Domain Registration and WHOIS Hygiene
Protect your domain with auto-renewal, registrar lock, WHOIS privacy, and expiry monitoring to prevent hijacking and accidental loss.
Why Domain Hygiene Matters
Losing control of a domain is one of the most damaging security events an organization can face. Unlike a server breach, where you can isolate and rebuild, a lost domain means your website, email, authentication flows, and customer trust all disappear at once. Attackers know this. They monitor expiring domains, target registrar accounts with weak credentials, and exploit social engineering against registrar support teams. Your DNS configuration also exposes a surprising amount of intelligence to attackers before they ever touch your infrastructure -- see DNS Security: What Your Domain Configuration Reveals for details.
The good news is that domain registration hygiene is straightforward. A handful of settings -- most of which take under five minutes to configure -- eliminate the majority of domain loss and hijacking risks.
Enable Auto-Renewal
The single most important protection against accidental domain loss is enabling auto-renewal. Domains that expire because someone forgot to renew them or because a credit card on file expired are shockingly common, even among large organizations.
Cloudflare Registrar
- Log in to the Cloudflare dashboard and select your account.
- Navigate to Domain Registration > Manage Domains.
- Click the domain you want to configure.
- Under the Registration tab, toggle Auto-Renew to on.
- Verify that a valid payment method is on file under Account > Billing.
Cloudflare renews domains at cost with no markup, so there is no financial reason to delay renewal.
Namecheap
- Log in to your Namecheap account and go to Dashboard > Domain List.
- Click Manage next to the domain.
- Toggle the Auto-Renew switch to the on position.
- Confirm your payment method under Profile > Billing is current.
Namecheap sends renewal reminders starting 60 days before expiration even with auto-renew enabled.
GoDaddy
- Sign in to your GoDaddy account and navigate to My Products > Domains.
- Select the domain and click Domain Settings.
- Scroll to Additional Settings and set Auto-Renew to on.
- Verify the payment method under Billing & Payments in your account settings.
GoDaddy will attempt to auto-renew 30 days before expiration. If the payment fails, they retry multiple times before the domain enters the grace period.
General Advice
Regardless of registrar, update your payment method proactively whenever you receive a new credit card. Set a calendar reminder to check payment methods annually. A failed auto-renewal charge is the most common reason domains expire at organizations that thought they had auto-renewal enabled.
Registrar Lock (clientTransferProhibited)
Registrar lock, formally the clientTransferProhibited status code, prevents your domain from being transferred to another registrar without you explicitly removing the lock first. This is your primary defense against domain hijacking through unauthorized transfers.
What It Prevents
- Unauthorized transfers initiated by an attacker who has obtained your transfer authorization code.
- Social engineering attacks where someone convinces a registrar's support team to approve a transfer.
- Accidental transfers from misconfigured automated processes.
How to Enable It
Most registrars enable registrar lock by default, but you should verify it. Check your domain's status with:
whois yourdomain.com | grep -i status
You should see clientTransferProhibited in the output. If it is missing, enable it through your registrar's domain management panel. The setting is typically labeled "Domain Lock," "Transfer Lock," or "Registrar Lock" and is a simple toggle.
For high-value domains, ask your registrar about registry lock (also called server-side lock). This is a more robust protection that requires manual, out-of-band verification -- often a phone call and identity verification -- before any changes can be made. It protects against both attacker-initiated and registrar-level compromises. Most premium registrars offer this for an additional fee.
WHOIS Privacy and Proxy Services
WHOIS records traditionally expose the domain registrant's full name, email, phone number, and physical address. This information feeds directly into spear phishing, social engineering, and physical security threats.
Why You Should Use WHOIS Privacy
- Prevents targeted phishing. Attackers use registrant email addresses for highly convincing spear phishing campaigns impersonating the registrar.
- Reduces spam and solicitation. Public WHOIS data is scraped constantly by marketers, scammers, and domain resellers.
- Limits reconnaissance. Reverse WHOIS lookups allow attackers to find every domain registered under the same name or email, mapping your entire digital footprint.
How WHOIS Privacy Works
Privacy and proxy services replace your personal contact information with generic details belonging to the privacy service provider. Emails sent to the proxy address are forwarded to your real address (or discarded, depending on configuration). Your actual identity is held by the registrar and disclosed only under legally compelled circumstances.
Most registrars include free WHOIS privacy: Cloudflare, Namecheap, Google Domains, and Porkbun all offer it at no cost. GoDaddy charges for its privacy service on some plans. Enable it in your domain management settings under "WHOIS Privacy," "ID Protection," or "Contact Privacy."
GDPR Considerations
Since May 2018, GDPR requires registrars to redact personal data from WHOIS for EU registrants and registrars under EU jurisdiction. However, GDPR redaction alone may not be sufficient. Some registrars still expose the organization name, country, or state/province. Certain country-code TLDs (like .us) prohibit privacy services entirely and require accurate public data. If your domain uses a TLD that does not support privacy, be aware that your registrant data is public regardless of your registrar's settings.
The safest approach is to enable both GDPR redaction and the registrar's privacy service where available. Belt and suspenders.
Domain Expiry Risks
When a domain expires, it does not immediately become available for anyone to register. It goes through a defined lifecycle that gives you decreasing levels of recourse.
