Skip to content

DNS zone grew over years, nobody remembers what each record is for anymore

A messy DNS zone is a security and mail risk. Forgotten subdomains pointing at old IPs are prime subdomain-takeover material, and stale TXT records from departed vendors confuse mail validation.

Try this first

  1. 1Export the zone (BIND format or provider export) and put it in a spreadsheet or git repo so you can diff it.
  2. 2Per record: does the target still exist (curl, ping, cert check) and who owns it inside the company? Unknown = removal candidate.
  3. 3Filter all CNAMEs: do they still point at live hostnames? A CNAME to an expired Heroku app or S3 bucket is immediate takeover risk.
  4. 4Review TXT records: SaaS verifications, old DKIM keys, empty SPF leftovers. Anything unknown and old can go after a 30-day test period.
  5. 5Schedule the audit yearly or at every DNS host migration, and log every change in a changelog or CMDB.

When to bring us in

If you have hundreds of records or multiple registrars and no overview, we can run an audit, flag takeover risks and reduce the zone to what is actually in use.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.