Skip to main content

How to Find Your DKIM Selector: 4 Methods Explained Step by Step

By CaptainDNS
Published on February 18, 2026

Diagram showing the 4 methods to find a DKIM selector
TL;DR
  • The DKIM selector is a text identifier (e.g., google, selector1, k1) that locates the public key in DNS
  • Method 1: Open a received email's headers and look for s= in the DKIM-Signature line
  • Method 2: Check your email provider's admin console (Google, Microsoft, etc.)
  • Method 3: Test manually with dig or nslookup if you know the provider
  • Method 4: Use an automatic discovery tool to scan 100+ known selectors via DNS brute-force

You want to check your DKIM configuration, but the tool you're using asks for a "selector" and you have no idea what that is. You're not alone. This is the first obstacle most administrators face when they start exploring email authentication.

The DKIM selector is a text identifier used to locate the DKIM public key in a domain's DNS. Without it, verifying a DKIM signature is impossible. The good news: there are several ways to find it, even if nobody gave it to you.

This guide presents 4 practical methods, from simplest to most technical. Whether you're a system administrator, marketing manager, or developer, one of them will work for your situation.

What is a DKIM selector?

When an email server signs a message with DKIM, it adds a DKIM-Signature header that contains, among other things, two key pieces of information:

  • d=: the signing domain (e.g., captaindns.com)
  • s=: the selector (e.g., google, selector1, s1)

The recipient combines these two values to look up the public key in DNS:

<selector>._domainkey.<domain>

For example, for the domain captaindns.com with the selector google:

google._domainkey.captaindns.com    TXT    "v=DKIM1; k=rsa; p=MIIBIj..."

Each email provider uses its own selector. A domain can have multiple selectors (one per sending service). That's why there is no universal "default" value.

Diagram showing how the DKIM selector works in DNS

Method 1: Extract the selector from email headers

This is the most reliable method. Every DKIM-signed email contains the selector in plain text within its headers.

Step 1: Open the full headers

Email clientHow to access headers
Gmail (web)Open the message > Menu ⋮ > "Show original"
Outlook (web)Open the message > Menu ⋯ > "View message source"
Apple MailView > Message > All Headers
ThunderbirdView > Headers > All

Step 2: Find DKIM-Signature

In the headers, look for the line that starts with DKIM-Signature::

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=captaindns.com; s=google; t=1739800000;
  h=from:to:subject:date:message-id;
  bh=abcdef123456...;
  b=ABCDEF789012...

Step 3: Read the s= value

The selector is the value after s=. In the example above: google.

Note: an email can contain multiple DKIM signatures (one per service it passed through). Look for the one where d= matches your domain.

When to use this method

  • You have access to an email sent from the domain you want to verify
  • You want the exact selector used in production
  • You suspect the selector was recently changed

Method 2: Check the provider's admin console

Each email provider displays the DKIM selector in its admin console.

Google Workspace

  1. Open the Google Admin Console
  2. Menu > Apps > Google Workspace > Gmail
  3. "Email authentication" > click on the domain
  4. The selector is displayed (default: google)

Microsoft 365

  1. Open the Exchange Admin Center
  2. Mail flow > Rules > DKIM
  3. Select the domain
  4. The selectors are displayed (default: selector1 and selector2)

Other providers

ProviderLocationDefault selector
SendGridSettings > Sender Authentication > Domains1, s2
MailchimpWebsite > Domains > Authenticationk1, k2, k3
PostmarkSender Signatures > DNS Settingspm
HubSpotSettings > Domain & URLs > Email Sendinghs1, hs2
BrevoSettings > Senders > Domainsmail, sendinblue

When to use this method

  • You are the email service administrator
  • You are configuring DKIM for the first time
  • You are looking for the selector before sending a first email

Method 3: Query DNS manually

If you know the email provider, you can test known selectors directly via a DNS query.

With dig (Linux/macOS)

dig TXT google._domainkey.captaindns.com +short

Result if the selector exists:

"v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOC..."

Result if the selector does not exist: no output (NXDOMAIN).

With nslookup (Windows)

nslookup -type=TXT google._domainkey.captaindns.com

With PowerShell

Resolve-DnsName -Name "google._domainkey.captaindns.com" -Type TXT

Which selectors to test?

If you don't know which provider is being used, start with the most common ones:

dig TXT google._domainkey.captaindns.com +short
dig TXT selector1._domainkey.captaindns.com +short
dig TXT selector2._domainkey.captaindns.com +short
dig TXT s1._domainkey.captaindns.com +short
dig TXT k1._domainkey.captaindns.com +short
dig TXT default._domainkey.captaindns.com +short

When to use this method

  • You have terminal/CLI access
  • You know the likely provider
  • You want to verify whether a specific selector exists in DNS

Method 4: Automatic discovery tool

If you don't know which provider is being used, or if you want a complete inventory, an automated DNS brute-force tool is the most efficient solution.

