{"id":2300,"date":"2022-08-23T00:00:00","date_gmt":"2022-08-23T00:00:00","guid":{"rendered":"https:\/\/www.mailboxvalidator.com\/resources3\/articles\/what-is-dkim-and-why-should-i-use-it\/"},"modified":"2022-08-23T00:00:00","modified_gmt":"2022-08-23T00:00:00","password":"","slug":"what-is-dkim-and-why-should-i-use-it","status":"publish","type":"docs","link":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/","title":{"rendered":"What is DKIM, and Why Should I Use it?"},"content":{"rendered":"\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png\" alt=\"Learn on how to use DKIM to fight spammer, and why use DKIM\" class=\"wp-image-1929\" width=\"800\" height=\"400\" srcset=\"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png 1200w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-300x150.png 300w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-1024x512.png 1024w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-768x384.png 768w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-50x25.png 50w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-920x460.png 920w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-600x300.png 600w, https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img-320x160.png 320w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Intro<\/h2>\n\n\n\n<p>Email spoofing is a big issue these days. Innocent email domains are often used in phishing and spam attacks. This can lead to those domains being blacklisted as spammers.<\/p>\n\n\n\n<p>However, there is a technique that can be used to authenticate that the email coming from that domain is actually authorized by the domain owner. DKIM or DomainKeys Identified Mail, is an email authentication method.<\/p>\n\n\n\n<p>DKIM is an Internet Standard which is defined by the below:<\/p>\n\n\n\n<p><a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc6376\/\">RFC 6376<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc8301\/\">RFC 8301<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8463\">RFC 8463<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does DKIM work?<\/h2>\n\n\n\n<p>Firstly, the mail server administrator needs to generate a public-private key pair. This can be generated by using a tool such as ssh-keygen on Linux or PuTTYgen on Windows.<\/p>\n\n\n\n<p>Then, the admin needs to create a DKIM TXT record in the DNS using the public key as well as a simple user-defined text string, called a selector.<\/p>\n\n\n\n<p>The final step in the setup is to configure the mail server to use the private key to send out a DKIM signature inside each email sent.<\/p>\n\n\n\n<p>When the recipient mail server or ISP receives the emails, they can verify the authenticity by matching the signature against the public key stored in the DKIM TXT record in the DNS.<\/p>\n\n\n\n<p>For more details on configuring DKIM, see the related article below:<br><a href=\"https:\/\/www.mailboxvalidator.com\/resources\/articles\/configuring-domainkeys-identified-mail\/\">https:\/\/www.mailboxvalidator.com\/resources\/articles\/configuring-domainkeys-identified-mail\/<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why should I use DKIM?<\/h2>\n\n\n\n<p>DKIM signatures are usually not visible to the end users. They are affixed or verified by the infrastructure rather than the message&#8217;s authors and recipients. This means it\u00e2\u20ac\u2122s harder to tamper with the signature.<\/p>\n\n\n\n<p>In addition, it can also be used to verify that the content of the email has not changed since the signature was generated. Since the private key is never exposed to the general public, it would be impossible for someone to generate the right DKIM signature that matches the public key.<\/p>\n\n\n\n<p>With this protection against content tampering and having the originating email domain authenticated, mail server admins can rest easy that spam or phishing emails bearing their domain name will not get through to the end users.<\/p>\n\n\n\n<p>When ISPs detect that DKIM is configured for your domain, they will trust that any DKIM authenticated emails are really from you. In other words, your email domain will experience less bounce as more of your emails are able to pass the anti-spam scrutiny by the recipient mail servers. Your domain reputation will increase which will help you with your email marketing efforts.<\/p>\n\n\n\n<p>Last but not least, DKIM is also used as part of another authentication method called DMARC. DMARC which stands for \u00e2\u20ac\u0153Domain-based Message Authentication, Reporting &amp; Conformance\u00e2\u20ac\u009d, is an email authentication, policy, and reporting protocol.<\/p>\n\n\n\n<p>To learn more about configuring DMARC, read the below page:<br><a href=\"https:\/\/www.mailboxvalidator.com\/resources\/articles\/dmarc-record-protect-your-email-domain\/\">https:\/\/www.mailboxvalidator.com\/resources\/articles\/dmarc-record-protect-your-email-domain\/<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>DKIM is a powerful tool in the mail server administrator\u00e2\u20ac\u2122s arsenal to help combat spammers abusing your email domains for illegal purposes. Email domain reputation is vital these days to prevent being blacklisted and as such must be protected as much as possible. Your emails will NOT get through to your audience. Your ROI will suffer if your customers never see your marketing materials.<\/p>\n\n\n\n<p>Configure DKIM today, if you haven\u00e2\u20ac\u2122t done so. Ensure the peace of mind that comes from knowing that your emails cannot be tampered with or forged. To fully protect your domain, consider using DKIM and DMARC together for the best possible protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intro Email spoofing is a big issue these days. Innocent email domains are often used in phishing and spam attacks. