DNS RobotDNS Propagation Checker
HomeDNS LookupWHOIS LookupIP LookupSSL Check
DNS RobotDNS Propagation Checker

Next-generation DNS propagation toolkit

Privacy PolicyTerms of ServiceAbout UsContact

DNS Tools

DNS LookupDomain to IPNS LookupMX LookupCNAME LookupView all

Email Tools

SPF Record CheckerDMARC CheckerDKIM CheckerSMTP Test ToolEmail Header AnalyzerView all

Website Tools

WHOIS LookupDomain AvailabilitySubdomain FinderCMS DetectorLink AnalyzerView all

Network Tools

Ping ToolTraceroutePort CheckerHTTP Headers CheckSSL Certificate CheckView all

IP Tools

IP LookupWhat Is My IPIP Blacklist CheckIP to HostnameASN LookupView all

Utility Tools

QR Code ScannerQR Code GeneratorMorse Code TranslatorText to Binary ConverterSmall Text GeneratorView all
© 2026 DNS Robot. Developed by ❤ Shaik Brothers
All systems operational
Made with
  1. Home
  2. /
  3. Email Tools
  4. /
  5. DKIM Checker

DKIM Checker

Check DKIM records for any domain instantly. Our free DKIM checker auto-detects selectors, validates public keys, checks key type and size strength, and runs 10 validation checks with a health score. The most comprehensive DKIM record check tool online.

Free DKIM ToolDKIM Record Check10 ValidationsAuto-Detect Selectors
DKIM Record Checker

What Is a DKIM Record?

A DKIM record (DomainKeys Identified Mail) is a DNS TXT record that contains a public cryptographic key used to verify email signatures. When an email is sent, the sending server creates a digital signature using a private key, which is added to the email headers. The receiving server performs a DKIM check by querying DNS for the corresponding public key and verifying the signature, ensuring the message was not altered in transit and genuinely originated from the claimed domain.

Our free DKIM checker goes beyond basic DKIM lookup. It automatically scans 65+ common selectors (google, default, selector1, selector2, dkim, s1, s2, k1, and more) to find your DKIM record. It then parses every tag, evaluates key type (RSA or Ed25519), checks key size strength, detects testing mode, and runs 10 validation checks to give you a comprehensive DKIM health score. Whether you're setting up a new email service, rotating keys, or troubleshooting delivery issues, this tool provides complete DKIM record validation in seconds.

DKIM checker showing validation results with health score, key analysis, and auto-detected selector
DNS Robot's DKIM checker validates DKIM records with 10 checks, auto-selector detection, and key strength analysis.

How to Check DKIM Record (3 Methods)

There are several ways to check DKIM records for any domain. Our online DKIM checker is the fastest method with automatic selector detection, but command-line tools also work if you know the selector.

How DKIM works showing email signing with private key and DNS public key verification
How DKIM works: the sending server signs emails with a private key, and the receiving server verifies using the public key from DNS.
1
Online DKIM Checker (Recommended)
Enter any domain in our DKIM record checker above and click "Check DKIM". The tool auto-scans 65+ common selectors, retrieves the DKIM record, parses all tags, checks key type and size, and runs 10 validation checks with a health score. No need to know the selector name.
2
Using dig (Mac/Linux)
Run dig google._domainkey.example.com TXT +short replacing "google" with the selector and "example.com" with your domain. This returns the raw DKIM record but requires you to know the selector. For all DNS records, use our DNS Lookup tool.
3
From Email Headers
Open a received email, view the full headers, and find the DKIM-Signature: header. The s= value is the selector and d= is the signing domain. Then use our DKIM checker with that selector for full validation.

DKIM Record Tags — Complete Reference

DKIM records use tags to define the public key configuration. Here are all the tags you may encounter when you check DKIM records:

v (Version)

Must be v=DKIM1. Identifies the record as a DKIM public key. Required for proper identification.

p (Public Key)

Base64-encoded public key. Required. An empty p= means the key has been revoked.

k (Key Type)

Cryptographic algorithm: rsa (default, most common) or ed25519 (modern, compact).

h (Hash)

Hash algorithm for signing: sha256 (recommended) or sha1 (deprecated, weak).

t (Flags)

t=y enables testing mode. t=s requires exact domain match. Remove y for production.

s (Service)

Service type: * (all services, default) or email (email only). Most records use the default.

