Page 1 of 2 12 LastLast
Results 1 to 10 of 12
  1. #1
    by_crikey
    Guest

    Default deploy.akamaitechnologies.com

    Anyone heard of deploy.akamaitechnologies.com?
    A program on my computer keeps trying to connect to the following address: a203-167-223-234.deploy.akamaitechnologies.com
    I have been unsuccessful at trying to establish what program this is. All I get is a Network connections box pop-up saying 'You (or a program) have requested information from a203-167-223-234.deploy.akamaitechnologies.com. Which connection do you want to use?'. No suspect programs running in the Windows Task Manager list.
    I used neotrace to look up the address...and got this

    Name: a203-167-223-234.deploy.akamaitechnologies.com
    IP Address: 203.167.223.234
    Location: Boston (42.358N, 71.100W)
    Network: CLIX-FREEFLOW-NZ

    One hop to that address from my system. What's up?

  2. #2
    godfather
    Guest

    Default Re: deploy.akamaitechnologies.com

    Akamai provide logistics (server resource) for such programs as McAfee antivirus and others.

    It might be as innocent as your anti-virus program wanting to auto-update?

  3. #3
    Junior Member
    Join Date
    Mar 2005
    Posts
    1

    Default Re: deploy.akamaitechnologies.com

    My Microsoft Word wanted to connect to the same adress. I found it weird and i blocked the acces. I did some googling and found this. However i never enabled automatic updates for Office XP.

    from:http://forum.iamnotageek.com/history.../769898-1.html

    Posted by: Patrick Pitre

    Ross,

    Akamai provides many IT services like application hosting, content delivery,
    and streaming media services, but they are probably best known for their
    massive distributed computer infrastructure. In lay terms, they have upwards
    of 15,000+ servers positioned around the globe providing content (software
    downloads, etc) and media (like QuickTime, RealAudio, or Windows Media
    files) for their customers (the likes of Apple, GM, MTV, Department of
    Defense, IBM, Microsoft, Monster.com, Yahoo!, Adobe...).

    So for instance, say your company developed a web site/application for use
    by your customers. On this website, you wanted to make available a few
    hundred moderate length video clips. If you intend your website to have even
    moderate traffic, you will quickly realize the potentially prohibitive
    time/energy/costs involved with building an infrastructure capable of
    delivering this content - to make those files available reliably you'll need
    lots of bandwidth, reliable servers with a backup strategy, redundant power
    and A/C, lots of RAID-ed disk space, finely tuned security precautions, lots
    of manpower to watch over everything, and on and on and on.

    This is where Akamai comes in. They have the infrastructure already in place
    to deliver these services. Companies can save money by having Akamai deliver
    their content for them. Akamai has become so ubiquitous that it's hard to go
    a day without (perhaps unknowingly) pulling at least some content of one of
    their servers, as you have discovered!

    I hope this helps.

    Patrick Pitre
    Have a nice day!

  4. #4
    Correct my English!
    Join Date
    Feb 2005
    Location
    Cycling, Running or Swimming in Hawkes Bay
    Posts
    6,222

    Default Re: deploy.akamaitechnologies.com

    I tried pinging to deploy.akamaitechnologies.com using CMD but no pinging respond from it.

    Free, 24/7 telephone health advice service | Healthline - 0800 611 116

    Smoking KILLS. Don't let your life be ruled by cigarettes. | Quitline - 0800 778 778 ‎

    Join the unofficial PressF1 WCG team!



  5. #5
    Junior Member
    Join Date
    Jun 2005
    Posts
    1

    Default Re: deploy.akamaitechnologies.com

    Akamai Technologies first showed up in my computer within the "Active
    Ports" window, which displays IP address attached to specific ports. This web address which was displayed took the form:
    axxx-xxx-xxx-xxx.deploy.akamaitechnologies.net:http
    where the alpha character "a" is followed by four groups of numbers, corresponding to the numbers in an IP address. The difference with the
    Akamai Technologies IP-like address is that the four groups of digits are separated by a dash, " - ", and not a period, as is the case with a true
    Internet Protocol (IP) address. The IP-like Akamai Technologies address
    seems to be a Akamai dirty trick. IF THE FOUR SETS OF DIGITS are entered in ARIN, for example, where the digit sets, WHEN SEPARATED BY A PERIOD
    IN AN ARIN ENTRY, and NOT a dash, a web site name is displayed in the
    ARIN search engine.

    What one must understand is that the four sets of digits, separated by a
    comma, in the Akamai Technologies IP-like address are NOT related to an
    address with four sets of digits separated by periods. The true motive
    for Akamai Technologies use of four sets of digits that is a true IP address,
    ONLY IF SEPARATED BY PERIODS, is not known for sure. The Akamai
    address may lead one to believe that a website, such as AOL or Google,
    may be related to the Akamai IP address on a particular port. This could
    not be further from the truth. I have seen four sets of digits in the Akamaized IP address, which DID correspond to AOL and Google ONLY IF
    THEY WERE SEPARATED BY PERIODS IN THE AKAMAIZED AOL OR GOOGLE
    IP ADDRESS. Initially, this led me to believe that AOL and Google was
    involved in inserting Akamai Trojan Plugins into Internet Explorer. This was
    not true, after discovering the pattern of deception by Akamai Technologies
    in using four sets of digits that corresponded to a true IP address, such as
    AOL or Google.

