As part of Kubernetes security tooling, we scan DNS mappings that point to Netlify in order to identify dangling DNS records.
During this process, we noticed that performing a GET request on Netlify subdomains does not help differentiate between claimable and non-claimable project names.
For example, both of the following return 404:
-
kubernetes.netlify.app -
projectnamewhichdoesntexistsolongrandom.netlify.app
However:
-
The second domain is claimable
-
The first domain is not claimable
From an external perspective, both behave identically (HTTP 404), which makes it difficult to reliably detect dangling records.
Is there any public API, endpoint, or supported mechanism that allows us to determine whether a given *.netlify.app project name is claimable or already reserved/owned?
This would greatly help in accurately detecting and mitigating potential subdomain takeover risks.
Thank you.