Free tool · No signup
Free DKIM record checker
Find your DKIM keys across common selectors and check that they're configured to sign your outgoing email.
Results in 5 seconds · 100% free
Primer
What is DKIM?
DKIM stands for DomainKeys Identified Mail, a cryptographic signature added to every email you send. The sending server signs the message with a private key; the receiving server fetches the matching public key from DNS, verifies the signature, and proves two things in one step — the email wasn't tampered with in transit, and it actually came from a server authorized to sign for your domain.
DKIM keys are stored in DNS at {selector}._domainkey.yourdomain.com. The selector is chosen by whoever generates the key — your ESP, your transactional provider, your Workspace admin — and it lets a single domain host many keys simultaneously. One domain can have a dozen DKIM records, one per sending service, and they don't conflict because each lives at a unique host.
Modern DKIM keys should be 2048-bit RSA. 1024-bit keys still work for now but are flagged as weak by Gmail and other major receivers, and most ESPs have already defaulted to 2048-bit for new setups. Rotating an old key to a new selector is usually a one-click operation in your ESP's UI, and rotation is a good idea once a year — long-lived keys are a security risk if they're ever leaked.
Different ESPs use their own selector conventions: Google uses google; Klaviyo uses klaviyo1 and klaviyo2; SendGrid uses s1 and s2; Mailchimp uses k1 and k2; Postmark uses dynamic selectors per account. When you set up a new sender, the ESP gives you a CNAME or TXT record to publish — that delegation is what lets the ESP sign as you while keeping their private key under their control.
Anatomy
How to read your DKIM record
A DKIM record is short by design — just a version, key type, and the public key itself. Here's what each tag does.
Example record
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
v=DKIM1Version tag. Optional but recommended — when present, it must be the first tag in the record.
k=rsaKey type. RSA is the standard. ed25519 is supported by some receivers but RSA is still the universal default.
p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...The public key, base64-encoded. This is the long string receivers use to verify message signatures. If p= is empty, the key has been revoked.
Common pitfalls
Common DKIM mistakes
ESP signing with the wrong domain
If you send through Klaviyo but Klaviyo's DKIM signs as send.yourdomain.com instead of yourdomain.com, DMARC alignment can break. Configure your ESP's branded sender setup so DKIM signs with your own domain, not theirs.
Old 1024-bit keys
Many older setups still use 1024-bit RSA, which Gmail and others now flag as weak. Rotate to 2048-bit keys, generated through your ESP's UI rather than reusing a key you copy-pasted from somewhere else.
Selector typos in DNS
DKIM records live at {selector}._domainkey.yourdomain.com, and a typo in the selector means lookups fail silently — your messages get signed but no one can verify them. Always test by looking up the record at the exact host your ESP gave you.
Keys never rotated
DKIM keys should be rotated periodically. A key that's been signing for years is a security liability — if it's leaked, an attacker can sign mail as you indefinitely. Most ESPs let you generate new selectors without downtime.
Missing DKIM on a new sending platform
Adding a new ESP — Postmark for transactional, a new CRM, a new vendor — without setting up DKIM means every send from that platform fails authentication. Always set up SPF, DKIM and DMARC alignment at the same time as you connect a new sender.
The full picture
Want the full picture?
DKIM is one of six checks in our complete deliverability audit. See your SPF, DKIM, DMARC, BIMI, blacklists and tracking domain all at once.
FAQ