Grace Period (0-45 days after expiry)
The domain stops resolving, but you can renew it at the normal price through your registrar. The exact duration varies by registrar and TLD, but 30 to 45 days is typical. Your website and email go down, but recovery is straightforward.
Redemption Period (45-75 days after expiry)
The registrar releases the domain to the registry, which holds it in a redemption state. You can still recover it, but the fee is significantly higher -- often $80 to $200 or more. The process takes longer and requires contacting your registrar's support team directly.
Pending Delete and Public Release (75+ days after expiry)
After the redemption period, the domain enters a five-day pending delete phase and then becomes available for public registration. At this point, anyone can register it. Domain drop-catching services monitor expiring domains and snap up valuable ones within seconds of release.
What Happens When Attackers Claim Your Expired Domain
An attacker who registers your expired domain can receive email intended for your organization, host phishing pages with your domain's inherited reputation, intercept OAuth callbacks and SAML authentication flows that reference the old domain, and issue valid TLS certificates through standard domain validation.
Monitoring Expiry Dates
Do not rely solely on registrar reminder emails. Those emails can be filtered as spam, sent to an address no one monitors, or lost during staff turnover.
CyberShield Alerts
CyberShield's WHOIS lookup module checks your domain's expiration date during every posture scan. It flags domains approaching expiration and reports the exact dates, so your team receives structured alerts alongside the rest of your security posture findings. Run scans regularly to catch expiry risks before they become outages.
Manual Monitoring with whois
For a quick command-line check:
whois yourdomain.com | grep -i "expir"
This returns the expiration date from the WHOIS record. For programmatic monitoring, parse the output in a script and alert when the expiration date is within 60 days.
Centralized Domain Inventory
Maintain a spreadsheet or asset inventory of every domain your organization owns, including the registrar, the account owner, the expiration date, and whether auto-renewal is enabled. Review this inventory quarterly. Organizations that lose domains almost always lose track of them first.
Nameserver Security
Your nameservers control where your domain's traffic is routed. Compromised or misconfigured nameservers are as dangerous as a lost domain.
Avoid shared hosting nameservers. Budget shared hosting places your DNS alongside thousands of other domains. A DDoS attack targeting another customer on the same nameserver can make your domain unresolvable as collateral damage.
Audit NS records for dangling references. If your nameserver hostnames point to infrastructure you no longer control -- a decommissioned server, a cancelled hosting account -- an attacker who claims that infrastructure gains authoritative DNS control over your domain. Run dig NS yourdomain.com and verify that every listed nameserver is active and under your control. The same principle applies to CNAME records that point to deprovisioned cloud services -- learn how attackers exploit these gaps in our subdomain takeover prevention guide.
Use a reputable DNS provider. Dedicated DNS providers like Cloudflare, AWS Route 53, or Google Cloud DNS offer anycast networks, DDoS protection, and high availability. These are meaningfully more resilient than a registrar's default nameservers. While evaluating your DNS provider, also consider enabling DNSSEC and CAA records to protect response integrity and restrict certificate issuance -- our DNSSEC and CAA records setup guide covers the full process.
Consider secondary DNS. If your primary DNS provider has an outage, a secondary provider keeps your domain resolvable. This is especially important for domains that serve critical business functions.
Multi-Factor Authentication on Registrar Accounts
Your registrar account is the single point of control for your domain. If an attacker compromises it, they can transfer the domain, change nameservers, disable privacy, and modify contact information.
Enable MFA immediately. Every major registrar supports multi-factor authentication. Use a hardware security key (FIDO2/WebAuthn) or a TOTP authenticator app. Avoid SMS-based MFA where possible, as SIM-swapping attacks can intercept SMS codes.
Use a strong, unique password. Your registrar password should be randomly generated and stored in a password manager. It should not be reused anywhere else. A registrar account compromise has consequences that far exceed a typical account breach.
Restrict account access. Limit the number of people with registrar login credentials. Use role-based access if your registrar supports it. Document who has access and review that list when staff leave the organization.
Monitor account activity. Check your registrar's login history and activity log periodically. Unexpected logins, password reset attempts, or configuration changes are early indicators of compromise.
Quick Checklist
- Auto-renewal is enabled on all domains with a valid payment method.
- Registrar lock (
clientTransferProhibited) is active. - WHOIS privacy or proxy service is enabled.
- MFA is enabled on all registrar accounts using an authenticator app or hardware key.
- Nameservers point to active, dedicated DNS infrastructure.
- A domain inventory exists and is reviewed quarterly.
- CyberShield scans run regularly to monitor expiration dates and WHOIS status.
Continue Reading
WHOIS and Domain Intelligence: What Your Registration Data Exposes
Domain registration records reveal more than you think. Learn how attackers use WHOIS data for reconnaissance and how to protect your domain registration details.
DNS Security: What Your Domain Configuration Reveals to Attackers
Your DNS records are public. Here's what attackers learn from them and how to lock down your domain configuration.
Subdomain Takeover: How Dangling DNS Records Become Attack Vectors
Forgotten CNAME records pointing to deprovisioned services are one of the most overlooked vulnerabilities. Learn how subdomain takeover works and how to prevent it.