    Another trick that Akamai Technologies uses is installing desktop shortcuts
    that appear to be the shortcuts of applications. Akamai Technologies
    takes a legitimate website, such as 12.TNSSEARCH.COM (from a company
    in Moscow, Russia - this really happened), and uses the components of
    the website, such as 12.TNSSEARCH.COM, for their installation in a personal
    computer. The computer user, unless experienced, beleives that the website
    components were pasted to the desktop of one's computer - THIS COULD
    NOT BE FURTHER FROM THE TRUTH. The website, from which the shortcuts
    of applications are converted to html internet shortcuts, would not likely
    know that Akamai Technologies is installing "personally identifiable" website
    components without the permission of the owner of the website. This dirty
    trick by Akamai Technologies is disrupting the internet while I write this message.

    Akamai Technologies evolved from MIT. It works with embedded html
    components, and streaming and broadcasting the html components over
    the internet worldwide. It uses a clever browser Trojan Horse plugin
    to convey and install website components, such as html shortcuts. With
    one re-start of the computer, the shortcuts vanish from the computer,
    leaving one to wonder what was going on. With the shortcut installations,
    another finding was discovered. Using the application "DU Meter," which
    gives a graphical image of uploads and downloads, I noticed very recently
    that there was a lengthly upload. Akamai Technologies was copying files
    from my computer and uploading them to a destination computer. This
    makes Akamai Technologies not only a cyberterrorist; it makes Akamai
    Technologies agents for espionage of computer data. It was also brought
    to my attention, from articles on the web about Akamai Technologies, that
    the Israeli government is using/working with Akamai Technologies. It is
    very clever to insert a set of four digits into the Akamai IP address that
    belongs to an innocent website. If the Akamai IP address is seen, the
    computer user may look-up the four sets of digits in ARIN, for example,
    and blame a company which is not involved in Akamai espionage, such
    as 12.TNSSEARCH.Com. It may lead the naive computer user to believe,
    in this case, that the Repuplic of Russia is conducting espionage in the
    United States. THIS COULD NOT BE FURTHER FROM THE TRUTH. My study
    of Akamai Technologies disruption of the internet is only in its beginning
    stages. When I find out more information, I may blow the cover on Akamai
    Technologies entirely. This kind of cyberterrorism from a MIT evolved
    company has no place on the World Wide Web. It will be eventually stopped.

  6. #6
    Junior Member
    Join Date
    Jan 2007
    Posts
    1

    Exclamation Re: deploy.akamaitechnologies.com

    AKAMAI is very suspicious...A year ago, someone hacked into my desktop and laptops macs, and turned file sharing on and remote desktop agent on. A subroutine was collecting everything I downloaded, uploaded, saved or trashed. Through log activity I could see that my whole drive had been downloaded. I was able to locate a phony certificate generated from AKAMAI along with instrucions on how to generate certificates for access. My computer is now stealthed with software, a router and mac's firewall. Yet Akamai continually tries to make stealthed connnections to TCP port 49458 visible through my ipfw logs....There is something suspicious about these folks

  7. #7
    Banned
    Join Date
    Dec 2006
    Location
    Watching the tech world from Auckland.
    Posts
    5,142

    Default Re: deploy.akamaitechnologies.com

    I know that the Akamai servers were hacked a while back so possibly the hackers may have put some dodgy spyware on the servers that was missed or it could just be someone spoofing the IP address.

  8. #8
    Banned
    Join Date
    Dec 2006
    Location
    Watching the tech world from Auckland.
    Posts
    5,142

    Default Re: deploy.akamaitechnologies.com

    Quote Originally Posted by curtispsf View Post
    AKAMAI is very suspicious...A year ago, someone hacked into my desktop and laptops macs,
    How did they hack into your lap top Mac? Did you give them your password?

  9. #9
    Senior Member
    Join Date
    Dec 2004
    Location
    Auckland
    Posts
    5,041

    Default Re: deploy.akamaitechnologies.com

    I think winmacguy is some what correct (part from the bit about Akamai servers been hacked a while back, I have never seen anything about this so I donít know if it true)

    But I think you will find someone is spoofing the IP address so it looks like its coming from them, but it not.

    My

  10. #10
    Banned
    Join Date
    Dec 2006
    Location
    Watching the tech world from Auckland.
    Posts
    5,142

    Default Re: deploy.akamaitechnologies.com

    Quote Originally Posted by stu161204 View Post
    I think winmacguy is some what correct (part from the bit about Akamai servers been hacked a while back, I have never seen anything about this so I donít know if it true)

    But I think you will find someone is spoofing the IP address so it looks like its coming from them, but it not.

    My
    DNS attack on Akamai servers. Ah the joys of Google and spending too much time surfing news websites.
    http://msmvps.com/blogs/donna/archiv...6/18/8382.aspx

    I agree with stu161204 though, most likely someone spoofing the IP address.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •