How to Monitor Client Registrar Changes Before They Break SSL and DNS
Domain registrar transfers are one of the most common root causes of SSL certificate expiry at digital agencies. A client transfers their domain to a new registrar, the DNS zone is rebuilt from scratch or from an imperfect export, and records that were present at the old registrar are missing at the new one. The site continues to work — because the existing SSL certificate is still valid — but the next renewal attempt fails silently. The failure is not discovered until the certificate expires and browsers start blocking the site.
This guide covers how registrar changes cause DNS and SSL failures, the specific records most likely to disappear, and how to set up monitoring that detects the problem on the day of the change rather than 30 to 90 days later.
Why Registrar Transfers Cause DNS Record Loss
When a domain is transferred to a new registrar, the DNS zone — the collection of A records, CNAMEs, TXT records, MX records, and other DNS entries — is handled in one of several ways:
Zone export and import. Some registrars allow exporting the current DNS zone as a file that can be imported at the new registrar. Zone exports are not always complete. Many registrar zone export tools omit records they consider non-standard, have format compatibility issues with the import tool at the destination, or require manual editing that introduces errors.
Manual rebuild. Clients who manage their own DNS transfer the domain and then rebuild the DNS zone from memory, from email history, or from a knowledge base. Records they do not actively remember — like Let's Encrypt TXT validation records, platform-specific verification TXT records, or secondary A records for platforms like GitHub Pages that require four separate IPs — are frequently omitted.
Nameserver change without zone migration. Some clients treat "registrar transfer" as synonymous with "nameserver change." They transfer the domain to a new registrar and immediately update the nameservers to point at a new DNS provider. The DNS zone at the old provider is abandoned. The zone at the new DNS provider is built from scratch — often by the client's IT team without involving the agency.
Transfer-in DNS provisioning delay. Some registrars automatically provision a DNS zone for a transferred domain using only the SOA and NS records. The zone is technically valid but empty. Clients see DNS resolution working (because the old nameservers may still be responding during propagation) and do not realize the new zone is empty until propagation completes and resolution starts failing.
The Records Most Likely to Disappear in a Registrar Transfer
Not all DNS records are equally at risk. Some records are immediately visible because their loss breaks something obvious. Others are invisible until the next automated renewal cycle.
SSL Renewal Validation Records
Let's Encrypt DNS-01 validation TXT records. Some platforms use DNS-01 validation for Let's Encrypt certificates — they require a _acme-challenge.<domain> TXT record to be present in the DNS zone. These records are added during initial provisioning and then left in place. During a registrar transfer, they look like "mystery records" to whoever is rebuilding the zone and are frequently omitted.
ACM DNS validation CNAMEs. AWS Certificate Manager uses a CNAME for DNS validation. The CNAME is added once and must remain present permanently for automatic renewal. It is long, looks like a random string, and has no obvious purpose to someone rebuilding a DNS zone from memory. It is one of the first records to be omitted.
Cloudflare Page Rules or Certificate Authority Authorization records. CAA records specify which certificate authorities are allowed to issue certificates for a domain. If a CAA record from the old zone is not migrated to the new zone, Let's Encrypt may be blocked from issuing certificates if the CAA record at the old registrar listed only DigiCert or another CA.
Platform-Specific A Records
Multiple A records for load-balanced or multi-IP platforms. GitHub Pages requires four A records. Some other platforms — including Squarespace's legacy infrastructure and certain Shopify Plus configurations — require multiple A records. When a client rebuilds a zone from memory and adds "the GitHub Pages IP address," they typically add one or two rather than the full required set.
Staging and secondary environment A records. The production A record is remembered. The staging subdomain, the admin subdomain, the API subdomain — these are often omitted from manually rebuilt zones.
Email-Related Records
SPF TXT records. SPF records specify which mail servers are authorized to send email on behalf of the domain. They are long, syntactically specific, and often rebuilt incorrectly. An incorrect SPF record causes client emails to be marked as spam within days.
DKIM TXT records. DKIM records authenticate outgoing email. They are generated by the email provider and must be copied exactly. They are frequently omitted entirely or copied from a different domain during manual zone rebuilds.
The Detection Gap: From DNS Change to SSL Failure
The gap between a DNS record disappearing and the resulting SSL failure can be 30 to 90 days.
