Office 365

If you use Office 365's webmail interface to prevent email recipients from seeing your local IP address, you are out of luck. When sending email through Office 365, your local IP address will be injected into the message as an extra mail header.

Operating a web site and focusing on infosec related topics has made me a paranoid person.  This leads me to send replies to stranger's emails via webmail so I do not expose my local IP address for security and to protect my privacy.

It turns out that if you have been using the Office 365 webmail interface to hide your IP address, you are not hiding anything. 

When sending an email via Office 365 (, the service will inject an additional mail header into the email called x-originating-ip that contains the  IP adress of the connecting client, which in this case is your local IP address.

authentication-results: spf=none (sender IP is )
x-originating-ip: [23.xx.xx.xx]
x-ms-publictraffictype: Email

BleepingComputer tested the webmail interfaces for Gmail, Yahoo, AOL, (, and Office 365.

None of the webmail interfaces other than Office 365 injected the user's local IP address, which is what most have come to expect when using webmail.

If you are using Office 365's webmail interface and wish to keep your local IP address private, at this point you will need to connect to the webmail using a a VPN or Tor. This will cause the services's IP address to be injected into the email rather than your local one.

Enterprise level feature

According to responses in Microsoft answers forums, Microsoft removed the x-originating-ip header field in 2013 from Hotmail to offer their users more security and privacy

"Please be informed that Microsoft has opted to mask the X-Originating IP address. This is a planned change on the part of Microsoft in order to secure the well-being and safety of our customers."

For Office 365, who caters to the enterprise, this header was intentionally left in so that admins could search for email that has been sent to their organization from a particular IP address. This is especially useful for finding the location of a sender in the event an account has been hacked.

For Office 365 admins who do not wish to continue using this header, you can create a new rule in the Exchange admin center that removes the header.

Creating a new rule
Creating a new rule

For security and auditing purposes, it is probably a wiser choice to keep it enabled.

H/T Jason Lang

Related Articles:

Google Chrome Incognito Mode Can Still Be Detected by These Methods

Microsoft 365 to Get Enhanced Suspicious Content Submission

FTC Tells Equifax Victims to Opt for Credit Monitoring Over $125

Chrome to Add HTTP Cache Partitioning to Block Attacks, Tracking

Enterprise Software May Transmit Data Without Your Knowledge