Zone Transfer Check: a beginner's guide
Test for DNS zone transfer vulnerability
Zone transfers: the legacy backup mechanism that became a leak
A zone transfer (technically called AXFR, for "Asynchronous Full Transfer Zone") is a DNS feature designed for backing up an entire DNS zone from one nameserver to another. In the original 1983 design, every domain had multiple authoritative nameservers, and they kept each other in sync by periodically asking the primary nameserver for a complete copy of the zone — every record, all at once. AXFR was the mechanism for that copy. It was designed at a time when nameserver replication was a friendly operation between trusted servers on a friendly internet, and there was no thought given to the security implications of an outsider being able to ask the same question.
You should care because on the modern internet, an open zone transfer is a security finding. If your nameservers respond to AXFR requests from anyone, an attacker can ask for a complete dump of every DNS record in your zone — every subdomain, every internal hostname, every test environment, every staging server, every email gateway, every legacy system you forgot was still in the zone. That is a treasure map for reconnaissance. Modern DNS providers disable AXFR by default for exactly this reason, and finding an open zone transfer in 2025 is treated the same way you'd treat finding an unauthenticated database dump endpoint: it is a serious oversight.
The four things every zone-transfer check looks at:
Is AXFR allowed from arbitrary sources? This is the bad case. The check tries to perform an AXFR from an untrusted IP address and looks at whether the server responds with the zone or refuses.
Is AXFR allowed only from specific peers? This is the good case. Replication between authoritative nameservers should be allowed; replication to the public should not.
What records would have been exposed if the transfer succeeded? Even one open nameserver in a multi-nameserver setup is a leak.
**Has the configuration been verified across all the nameservers in the NS record list?** It is common to lock down the primary and forget the secondaries.
Three questions a zone-transfer check answers:
Is any of my nameservers leaking the entire DNS zone to anyone who asks?
Have all my nameservers been hardened, or just the ones I remembered?
After the recent infrastructure change, did the AXFR restrictions survive the migration?
The cost of an open zone transfer is silent reconnaissance: an attacker gets a free map of your entire infrastructure. The fix is one configuration change at the nameserver level — and on modern hosted DNS providers (Cloudflare, Route 53, NS1, etc.) the configuration is already correct by default, so the most common version of this finding is on self-hosted BIND or PowerDNS deployments. The check is fast, cheap, and should be part of any security review or vendor questionnaire.
The Zone Transfer Check endpoint, in plain language
In one sentence: Test for [DNS (Domain Name System)](/guides/dns-lookup) zone transfer vulnerability
Tests for zone transfer (AXFR) vulnerabilities by attempting real TCP-based AXFR requests against each authoritative nameserver. Reports which servers allow transfers, how many records are exposed, and provides security hardening recommendations per the official internet standard and CIS DNS (Domain Name System) benchmarks.
Don't worry if some of the words above are still unfamiliar — there's a plain-language glossary at the bottom of this page, and most of the terms link to their own beginner guides if you want to learn more.
What is actually happening when you call it
Here's what's actually happening behind the scenes when you call this endpoint:
Resolves all authoritative nameservers for a domain, then opens TCP connections to port 53 on each and sends AXFR queries per the official internet standard. Reports per-server results (vulnerable, refused, timeout), counts exposed records, returns sample hostnames from vulnerable transfers, and provides remediation guidance including TSIG authentication (the official internet standard), ACL-based restrictions, and DNS (Domain Name System) Zone Transfer over TLS (Transport Layer Security) (the official internet standard).
If you're using an AI assistant through MCP, you don't need to understand any of the technical details — the assistant calls the tool and translates the result for you.
Why this specific tool matters
Let's skip the marketing fluff and answer the only question that actually matters: why should you, a real human with a real to-do list, care about the Zone Transfer Check tool? Here's the plain-English version, written the way you'd hear it from a friend who happens to do this for a living.
A 2022 survey found ~12% of organizations had at least one nameserver allowing unauthorized zone transfers. AXFR exposes the complete zone file — all hostnames, IPs, mail servers, and TXT records — providing attackers a complete infrastructure map. Unlike most DNS (Domain Name System) tools that only assess configuration, this endpoint performs actual AXFR attempts for definitive vulnerability confirmation.
Picture this in real life. Imagine a penetration tester. Here's the situation they're walking into: During reconnaissance, test for zone transfer to discover all subdomains and internal hosts. Without the right tool, that person would be stuck copy-pasting between five browser tabs, reading documentation written for engineers, and crossing their fingers that the answer they cobble together is correct. With the Zone Transfer Check tool, the same person gets a clear answer in seconds — no spreadsheets, no guessing, no waiting for someone on the infrastructure team to free up.
Three questions this tool answers in plain English. If any of these have ever crossed your mind, the Zone Transfer Check tool is built for you:
Is my domain pointing to the right place right now?
Did the DNS change I just made actually take effect everywhere in the world?
Is anything in my DNS misconfigured in a way that could break email or break the website?
You can either click the tool and get the answer yourself, or ask your AI assistant — connected through MCP (Model Context Protocol) — to ask the question for you and translate the answer into something you can paste into Slack.
Who gets the most out of this. Founders running their own infrastructure, marketers coordinating launches, IT admins inheriting domains from a former employee, and ops engineers troubleshooting live outages. If you see yourself in that list, this is one of the EdgeDNS tools you should bookmark today.
