[Support Guide] How to detect and fix inactive Netlify DNS zones

@luke Thanks for this. I was just reading how these inactive zones could become zombie domains for hackers.

However, I’m not getting the same returns for the dig and whois commands that you show. For example, using dig through CloudFlare Warp:

dig gregraven.org NS +trace | tail -n 6

.			518202	IN	NS	m.root-servers.net.
.			518202	IN	RRSIG	NS 8 0 518400 20200914050000 20200901040000 46594 . F5HUdJl/qlKwTD3NqSGV0GiqYG/YSnEJ/pB6VPRlnpN/7LuyuRkTEj/e 66OgIh5/KLRr3/8oixDgyvnZ4mtcEHZvVId9MhU0B1yWf1K6rwNE99q3 j/MmJcL6qG6q9TcNUAEHb8vgc9paBvYOMnXw2CkXzEBsldc5NxbaXMj6 st8N0/w0t9y/dDoFkwZvVQEeVivVS1wucqacL9yXNEhvf+ghJXj2wkiI 74/VWOilzA31lrOkL4MNntDCQSWy2oj/5VWutCY0Fqr+7054JNzbFNmG FW0Gq9pSAMqaTFfbGwBiEuN/UC2OxYMUBABqmwMFhvbFpGCCEj1CvGJs VwSLeQ==
;; Received 525 bytes from 192.0.2.2#53(192.0.2.2) in 5 ms

;; Received 31 bytes from 199.7.83.42#53(l.root-servers.net) in 5 ms

Using dig without CloudFlare Warp:

dig gregraven.org NS +trace | tail -n 6    

; <<>> DiG 9.10.6 <<>> gregraven.org NS +trace
;; global options: +cmd
;; Received 17 bytes from 192.168.254.254#53(192.168.254.254) in 1 ms

Using whois with or without CloudFlare Warp:

whois gregraven.org | grep -i "name server"
Name Server: DNS1.P08.NSONE.NET
Name Server: DNS2.P08.NSONE.NET
Name Server: DNS3.P08.NSONE.NET
Name Server: DNS4.P08.NSONE.NET
Name Server: dns1.p08.nsone.net
Name Server: dns2.p08.nsone.net
Name Server: dns3.p08.nsone.net
Name Server: dns4.p08.nsone.net

(Apparently, whois is returning information for both IPv4 and IPv6.)

This is in Terminal.app on macOS.

Finally, I read somewhere that whois results are not necessarily authoritative, whereas dig results are. What has been your experience?

For example:

whois karsavuran.com | grep -i "name server"

Name Server: DNS1.P08.NSONE.NET
Name Server: DNS2.P08.NSONE.NET
Name Server: DNS3.P08.NSONE.NET
Name Server: DNS4.P08.NSONE.NET
Name Server: dns1.p08.nsone.net
Name Server: dns2.p08.nsone.net
Name Server: dns3.p08.nsone.net
Name Server: dns4.p08.nsone.net

vs:

dig karsavuran.com -t NS

; <<>> DiG 9.10.6 <<>> karsavuran.com -t NS
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 43115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;karsavuran.com.			IN	NS

;; Query time: 148 msec
;; SERVER: 192.0.2.2#53(192.0.2.2)
;; WHEN: Tue Sep 01 16:17:49 PDT 2020
;; MSG SIZE  rcvd: 43