Our 10 DKIM Validation Checks

DKIM record found for the domain
Valid version tag (v=DKIM1)
Public key (p=) tag present
Key not revoked (p= not empty)
Key type is valid (RSA or Ed25519)
Key size is strong (≥2048-bit RSA)
Not in testing mode (no t=y flag)
Hash algorithm (SHA-256 preferred)
Valid syntax (no unknown tags)
Selector auto-detection result

DKIM Best Practices

Use 2048-bit RSA keys minimum (or Ed25519)
Configure DKIM for every service that sends email
Use unique selectors per email service
Rotate keys every 6-12 months
Revoke old selectors after key rotation
Remove testing mode (t=y) in production
Test DKIM after any DNS changes
Pair with SPF and DMARC for complete email authentication

SPF vs DKIM vs DMARC — Email Authentication Explained

DKIM is one pillar of email authentication. Together with SPF and DMARC, it forms a complete defense against email spoofing and phishing. Here's how they compare:

SPF vs DKIM vs DMARC comparison showing sender verification, message integrity, and policy enforcement
SPF, DKIM, and DMARC work together: SPF checks sender IP, DKIM verifies message integrity, DMARC sets enforcement policy.
SPF

What: Verifies the sending server's IP is authorized

How: DNS TXT record listing allowed IPs

Checks: Envelope sender (Return-Path)

DKIM

What: Verifies the message wasn't tampered with

How: Cryptographic signature in email headers

Checks: Message integrity + signing domain

DMARC

What: Ties SPF + DKIM together with a policy

How: DNS TXT record with enforcement rules

Checks: From header alignment with SPF/DKIM

Related Email & DNS Tools

SPF Checker

Check SPF records, count DNS lookups, and resolve include chains.

DMARC Checker

Check DMARC policy, reporting settings, and alignment mode.

MX Lookup

Check MX records and detect email providers for any domain.

DNS Lookup

Check all DNS record types (A, AAAA, CNAME, MX, TXT, and more).

DNS Validator

Run 17 DNS health checks including SPF and DMARC validation.

IP Blacklist Checker

Check if your mail server IP is blacklisted on major RBLs.

Frequently Asked Questions About DKIM Checker

What is a DKIM record?

A DKIM record is a DNS TXT record containing a public cryptographic key. It allows receiving mail servers to verify that email signatures are authentic and the message was not altered in transit. Every domain that sends email should have DKIM configured.

How to check DKIM record of a domain?

Enter the domain in our DKIM checker above and click "Check DKIM". The tool auto-detects selectors, parses tags, checks key strength, and runs 10 validation checks. You can also specify a selector manually or use dig selector._domainkey.domain.com TXT.

What is a DKIM selector?

A selector identifies which DKIM key to use. The key lives at selector._domainkey.domain.com. Different services use different selectors (Google = "google", Microsoft = "selector1"). Our tool auto-detects 65+ common selectors.

What DKIM key size should I use?

Use at least 2048-bit RSA keys. 1024-bit keys are considered weak. Ed25519 is a modern alternative with equivalent security at smaller sizes (256-bit). Our DKIM check reports key size and warns about weak keys.

How do SPF, DKIM, and DMARC work together?

SPF verifies sender IP, DKIM verifies message integrity, and DMARC ties them together with alignment checks and enforcement policy (none/quarantine/reject). All three should be configured.

How do I find my DKIM selector?

Three ways: (1) Use our DKIM checker — auto-scans 65+ selectors. (2) Check email headers — look for DKIM-Signature: s=selector. (3) Check your email provider's documentation for their default selector name.

What does DKIM testing mode (t=y) mean?

The t=y flag means testing mode. Receiving servers should not reject emails based on DKIM failures. Useful during setup to test without affecting delivery. Remove t=y once DKIM is confirmed working.

What happens when a DKIM key is revoked?

A revoked key has an empty public key (p=). This tells receivers the selector is no longer valid. Used during key rotation after the new key is deployed. Our DKIM checker detects and flags revoked keys.

How often should I rotate DKIM keys?

Every 6-12 months. Steps: publish new key with new selector, update mail server, keep old key active briefly for in-flight emails, then revoke old selector. Use our DKIM checker to verify both old and new keys.

Is this DKIM checker free?

Yes, completely free. Check unlimited domains, auto-detect selectors, analyze key types and sizes, parse all DKIM tags, and get health scores with 10 validation checks. No registration or rate limits.