What happens if you skip this entirely. Skip it and you're flying blind on the one piece of config that decides whether your website and email work at all. That's why running this check — even once a month — is one of the cheapest forms of insurance you can give your domain.
Available on the developer plan. The technical details: `GET /v1/dns/zone-transfer`.
When would I actually use this?
If you're still on the fence about whether the Zone Transfer Check tool belongs in your toolbox, this section is for you. Below you'll meet three real people — a penetration tester, a security engineer, and a compliance officer — facing three real situations where this tool turns a stressful afternoon into a five-minute task. Read whichever story sounds closest to your week.
Story 1: Security Assessment
Imagine you're a penetration tester. During reconnaissance, test for zone transfer to discover all subdomains and internal hosts.
Why it matters: Quickly map the complete DNS (Domain Name System) infrastructure if zone transfer is allowed.
Story 2: DNS Security Audit
Imagine you're a security engineer. Audit organization DNS (Domain Name System) servers to ensure zone transfers are restricted.
Why it matters: Identify and remediate zone transfer vulnerabilities before attackers exploit them.
Story 3: Compliance Verification
Imagine you're a compliance officer. Verify DNS (Domain Name System) servers meet CIS benchmark requirements for zone transfer restrictions. Document AXFR controls for SOC 2 (Service Organization Control 2), ISO 27001 (ISO/IEC 27001 information security management standard), and NIST SP 800-81 compliance.
Why it matters: Demonstrate DNS (Domain Name System) security controls with specific compliance framework evidence.
Common situations across teams. Beyond the three stories above, here are the everyday workplace moments when people across the company reach for the Zone Transfer Check tool — or one of the tools right next to it in this category. If any of these are on your calendar this month, that's your sign:
Right before launching a new website or migrating to a new host.
After making any DNS change, to confirm the new settings are live everywhere.
When customers report that your site or email "just stopped working" out of nowhere.
As a recurring monthly health check to catch silent misconfigurations early.
If you can see yourself in even one of those bullets, the Zone Transfer Check tool will pay for itself the first time you use it.
Still not sure? Here's the easiest test in the world. Open Claude, ChatGPT, Gemini, or any other AI assistant connected to the EdgeDNS MCP server and ask, in your own words: "Is the Zone Transfer Check tool useful for my job?" The assistant will look at the tool, ask you a couple of follow-up questions about what you're trying to accomplish, and give you a straight answer in plain English. No commitment, no signup forms, no jargon.
The easiest way: just ask your AI assistant
If you've connected the EdgeDNS MCP server to Claude, ChatGPT, Gemini, Cursor, or any other AI assistant, you don't need to write any code. Just ask in plain English:
"Use the Zone Transfer Check tool to check example.com and explain anything that looks wrong in plain language."
The AI will figure out which tool to call, fill in the right parameters, run it, and then explain the result back to you. No copy-pasting between tabs. No reading raw JSON. No memorizing endpoint names.
MCP (Model Context Protocol) access is free on every plan, including the free tier. One API key works for both REST and AI — you do not have to choose.
The technical way: call it from code
If you're a developer and want to call the endpoint from a script or your own application, here's the simplest possible example. Replace the placeholder API key with the real one from your dashboard.
# Replace edns_live_YOUR_KEY with your real API key from the dashboard
curl -H "Authorization: Bearer edns_live_YOUR_KEY" \
"https://api.edgedns.dev/v1/dns/zone-transfer?domain=example.com"What you need to provide
There's just one piece of information you need to provide. The table below explains exactly what it is and what a real value looks like.
| Field | Type | Required? | What it means | Example |
|---|---|---|---|---|
domain | string | Yes | The domain to test zone transfer for | example.com |
What you get back
When you call this tool, you'll get back a JSON object with the fields below. If you're talking to it through an AI assistant, the assistant reads these for you and explains them in plain language — you don't need to memorize them.
| Field | Type | What you'll see in it |
|---|---|---|
domain | string | The queried domain |
is_vulnerable | boolean | Whether any nameserver allows zone transfer |
vulnerable | array | Nameservers that allow zone transfer |
not_vulnerable | array | Nameservers that properly refuse zone transfer |
records_exposed | number | Total DNS (Domain Name System) records exposed across all vulnerable servers |
details | array | Per-server AXFR test results with status, record count, sample records, response time, and transaction ID verification |
recommendations | array | Security hardening recommendations (TSIG, ACLs, TLS (Transport Layer Security)) |
truncated | boolean | Whether testing was limited to a subset of nameservers (max 5 tested) |
total_nameservers | number | Total number of nameservers for the domain |
Words you might be wondering about
If any words on this page felt like jargon, here's a plain-language version. Click any linked term to read a full beginner-friendly guide.
DNS (Domain Name System) — The internet's address book. When you type a website name, DNS turns it into the actual numeric address computers use to find each other.
TLS (Transport Layer Security) — The encryption that puts the 'S' in HTTPS. It scrambles data so nobody between you and a website can read it.
RFC (Request for Comments) — The official internet standards documents. When someone says 'RFC 8484' they mean a specific numbered standards document — in that case, the one defining DNS over HTTPS.
SOC 2 (Service Organization Control 2) — A widely used security audit. Proves to customers that you handle their data responsibly.
ISO 27001 (ISO/IEC 27001 information security management standard) — An international certification that shows your company has a documented, working security program.
Need Programmatic Access?
Automate domain intelligence with 100+ API endpoints and a free MCP server for AI integration.