====== Troubleshooting ======
Test DNS TCP
$ dig +short melbourneit.net. NS
ns4.melbourneit.net.
ns1.melbourneit.net.
ns3.melbourneit.net.
ns2.melbourneit.net.
$ (for NS in $(dig +short melbourneit.net. NS | sort); do dig +noall +answer +nottl "$NS" A "$NS" AAAA | sort; done)
ns1.melbourneit.net. IN A 203.55.142.15
ns2.melbourneit.net. IN A 203.55.143.15
ns3.melbourneit.net. IN A 203.55.142.16
ns4.melbourneit.net. IN A 203.55.143.16
$ nc -vz 203.55.142.15 53
Connection to 203.55.142.15 53 port [tcp/domain] succeeded!
$ nc -vz 203.55.142.16 53
Connection to 203.55.142.16 53 port [tcp/domain] succeeded!
$ (for IP in 203.55.142.15 203.55.142.16; do dig @"$IP" +tcp +noall +answer +norecurse +nomultiline +nosplit melbourneit.net. SOA | sed -e 's/$/; '"$IP"'/'; done)
melbourneit.net. 3600 IN SOA ns1.melbourneit.net. admin.melbourneit.net. 2023050400 86400 7200 3600000 172800; 203.55.142.15
melbourneit.net. 3600 IN SOA ns1.melbourneit.net. admin.melbourneit.net. 2023050400 86400 7200 3600000 172800; 203.55.142.16
To get a servfail, run
dig @1.1.1.1 dnssec-failed.org