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[45],"doc_tag":[],"class_list":["post-2300","docs","type-docs","status-publish","hentry","doc_category-general-topics"],"year_month":"2026-05","word_count":567,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"mbv_editor","author_nicename":"mbv_editor","author_url":"https:\/\/www.mailboxvalidator.com\/resources\/author\/mbv_editor\/"},"doc_category_info":[{"term_name":"General Topics","term_url":"https:\/\/www.mailboxvalidator.com\/resources\/article-categories\/general-topics\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is DKIM, and Why Should I Use it? -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DKIM, and Why Should I Use it? -\" \/>\n<meta property=\"og:description\" content=\"Intro Email spoofing is a big issue these days. Innocent email domains are often used in phishing and spam attacks. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailboxvalidator\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@MailBoxV\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/\",\"url\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/\",\"name\":\"What is DKIM, and Why Should I Use it? -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/mbv-aug-img.png\",\"datePublished\":\"2022-08-23T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/mbv-aug-img.png\",\"contentUrl\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/mbv-aug-img.png\",\"width\":1200,\"height\":600,\"caption\":\"Learn on how to use DKIM to fight spammer, and why use DKIM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/what-is-dkim-and-why-should-i-use-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge Base\",\"item\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is DKIM, and Why Should I Use it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/#website\",\"url\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/\",\"name\":\"MailboxValidator Articles\",\"description\":\"MailboxValidator Articles\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/#organization\",\"name\":\"MailboxValidator\",\"url\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/cropped-mailboxvalidator-fb-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/cropped-mailboxvalidator-fb-logo.png\",\"width\":1199,\"height\":399,\"caption\":\"MailboxValidator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailboxvalidator.com\\\/resources\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailboxvalidator\",\"https:\\\/\\\/x.com\\\/MailBoxV\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailboxvalidator\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/mailboxvalidator\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCesIP5V7nXRXthaqdjjfCFg\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is DKIM, and Why Should I Use it? -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/","og_locale":"en_US","og_type":"article","og_title":"What is DKIM, and Why Should I Use it? -","og_description":"Intro Email spoofing is a big issue these days. Innocent email domains are often used in phishing and spam attacks. [&hellip;]","og_url":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/","article_publisher":"https:\/\/www.facebook.com\/mailboxvalidator","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@MailBoxV","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/","url":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/","name":"What is DKIM, and Why Should I Use it? -","isPartOf":{"@id":"https:\/\/www.mailboxvalidator.com\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/#primaryimage"},"image":{"@id":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png","datePublished":"2022-08-23T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/#primaryimage","url":"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png","contentUrl":"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2022\/08\/mbv-aug-img.png","width":1200,"height":600,"caption":"Learn on how to use DKIM to fight spammer, and why use DKIM"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/what-is-dkim-and-why-should-i-use-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mailboxvalidator.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/www.mailboxvalidator.com\/resources\/articles\/"},{"@type":"ListItem","position":3,"name":"What is DKIM, and Why Should I Use it?"}]},{"@type":"WebSite","@id":"https:\/\/www.mailboxvalidator.com\/resources\/#website","url":"https:\/\/www.mailboxvalidator.com\/resources\/","name":"MailboxValidator Articles","description":"MailboxValidator Articles","publisher":{"@id":"https:\/\/www.mailboxvalidator.com\/resources\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailboxvalidator.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mailboxvalidator.com\/resources\/#organization","name":"MailboxValidator","url":"https:\/\/www.mailboxvalidator.com\/resources\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailboxvalidator.com\/resources\/#\/schema\/logo\/image\/","url":"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2017\/11\/cropped-mailboxvalidator-fb-logo.png","contentUrl":"https:\/\/www.mailboxvalidator.com\/resources\/wp-content\/uploads\/2017\/11\/cropped-mailboxvalidator-fb-logo.png","width":1199,"height":399,"caption":"MailboxValidator"},"image":{"@id":"https:\/\/www.mailboxvalidator.com\/resources\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailboxvalidator","https:\/\/x.com\/MailBoxV","https:\/\/www.linkedin.com\/company\/mailboxvalidator\/","https:\/\/www.pinterest.com\/mailboxvalidator\/","https:\/\/www.youtube.com\/channel\/UCesIP5V7nXRXthaqdjjfCFg"]}]}},"_links":{"self":[{"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/docs\/2300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/comments?post=2300"}],"version-history":[{"count":0,"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/docs\/2300\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/media?parent=2300"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/doc_category?post=2300"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/www.mailboxvalidator.com\/resources\/wp-json\/wp\/v2\/doc_tag?post=2300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}