Instantly look up and validate any domain's DKIM record. Check for errors, inspect the public key, detect weak configurations, and get actionable recommendations — free, instant, no account needed.
yourdomain.com.
default, google, selector1, mail, dkim. Check your email provider's settings.
A valid DKIM record is only one piece of the puzzle. To consistently land in the primary inbox — not spam — you need to warm up your sending domain, build sender reputation, and maintain it over time. Warmbase automates all of it.
A DKIM checker is a diagnostic tool that queries a domain's DKIM (DomainKeys Identified Mail) DNS record for a specific selector and analyses it for validity, public key presence, key strength, tag structure, and deliverability risks. Instead of manually querying DNS and decoding base64 keys, a DKIM checker does all the heavy lifting — surfacing errors, inspecting key length, parsing all DKIM tags, and providing actionable recommendations in plain language.
Our free Warmbase DKIM Checker performs a live DNS lookup at selector._domainkey.yourdomain.com, parses the DKIM TXT record in full, validates it against RFC 6376, detects configuration errors and warnings, scores the key strength, checks SPF and DMARC status, and gives you a complete authentication analysis — all in real time, with no signup required.
DomainKeys Identified Mail (DKIM) is an email authentication standard defined in RFC 6376. It allows the sender of a message to attach a cryptographic digital signature to the email headers. The receiving mail server then uses a public key — published in DNS — to verify that the signature is authentic and that the message has not been tampered with in transit.
The process works in two steps. First, the sending mail server signs outgoing messages using a private key. The signature is embedded in the DKIM-Signature header. Second, the receiving server looks up the corresponding public key in DNS at selector._domainkey.yourdomain.com and uses it to verify the signature. If the signature matches, DKIM passes. If the signature is invalid or the DNS record is missing, DKIM fails.
Unlike SPF — which verifies only the sending IP — DKIM proves the email's content integrity. DKIM also survives email forwarding, making it the more reliable authentication signal for inbox placement and DMARC alignment.
Using our checker is the fastest way. Enter your domain name and selector above and click Check DKIM Record. You'll get a full analysis in seconds — including key length, tag breakdown, errors, and recommendations.
You can also check a DKIM record manually using command-line tools:
dig TXT default._domainkey.yourdomain.comnslookup -type=TXT default._domainkey.yourdomain.comReplace default with the actual selector used by your sending platform. Look for a TXT record that starts with v=DKIM1 or contains p=. If no record is returned, DKIM has not been configured for that selector.
To find your selector, check the DKIM-Signature header in a sent message — look for the s= field. Alternatively, check your email provider's documentation or admin panel.
A DKIM selector is a string that identifies which DKIM key pair to use for signing and verification. It is combined with the domain to form the DNS lookup path for the public key: selector._domainkey.yourdomain.com.
Selectors allow domains to publish multiple DKIM keys simultaneously — one per sending platform or use case. This is important because each service (Google Workspace, Microsoft 365, SendGrid, Mailgun, etc.) signs with its own private key and needs its own corresponding public key in DNS.
Common selectors by platform:
googleselector1, selector2s1, s2pic, smtpdefault or mailTo find your exact selector, look at the DKIM-Signature header in a raw email sent from your platform. Find the s= tag — that is your selector.
The DKIM public key (the p= tag in your DNS record) is the publicly accessible half of an RSA key pair. Your sending mail server holds the private key and uses it to create a cryptographic signature for each outgoing message. The receiving server downloads the public key from DNS and uses it to verify that signature.
The public key is encoded in base64 and can be long — typically 216 characters for a 1024-bit key and around 392 characters for a 2048-bit key. This is normal. The full value must be published as a single DNS TXT record.
An empty p= value (p= with nothing after the equals sign) is a valid DKIM construct — it means the key has been intentionally revoked. Any message signed with that selector will fail DKIM verification. This is used when rotating keys to retire old selectors.
If you see an empty p= that you did not intend, republish the correct public key immediately. Every message signed with that selector will fail authentication until the key is restored.
A DKIM TXT record is a semicolon-separated list of tag=value pairs. A minimal valid DKIM record looks like this:
v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB...
The tags and their meanings:
v=DKIM1 — Version. Must be DKIM1. Required (first tag by convention).k=rsa — Key type. rsa is standard; ed25519 is a modern alternative. Defaults to rsa if omitted.p= — Public key (base64-encoded). Required. Empty value means revoked.t= — Flags. t=y = testing mode; t=s = no subdomain use.s= — Service type. Restricts key usage. s=email or s=* (all services).h= — Hash algorithms. Colon-separated. Defaults to allowing all algorithms. Prefer sha256.n= — Human-readable notes. Ignored by mail servers.Tags are separated by semicolons. Whitespace around tags and values is ignored. The p= value may contain whitespace that should be stripped before use.
DKIM failures are one of the most common email deliverability problems. The most frequent causes:
DKIM-Signature header does not match any published DNS record. Check the s= field in the email header and make sure it matches a record in DNS.The fix depends on the specific error found by the checker above. Common fixes:
selector._domainkey.yourdomain.com. Generate a 2048-bit RSA key pair — upload the private key to your sending platform and publish the public key in DNS.DKIM-Signature header in a real sent message. Re-run this checker with the correct selector.mail, use mail2). Update your sending platform to use the new private key, then test before removing the old selector.t=y from your DNS record once you have confirmed DKIM is working correctly.Google Workspace (formerly G Suite) supports DKIM signing for all outbound email. Setting it up requires generating a key in the Google Admin console and publishing it in your domain's DNS.
