Lame delegations occur as a result of expired nameserver domains allowing attackers to take control of the domain resolution by re-registering this expired nameserver domain.
https://blog.apnic.net/2021/03/16/the-prevalence-persistence-perils-of-lame-nameservers/.
https://kb.isc.org/docs/lame-servers-what-are-they-and-how-does-bind-deal-with-them, What are Lame Servers? (isc.org)
Note: these are also known as “dangling delegations”, which is the most common form of attack involving lame delegations. It’s also possible that lame delegations might help to enable DoS attacks or compromises, which are covered elsewhere.
Tools that check the integrity of answers of the authoritative name service (e.g. Zonemaster) can help detect lame delegations.
Inspect domain delegations by querying authoritative nameservers.
Domain registries can automatically and regularly check the response from nameservers and report any errors to the domain holders.
Deploy DNSSEC to stop rogue nameservers taking over lame delegations. Do note however that this approach works only with DNSSEC validating resolvers.
3 nameservers: one is not responding, or responding incorrectly. This is a lame delegation in the context of DNS Abuse.