Temp Mail Logo

Temp Mail safeguards your privacy while keeping your inbox free from spam.

DKIM Checker · Tag Parser · Key Strength · Selector Discovery

DKIM Analyzer

Free DKIM record checker and analyzer — look up any domain's DKIM DNS record, parse every tag, verify key strength, detect revoked keys and test mode. Includes 20-selector bulk scan.

✓ Full tag-by-tag parsing✓ RSA key bit estimation✓ Revocation detection✓ 20-selector bulk scan✓ No signup
Queries via Cloudflare DNS-over-HTTPS (Google DoH fallback). Enter a custom selector or leave blank for 'default'.
What this tool does

Free DKIM analyzer — check, validate, and verify DKIM records

DKIM (DomainKeys Identified Mail) is an email authentication protocol that lets a domain owner cryptographically sign outgoing messages. When your mail server sends an email, it attaches a digital signature in the message header using a private key. Receiving mail servers retrieve the corresponding public key from DNS — the DKIM TXT record — and verify the signature. A valid signature confirms the message was not altered in transit and genuinely originated from the signing domain.

A DKIM record is stored under a specific selector subdomain: selector._domainkey.yourdomain.com. The selector is a label that namespaces the key — a domain can have multiple DKIM keys active simultaneously, one per selector name. This allows you to use different keys for different email service providers (Google Workspace, SendGrid, Mailchimp) or rotate keys safely without disrupting delivery. Common selector names include google, selector1, selector2, mail, k1, and k2. Checking common selector names is the fastest way to discover whether DKIM is configured when you don't know the selector in advance.

This DKIM analyzer queries your domain's record in real time using Cloudflare DNS-over-HTTPS and decodes every tag. It estimates RSA key bit-strength from the base64-encoded key length: anything under 1024 bits fails at many providers, 1024-2047 is valid but aging, and 2048+ is the current recommendation. Ed25519 keys are detected and treated as secure regardless of size. The analyzer also flags revoked keys (empty p= tag) and test mode configurations (t=y flag) that must be removed before production use.

What this tool analyzes
v= tag
Version — should always be DKIM1
k= tag
Key type — RSA (standard) or Ed25519 (modern)
p= tag
Public key — analyzed for bit strength; empty means revoked
t= tag
Flags — detects test mode (t=y) that must be removed for production
h= tag
Hash algorithms — checks for SHA-256 support
s= tag
Service type — restricts which services can use this key
Key bit-strength
Estimates RSA key size from base64 length: <1024 = bad, 1024-2047 = warn, 2048+ = good
Bulk selector scan
Checks 20 common selectors to discover all active DKIM keys on a domain
Examples

Real-world DKIM records — what each one means

These examples show what different DKIM configurations look like and how the analyzer interprets them.

Example 1Google Workspace — 2048-bit RSA
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2a8...
Standard Google Workspace DKIM configuration. v=DKIM1 and k=rsa are correct. A long p= value indicates a 2048-bit RSA key — secure and widely supported. This configuration passes all checks.
Example 2Ed25519 modern key
v=DKIM1; k=ed25519; p=11qYAYKxCrfVS/7TyWQHOg7hcvPapiMlrwIaaPcHURo=
A compact Ed25519 key — only 44 base64 characters but provides approximately 256-bit security equivalent. Modern and efficient. Supported by most major mail servers. The analyzer correctly identifies this as a non-RSA key and skips bit-strength estimation.
Example 3Revoked key — will fail verification
v=DKIM1; k=rsa; p=
An empty p= tag signals that this DKIM key has been revoked. Any email signed with this selector will immediately fail DKIM verification at receiving mail servers. Publish a new selector with a new key before revoking the old one.
Example 4Test mode — not enforced in production
v=DKIM1; k=rsa; t=y; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GN...
The t=y flag puts this selector in test mode. Receiving servers may log DKIM failures rather than treating them as hard errors. This is appropriate during initial setup, but must be removed before the selector is used in production email.
Example 5Weak key — below minimum (1024-bit RSA)
v=DKIM1; k=rsa; p=MIGJAoGBALRiMLAHudeSA8xP...
A shorter p= value indicates a 1024-bit RSA key, which is below the current recommended minimum of 2048 bits. Gmail and other major providers may reject or warn on email signed with sub-1024-bit keys. Rotate to a 2048-bit or Ed25519 key as soon as possible.
FAQ