The concept: the tool automatically tests dozens of known selectors by querying DNS. It's exactly Method 3, but automated across 50 to 120 selectors.

How does it work?

  1. The tool detects your email providers via MX records
  2. It prioritizes known selectors for those providers
  3. It tests each selector in parallel via DNS TXT queries
  4. It analyzes each DKIM record found (key type, length, validity)

Advantages

AdvantageDetails
No email neededWorks with DNS only
No admin access neededExternal verification
Discovers forgotten selectorsOld providers still configured
Automatic analysisAlerts on weak keys (1024 bits)

Limitations

DNS does not allow listing all subdomains of a zone. Custom selectors (e.g., campaign-2024-q3) or dynamically generated ones (hash, UUID) will not be detected by brute-force.

When to use this method

  • You don't know the email provider
  • You are auditing a third-party domain
  • You want a complete inventory before deploying DMARC p=reject

Default DKIM selectors: quick reference

ProviderDKIM SelectorsType
Google WorkspacegoogleEmail
Microsoft 365selector1, selector2Email
SendGrids1, s2, smtpapiTransactional
Mailchimpk1, k2, k3Marketing
Amazon SESamazonsesTransactional
PostmarkpmTransactional
HubSpoths1, hs2Marketing
Brevo (Sendinblue)mail, sendinblueMarketing
Zoho Mailzoho, zmailEmail
Mailgunsmtp, pic, k1Transactional

An active domain typically uses 2 to 4 selectors: one for the main email service, one or two for marketing tools, and sometimes one for transactional email.

Table of DKIM selectors by provider

Comparing the 4 methods

CriteriaEmail headersAdmin consoleManual DNSAutomatic tool
ReliabilityVery highHighHighHigh
Access requiredReceived emailAdmin accountTerminalNone
Discovers all selectorsNo (1 per email)No (1 provider)No (1 per query)Yes (50-120 tested)
Technical levelLowLowMediumLow
Time2 min5 min10 min30 sec
Exact selector in productionYesNot alwaysIf guessedYes

Recommendation: start with Method 1 if you have an email on hand. Use Method 4 for a complete audit.

  1. Quick check: open a received email, look for s= in DKIM-Signature (Method 1)
  2. Complete inventory: run an automatic scan to discover all active selectors (Method 4)
  3. Validation: verify each selector found with a DKIM Checker to confirm the public key is valid
  4. Documentation: record your active selectors and the associated provider for future reference
  5. Cleanup: remove DNS records for DKIM selectors from providers you no longer use

FAQ

What is a DKIM selector?

A DKIM selector is a text identifier used to locate the DKIM public key in DNS. It is published at the address selector._domainkey.domain.com. Each email provider uses its own selector: Google uses google, Microsoft uses selector1 and selector2, SendGrid uses s1 and s2.

Where can I find the DKIM selector in an email?

Open the full headers of the email (in Gmail: menu ⋮ > "Show original"). Look for the DKIM-Signature: line and read the value after s=. That is your selector. Note that an email can contain multiple DKIM signatures if the message passed through multiple services.

How do I find the DKIM selector without an email?

Two options: check your email provider's admin console (Google Admin, Exchange, etc.), or use an automatic discovery tool that tests known selectors via DNS brute-force. The second option requires no account access.

What are the default DKIM selectors for Google Workspace?

Google Workspace uses the selector google by default. The DKIM record is published at google._domainkey.captaindns.com. Some advanced configurations may use a custom selector defined in the Google Admin Console.

What are the DKIM selectors for Microsoft 365?

Microsoft 365 uses two selectors: selector1 and selector2. They are published via CNAME records that point to Microsoft's servers. Rotation between the two selectors is managed automatically by Microsoft.

Can a domain have multiple DKIM selectors?

Yes, and it's quite common. An active domain typically uses 2 to 4 selectors: one for email (Google/Microsoft), one for marketing (Mailchimp/HubSpot), and one for transactional email (SendGrid/Postmark). Each selector has its own public key in DNS.

Is the DKIM selector confidential?

No. The DKIM selector is public information. It is visible in the headers of every sent email and points to a public DNS record. Knowing the selector does not compromise security. Only the private key (stored on the sending server) must remain confidential.

Glossary

  • DKIM selector: a text identifier used to locate the DKIM public key in DNS at the address selector._domainkey.domain.
  • DKIM-Signature: a header added to an email by the sending server, containing the cryptographic signature and metadata (domain, selector, algorithm).
  • _domainkey: a DNS namespace reserved for DKIM keys. All DKIM records are published under <selector>._domainkey.<domain>.
  • CNAME: a DNS record type used by some providers (Microsoft, SendGrid) to delegate DKIM key management to their own servers.
  • DNS brute-force: a technique that tests a catalog of known selectors by querying DNS, in order to discover the selectors configured for a domain.

Discover your DKIM selectors in seconds: use the DKIM Selector Finder to automatically scan 100+ known selectors on your domain.


Sources

Similar articles