DKIM Analyzer

Enter domain name and selector to check current DKIM record of that domain.
Enter Domain Name
Enter Selector
Trusted by over 100,000 businesses of all size.

Don’t let the bad guys impersonate as the nice guys

Check DKIM record to immediately know if there’s an authorised digital signature associated with a domain. A domain without the DKIM digital signature is always open to risks. Your email server can use that information for spam filtering, anti-phishing and more. That keeps most of the bad guys away.

Builds trust quotient

DKIM authorisation raises the credibility of the sender domain in the email ecosystem.

Checks altered contents

It assures you that parts of the email content have not been modified after the digital signature was affixed.

Don’t be called a spammer

Even strict email servers view favorably incoming emails that have DKIM authorisation.

Improves email KPIs’

Emails with DKIM records enjoy the trust of email servers. That’s why they achieve better KPIs.

Let customers correct typos and enter valid email addresses. Detect and stop fake signups on the go. Add our free real-time email verification API wherever you collect emails and build a mailing list that grows your business.

Frequently Asked Questions

What does DKIM stand for?

DKIM stands for DomainKeys Identified Mail. It is an email authentication method that uses digital signatures to verify the authenticity of emails.

Why should I check DKIM records?

There are several advantages of checking DKIM records. Firstly, it discourages fraudsters because in any case, recipient email servers would easily identify their emails as spam or forged emails.

Next, it is an added layer of security for emails and a part of the email sending best practices.

Also, it helps separate the good emails from the bad emails: without DKIM records, even genuine emails can be classified or labeled as spam. That would adversely affect email deliverability and there drastically lower the email marketing ROI.

What does the DKIM authentication check?

The sender email server would have generated a public/private key for the digital signature for outgoing emails. When the recipient email notices there’s an email at the doorstep, it will pull out the public key from the DNS. This will be used to see whether the signature was created using the matching private key. If there is a match, the recipient email server is satisfied that the email is authentic.

It also means that the email content has not been altered after the digital signature was placed. The same may extend to attachments.

What is DKIM selector?

A DKIM selector is a string in DKIM records directing you to the public key. At the time of creating the DKIM signature, you will be asked to specify the private key to be used. When the recipient server receives the email, it will use the DKIM selector to extract the public key that’s used for authentication.

How do I find my DKIM selector?

The most common method to find the DKIM selector is to send an email to yourself. View the email in the form of ‘original message’. In case you don’t see the ‘original message’ option in your email, try ‘full headers’, ‘view mail headers’ ‘show original’ or ‘raw’. Remember, you’re looking for the header of the message, because that’s where the DKIM-signature will be.

Within the DKIM-signature, the selector is mentioned with the “s =” attribute.

How does DKIM work?

Here is a very simplified explanation of how DKIM works. When an email is sent, the sender server attaches a digital signature to the header of the message. Next, the recipient email server extracts this signature. Finally, with the help of public key from the DNS system, the recipient server verifies if the DKIM-signature check returns a valid response.

In a sense, it lets sender domains or organizations provide evidence of authentication, in a way that recipients can verify the evidence and decide if the incoming email is genuine or fraudulent.

What happens if the signature doesn’t match?

Each recipient email server is free to decide how to treat the incoming email whose signatures don’t match. This policy of the recipient email server is called Local Policy, since it does not have to extend to other servers. The Local Policy may decide to reject the incoming email or can quarantine the email.

What else do you recommend besides DKIM?

The results of your email marketing campaigns depend largely upon the various best practices you follow. And one of them is the email data quality of your mailing list. You can check the validity of individual emails using our free email checker tool. If you wish to verify entire mailing lists, you can sign up for a free account and take advantage of free credits.

More Free Tools

Here are more tools for you to use, all free! Verify email address, check DKIM records, perform a DNS lookup, convert CIDR to IP range, and a lot more!

For Email Success

Title link

How to use ChatGPT for email: Marketers share experiences, advice

The idea of AI email copywriter has been discussed from the day ChatGPT was launched. Hardly surprising, because email has been one of the most powerful marketing channels. If you ask for ChatGPT tips to random people, they’ll probably tell you not to worry. After all, how can an intelligent computing system go wrong? However,
Read More »
Title link

How to Use Customer Voice and Reviews to Increase Sales

Visit the website of some well-known SaaS (typically B2B). Or, go to Amazon and search “organic honey” (typically B2C). In both cases, you’ll see a huge number of reviews come up without you asking for it. That’s the power of the customer’s voice. It doesn’t matter whether you’re into B2B marketing or B2C marketing; customer’s
Read More »
Title link

Email Marketing for Events: The Core Tactics to Master

Events are part of the marketing plan of many businesses. Usually aiming to build a customer base and promote brand awareness, events are among the oldest tools in a marketer’s toolbox. Of course, the pandemic stumped in-person events. However, marketers found ways to promote their brands with online events. Online events proved so convenient that
Read More »