Frequently asked questions

What is a DKIM record?
A DKIM (DomainKeys Identified Mail) record is a DNS TXT entry that publishes the public key used to verify cryptographic signatures on outgoing email. When a mail server receives a message, it retrieves the DKIM public key from the sender's DNS and uses it to verify that the message was not altered in transit and actually came from the claimed domain.
What is a DKIM selector?
A selector is a label that namespaces the DKIM key, stored in DNS as selector._domainkey.yourdomain.com. A domain can publish multiple DKIM keys simultaneously — one per selector name. This allows different email services to use different keys, and enables key rotation without disrupting delivery. Common selector names include default, google, selector1, selector2, mail, k1, and k2. Checking common selector names is the fastest way to discover whether DKIM is configured when you don't know the selector in advance.
How do I find my DKIM selector?
Look in the DKIM-Signature header of any email you have sent — the s= tag contains the selector name. You can view email headers in most email clients under View > View Source or Show Original. If you use Google Workspace, your selector is typically 'google'. For Microsoft 365 it is 'selector1' or 'selector2'. For Mailchimp it is often 'k1'.
What DKIM key size is recommended?
2048-bit RSA is the current recommendation. Keys below 1024 bits are rejected by many mail providers including Gmail and Outlook. Keys between 1024 and 2047 bits are technically valid but aging. Ed25519 is an excellent modern alternative — it provides approximately 256-bit equivalent security strength in a much smaller key, and is supported by most modern mail servers. RSA-1024 is considered weak and should be rotated to 2048-bit -- many receiving mail servers will flag it as insecure during authentication checks.
What does 'key revoked' mean in a DKIM record?
A revoked DKIM key has an empty p= tag (p=). This signals to receiving mail servers that the key is no longer valid. Any email signed with that selector will immediately fail DKIM verification. If you need to rotate keys, always publish a new selector with the new key first, let DNS propagate, then revoke the old one. Never delete an active key without first deploying its replacement, as in-flight messages signed with the old key will immediately fail verification.
What is DKIM test mode?
DKIM test mode is indicated by the t=y flag in the DKIM record. It signals that the domain owner is testing their DKIM setup. Receiving servers may log failures rather than treating them as errors. This is useful during initial deployment, but the t=y flag must be removed before using the selector in production — otherwise DKIM provides no real authentication benefit.
What does the DKIM p= tag contain?
The p= tag contains the public key in base64-encoded format. For RSA keys, the length of this base64 string is proportional to the key size — a 2048-bit key produces a much longer p= value than a 1024-bit key. This analyzer estimates the bit-strength by measuring the decoded length of the p= value. An empty p= tag means the key has been revoked.
How does this DKIM analyzer work?
The tool queries the DKIM DNS TXT record at selector._domainkey.yourdomain.com using Cloudflare's DNS-over-HTTPS API (with Google DoH as a fallback). It then parses the raw record text and analyzes each tag: v= (version), k= (key type), p= (public key), t= (flags), h= (hash algorithms), s= (service type), and n= (notes). The result includes a security assessment of each tag. The analyzer runs from your browser via Cloudflare DNS over HTTPS -- no email is sent and your domain is not stored anywhere.
What is a DKIM bulk selector scan?
The bulk scan mode checks 20 of the most common DKIM selector names against your domain simultaneously — including default, google, selector1, selector2, mail, k1, k2, mailchimp, sendgrid, amazonses, and others. This is useful when you do not know which selectors your email providers have configured, or when auditing all active DKIM keys on a domain. The bulk scan checks selectors in parallel and shows which are active, which have weak keys, and which have been revoked or removed.
Does DKIM alone protect against email spoofing?
DKIM alone is not sufficient for full email authentication. It verifies message integrity and confirms the signing domain, but does not prevent a different domain from sending email and signing with their own DKIM key. DKIM works best as part of the full email authentication stack: SPF restricts which servers can send on behalf of your domain, DKIM signs messages cryptographically, and DMARC ties the two together with a policy for handling failures.

Need a disposable address right now? Generate a free, instant throwaway email — zero signup, zero trace.

Get Free Temp Mail