DKIM Analyzer

Enter domain name and selector to check current DKIM record of that domain.
Enter Domain Name
Enter Selector
Trusted by over 127,000 businesses of all size.

Don’t let the bad guys impersonate as the nice guys

Check DKIM record to immediately know if there’s an authorised digital signature associated with a domain. A domain without the DKIM digital signature is always open to risks. Your email server can use that information for spam filtering, anti-phishing and more. That keeps most of the bad guys away.

Builds trust quotient

DKIM authorisation raises the credibility of the sender domain in the email ecosystem.

Checks altered contents

It assures you that parts of the email content have not been modified after the digital signature was affixed.

Don’t be called a spammer

Even strict email servers view favorably incoming emails that have DKIM authorisation.

Improves email KPIs’

Emails with DKIM records enjoy the trust of email servers. That’s why they achieve better KPIs.

Let customers correct typos and enter valid email addresses. Detect and stop fake signups on the go. Add our free real-time email verification API wherever you collect emails and build a mailing list that grows your business.

Frequently Asked Questions

What does DKIM stand for?

DKIM stands for DomainKeys Identified Mail. It is an email authentication method that uses digital signatures to verify the authenticity of emails.

Why should I check DKIM records?

There are several advantages of checking DKIM records. Firstly, it discourages fraudsters because in any case, recipient email servers would easily identify their emails as spam or forged emails.

Next, it is an added layer of security for emails and a part of the email sending best practices.

Also, it helps separate the good emails from the bad emails: without DKIM records, even genuine emails can be classified or labeled as spam. That would adversely affect email deliverability and there drastically lower the email marketing ROI.

What does the DKIM authentication check?

The sender email server would have generated a public/private key for the digital signature for outgoing emails. When the recipient email notices there’s an email at the doorstep, it will pull out the public key from the DNS. This will be used to see whether the signature was created using the matching private key. If there is a match, the recipient email server is satisfied that the email is authentic.

It also means that the email content has not been altered after the digital signature was placed. The same may extend to attachments.

What is DKIM selector?

A DKIM selector is a string in DKIM records directing you to the public key. At the time of creating the DKIM signature, you will be asked to specify the private key to be used. When the recipient server receives the email, it will use the DKIM selector to extract the public key that’s used for authentication.

How do I find my DKIM selector?

The most common method to find the DKIM selector is to send an email to yourself. View the email in the form of ‘original message’. In case you don’t see the ‘original message’ option in your email, try ‘full headers’, ‘view mail headers’ ‘show original’ or ‘raw’. Remember, you’re looking for the header of the message, because that’s where the DKIM-signature will be.

Within the DKIM-signature, the selector is mentioned with the “s =” attribute.

How does DKIM work?

Here is a very simplified explanation of how DKIM works. When an email is sent, the sender server attaches a digital signature to the header of the message. Next, the recipient email server extracts this signature. Finally, with the help of public key from the DNS system, the recipient server verifies if the DKIM-signature check returns a valid response.

In a sense, it lets sender domains or organizations provide evidence of authentication, in a way that recipients can verify the evidence and decide if the incoming email is genuine or fraudulent.

What happens if the signature doesn’t match?

Each recipient email server is free to decide how to treat the incoming email whose signatures don’t match. This policy of the recipient email server is called Local Policy, since it does not have to extend to other servers. The Local Policy may decide to reject the incoming email or can quarantine the email.

What else do you recommend besides DKIM?

The results of your email marketing campaigns depend largely upon the various best practices you follow. And one of them is the email data quality of your mailing list. You can check the validity of individual emails using our free email checker tool. If you wish to verify entire mailing lists, you can sign up for a free account and take advantage of free credits.

More Free Tools

Here are more tools for you to use, all free! Verify email address, check DKIM records, perform a DNS lookup, convert CIDR to IP range, and a lot more!

For Email Success

Title link

Google, Yahoo New Email Authentication Requirements from 2024

Gmail and Yahoo recently announced new requirements for bulk email senders. These requirements will make identity verification mandatory, unsubscription swifter, and spam prevention even more effective. As a result, it will improve email experience by making it more secure and relevant. Find out how it impacts you and what you need to do about these
Read More »
Title link

Analysis of the 7 Best Email Opening Lines We Loved

Email opening lines are the first few lines of your email, typically the first three or four sentences. They are important in deciding the success of your email campaigns. They decide if the person will continue reading your email and engage further. Sure, email subject lines matter very much. A compelling or funny subject line
Read More »
Title link

iOS 17 Impact on Email Marketing

Apple’s Link Tracking Protection (LTP) is part of the many recent updates related to privacy, link tracking, and private browsing. Marketers have been discussing iOS 17 changes and its implications, because it limits the extent to which you could track links. Links, emails, and ads accessed through an Apple device shall not provide you the same
Read More »