Here is the typical sequence:
- Client transfers domain to new registrar (day 0)
- DNS zone is rebuilt — ACM validation CNAME is omitted (day 0)
- Existing SSL certificate continues serving — it does not depend on DNS being correct (days 0–60)
- Automated renewal system attempts to renew — DNS validation CNAME is missing — renewal fails (day ~60)
- Certificate continues serving — it is still valid for 30 more days (days 60–90)
- Certificate expires — browsers begin blocking the site (day 90)
- Client reports that "the site is down" — agency investigates (day 90+)
If SSL monitoring with a 30-day threshold is in place, the alert fires at day 60 — when the renewal already failed and the certificate has 30 days of validity remaining. This is better than discovering the problem at day 90, but the root cause investigation is complicated by the fact that the registrar transfer happened 60 days earlier and may no longer be top of mind.
If DNS change monitoring is in place, the alert fires at day 0 — when the zone rebuild omitted the ACM validation CNAME. The agency knows immediately that a record is missing and can contact the client's IT team before the next renewal attempt fails.
How DNS Change Monitoring Catches Registrar Transfers
DNS change monitoring checks specific DNS records on a defined interval — typically every 5 to 15 minutes. When a checked record changes (the IP address changes, the CNAME target changes, the TXT record value changes, or the record disappears entirely), the monitoring system fires an alert.
Registrar transfers trigger multiple simultaneous DNS changes:
- NS records change — the nameservers update to the new registrar's or DNS provider's name servers
- A records may change or disappear — the new zone may have different IPs or missing records
- CNAME records may change or disappear — platform-specific CNAMEs that were not migrated are absent
- TXT records may change or disappear — SPF, DKIM, ACM validation, and Let's Encrypt TXT records often do not survive zone rebuilds
A DNS change monitoring alert that fires when the NS records change is the earliest possible signal of a registrar transfer. The NS record change happens on the day of the transfer and is detectable before any other DNS change propagates.
What to Monitor Per Client Domain
For effective registrar transfer detection:
- NS records — alert on any change to the authoritative nameservers. This is the registrar transfer signal.
- All A records — alert on changes to the IP addresses for the apex domain and each subdomain. Detects partial zone rebuilds.
- CNAME targets — alert on changes to the CNAME target for each monitored subdomain. Detects platform-specific CNAME deletion.
- TXT record presence — alert on removal of specific TXT records (SPF, DKIM, ACM validation, Let's Encrypt DNS-01 challenge records). Detects records omitted from zone rebuild.
Practical Response When a Registrar Change Alert Fires
When DNS change monitoring alerts on an NS record change or A record deletion:
Step 1: Determine whether the change was planned or unplanned. Contact the client to ask whether they transferred their domain recently. A planned transfer is handled collaboratively. An unplanned change may indicate an unauthorized domain hijacking attempt and requires a different response.
Step 2: Audit the new DNS zone. Compare the current DNS zone at the new registrar against the expected zone. The expected zone should be documented in the agency's client records — any monitoring dashboard that shows historical DNS state can also serve as a reference point.
Step 3: Identify missing records. Look specifically for ACM validation CNAMEs, Let's Encrypt DNS-01 TXT records, platform-specific CNAMEs, and secondary A records for multi-IP platforms. These are the records most likely to cause delayed SSL failures if missing.
Step 4: Restore missing records. Add the missing records to the new DNS zone. If the client manages their own DNS at the new registrar, provide the exact record values — do not rely on the client to look them up.
Step 5: Monitor for propagation. After restoring records, confirm they are visible from multiple DNS resolvers within the expected propagation window.
Setting Up Registrar Transfer Monitoring in Merlonix
In Merlonix, per-client DNS change monitoring covers the records most likely to cause SSL failures after a registrar transfer:
- Add each client's apex domain and subdomains as monitored assets
- Enable DNS change alerts — alerts fire when any monitored DNS record changes value or disappears
- Enable SSL expiry alerts with a 30-day threshold as a backstop for any changes that were not caught by DNS monitoring
- Review the DNS change alert history after each alert to identify what changed and whether the change was intentional
DNS change alerts on the day of a registrar transfer give agencies enough lead time to audit the new DNS zone and restore missing records before any SSL certificate renewal fails.
Merlonix is built for agency portfolio monitoring — DNS change detection, SSL expiry alerts, and per-client alert routing. Start a free trial and add your first client domain.
→ Related: What causes DNS record drift → Related: Agency DNS migration checklist → Related: DNS monitoring for marketing agencies → Related: How to audit client SSL certificates → Related: SSL certificate monitoring for agencies