Steps to set up DKIM for Google Workspace:
google._domainkey.yourdomain.com.To check your Google Workspace DKIM, enter your domain in the checker above with the selector google. If the record is found and valid, DKIM is configured correctly.
DKIM is non-negotiable for cold email. Since Google and Yahoo introduced bulk sender requirements in 2024, authenticated email — meaning valid DKIM, SPF, and DMARC — is required for anyone sending at scale. Without DKIM, your cold emails are at high risk of spam folder placement or outright rejection.
For cold email infrastructure, follow these best practices:
mail.yourdomain.com or a separate domain entirely) to protect your main domain's reputation.p=none with a reporting email) for full authentication coverage.Authentication is the foundation — inbox warming is what builds the reputation on top of it. Use Warmbase to automate the warmup process and maintain sender reputation across all your sending domains.
The key length directly affects the cryptographic security of your DKIM signatures. Here is how 1024-bit and 2048-bit keys compare:
If the checker shows your domain is using a 1024-bit key, you should plan an upgrade. The process: generate a new 2048-bit key pair, publish it under a new selector, update your sending platform to use the new private key, confirm delivery, then remove the old 1024-bit selector.
Never delete an old selector until you have confirmed the new one is working. Both can coexist in DNS simultaneously during the transition.
Email authentication relies on three complementary standards. Each protects against different attack vectors:
p=none (monitoring only) to p=quarantine (spam folder) to p=reject (block entirely).
All three are needed. SPF alone can be bypassed via forwarding. DKIM alone does not prevent IP-based spoofing. DMARC without SPF or DKIM has nothing to enforce. Together, they form a complete email authentication stack that protects deliverability and prevents domain spoofing.
If DKIM is failing despite a record appearing to be published, work through this checklist:
DKIM-Signature header in a real sent message. The selector is in the s= field of the header.selector._domainkey.yourdomain.com. A common mistake is publishing at selector._domainkey without the domain, or adding www..check-auth@verifier.port25.com for a full authentication report. Or send to Gmail and look at the original headers — find the Authentication-Results header for the verdict.p=none with a rua= reporting address gives you visibility into authentication failures before you enforce a stricter policy.A DKIM checker is a tool that performs a live DNS lookup for a domain's DKIM TXT record at a specified selector, validates the record for errors, inspects the public key, parses all DKIM tags, and provides actionable deliverability recommendations. It saves you from manually querying DNS and interpreting raw records.
A DKIM selector is a string used to identify which DKIM key to use. It forms part of the DNS lookup path: selector._domainkey.yourdomain.com. To find your selector, look at the raw headers of a sent message and find the DKIM-Signature header — the s= field is your selector. Common selectors include google, selector1, mail, and default.
The most common reasons are: you are checking the wrong selector (verify the exact selector from your provider), the DNS record has not yet propagated (wait up to 48 hours), there is a typo in the DNS host entry, or DKIM was never configured for this domain with your email platform. Check your provider's documentation for the exact DNS entry required.
2048-bit keys are strongly recommended and effectively required for modern email infrastructure. While 1024-bit keys still work at most receivers, some strict servers reject them, and the IETF and Google both recommend 2048-bit as the minimum. Always generate new keys at 2048 bits.
DNS propagation for a new DKIM record typically takes between a few minutes and 48 hours, depending on your DNS provider and the TTL of the record. Most major DNS providers propagate changes within 1–2 hours. If your record is not found immediately after publishing, wait and check again before troubleshooting further.
Yes — unlike SPF, DKIM supports multiple selectors per domain. Each selector is an independent DNS record. You can have one for Google Workspace, one for SendGrid, one for your custom SMTP, and so on. All work simultaneously. This is best practice: each sending service should have its own DKIM key pair.
Common causes include: the wrong selector configured in Google Admin, the DNS record not yet published or containing a typo, the private key in Google Admin not matching the public key in DNS, or DKIM not yet activated in Google Admin after publishing the DNS record. Go to Admin console → Apps → Google Workspace → Gmail → Authenticate email and verify the status shows "Authenticating email".
An empty p= tag means the DKIM key has been revoked. Any message signed with this selector will fail DKIM verification. If this was intentional (you retired an old key), ensure a new selector with a valid key is active. If it was unintentional, republish the correct public key immediately.
DKIM generally survives email forwarding — unlike SPF, which breaks when the connecting IP changes. However, some forwarders modify the message body (adding a footer or disclaimer), which invalidates the DKIM body hash and causes verification failure. DKIM header signing is unaffected by body changes, but body signature failures can still impact DMARC alignment depending on the signing configuration.
Security best practice recommends rotating DKIM keys every 6–12 months. To rotate safely: generate a new key pair, publish the new public key under a new selector, update your sending platform to use the new private key, confirm email is being signed and verified with the new key, then retire the old selector after 72 hours to allow in-flight messages to be verified.
DKIM is necessary but not sufficient on its own. You also need a valid SPF record and a DMARC policy. Beyond authentication, inbox placement depends heavily on sender reputation — which is built over time through consistent sending, low bounce rates, good engagement, and inbox warming. Authentication is the foundation; reputation is built on top of it.