under the sender's domain policy. When any of these checks fail, the viewer flags the result and explains what the failure means in practical terms.
Anomaly Detection
The viewer automatically flags suspicious patterns in every EML file. Missing sender addresses, authentication failures, Message-ID domains that do not match the From: domain, unusual header ordering and other indicators are surfaced without requiring the examiner to read raw headers manually. These flags serve as triage markers when processing large volumes of email evidence.
Raw Headers
One click exposes the full RFC-822 headers for independent verification. Every header field is displayed exactly as stored in the .eml file with no parsing or reformatting applied. This allows examiners to verify the tool's automated analysis against the raw source data or to identify header fields that fall outside standard automated checks.