5 days into this billing cycle, and my Route 53 zone has received over 33 million requests for a particular host that I recently deleted. And the associated DNS records were deleted too.
I didn't think I would get billed for queries to a non-existent host record, but indeed I am according to the billing dashboard. And the number of queries has doubled since it was removed. Some initial query logging and investigation suggests that there are clients making many redundant requests for this deleted hostname.
If you're interested, this host was operating as an open public server for the STUN protocol to bootstrap WebRTC and VOIP calls. The billing costs to run this public server were getting out of hand. So I moved it to a new IP address and new host name. I had recently learned of some other well known public services that had hardcoded the DNS address into their code and sample documentation.
Tonight, I added back a bogus A and AAAA record that resolves to 127.0.0.1 (or ::1) with a 4 day TTL. That might make whatever code that's repeating the request to stop asking (as much) and have the entry cached in downstream DNS servers. But excessive and redundant DNS queries has always been a costly problem that I never could get a handle on. I've dealt with and mitigated DDOS attacks on the host service for years, but I've never understood how to firewall Route 53 clients make redundant requests.
The ideal solution would be that Route 53 would simply ignore requests for the deleted host name (and not bill me for it).
What are my options?