DKIM Checker
Enter any domain and selector to check its DKIM record. We validate the signature, inspect key strength, detect selectors, and flag anything that could weaken your email authentication.
Common selectors include: google, selector1, selector2, s1, k1, default
Understanding Your DKIM Check
Here's what each result means and what to do next.
DKIM Pass
Your DKIM signature is valid and properly configured
A passing result means your DKIM record exists, your public key is published correctly, and your key size and hash algorithm meet current security standards. Receiving mail servers can verify that messages from your domain haven't been tampered with in transit. To complete your email authentication, make sure SPF and DMARC are also configured.
- Valid DKIM signature found
- Public key is published and accessible
- Key size meets current security standards
- Hash algorithm is secure
DKIM Warning
Your signature works but has issues worth fixing
A warning means your DKIM record is technically valid but has issues that could weaken your email security. Common warnings include using a 1024-bit key instead of 2048-bit, relying on SHA-1 instead of SHA-256, or having selectors that haven't been rotated in a long time.
- Key size is below recommended 2048 bits
- Using an outdated hash algorithm
- Missing recommended key rotation
- Selector naming could expose internal infrastructure
DKIM Fail
Your DKIM configuration has issues that need to be fixed
A failing result means emails from your domain can't be verified by receiving servers — putting them at risk of being rejected or sent to spam. The most common causes are a missing DKIM record, a malformed public key, or a DNS syntax error. Each of these is fixable — review the details above for specific guidance.
- No DKIM record found for the selector
- Public key is missing or malformed
- Signature verification failed
- DNS record syntax errors
Common DKIM Problems and How to Fix Them
These are the DKIM problems we see most often. If your check flagged any of these, here's what they mean and how to fix them.
Weak Key Size
The most common DKIM weakness
DKIM keys that are 1024 bits or shorter are increasingly vulnerable to brute-force attacks. Major providers like Google and Microsoft recommend 2048-bit keys as the minimum. A weak key means your DKIM signature could eventually be forged — undermining the entire point of signing your emails.
Missing DKIM Record
No public key to verify against
If there's no DKIM TXT record in DNS for the selector your email service uses, receiving servers have no public key to verify your signatures against. This means every DKIM check fails — and if you have a DMARC policy set to quarantine or reject, those messages may never reach the inbox.
Selector Misconfiguration
Wrong selector breaks verification
DKIM selectors are the bridge between a signed email and its public key in DNS. If the selector in outgoing email headers doesn't match a published DNS record, verification fails silently. This is especially common when migrating email providers or adding new sending services — the old selector stays in the headers but the DNS record has changed.
No Key Rotation
Static keys are a growing risk
DKIM keys that never change give attackers more time to compromise them — and once compromised, they can sign forged emails that pass verification. Regular key rotation limits the window of exposure. Most organizations should rotate DKIM keys at least annually, using new selectors each time and retiring the old ones.
Why DKIM Matters for Your Business
Emails Get Tampered With in Transit
Your Domain Gets Impersonated
DMARC Alignment Breaks
Deliverability Suffers Silently
Check Your Full Email Authentication with iO™ DMARC
SPF is one piece of the puzzle. Use these tools to check the rest of your email authentication stack.
SPF Checker
Validate your SPF record and confirm which servers are authorized to send on your behalf. SPF works alongside DKIM to verify that messages come from approved sources.
DMARC Checker
Check your DMARC policy and alignment. DMARC uses your DKIM signature to verify message integrity, and tells receivers what to do when verification fails.
BIMI Checker
See if your domain qualifies to display your brand logo in supported inboxes. BIMI requires DMARC alignment, which depends on a valid DKIM signature.
MTA-STS Checker
Check whether your domain enforces encrypted email delivery. MTA-STS protects messages in transit, complementing the message integrity that DKIM provides.
TLS-RPT Checker
Verify your TLS reporting setup. TLS-RPT alerts you when sending servers fail to establish secure connections with your domain, so you catch delivery issues early.
Email Authentication Audit
Get a complete picture of your SPF, DKIM, DMARC, BIMI, and MTA-STS configuration in one report. See what’s working, what’s broken, and what to fix first.
Ready to secure your email domain?
DKIM is just one layer. iO™ DMARC manages your entire email authentication stack, so you don’t have to.
Learn About DKIM
DKIM Record Examples
DKIM Failure Troubleshooting
Managed Email Authentication
Ready to Fix Your Email Authentication?
Found issues with your DKIM record? Or just want someone to handle email authentication so you don't have to think about it? Let's talk.
Want DKIM Managed for You?
iO™ DMARC keeps every DKIM selector visible in one dashboard, handles key generation and rotation, and tracks alignment per sender so signatures do not quietly start failing.
See How iO™ DMARC Handles DKIM