deploy.akamaitechnologies.com using our bandwidth

Posted on 2011-05-11
Medium Priority
Last Modified: 2012-05-11
One our our companies highest band with users is deploy.akamaitechnologies.com.
Is it legit or a virus?

The ip is

please help
Question by:Razzmataz73
  • 2

Accepted Solution

thegof earned 2000 total points
ID: 35743303
This is a company that provides file hosting for commercial uses. Many companies use Akamai servers to provide their updates (like Office or Windows updates). It's a legit service.  Do you have users that are downloading a lot of (commercial) software and patches? It's possible that even video is being delivered for things like training or tutorials.

Expert Comment

ID: 35743313
Akamai is a content distribution company. Large companies with very busy web sites and lots of downloads utilize them (and other similar companies) to distribute their web site and files across an international network of servers around the world. When you request some of these web sites or files (or software on a computer does) it will often times come from one of these content distribution networks, and usually a geographically close one.

Microsoft is one company known to distribute software via Akamai as are many others. It's likely some software is updating itself and the company that makes that software outsources the content distribution to Akamai.

If you really want to track down what this is, there are ways depending on what you have for network equipment, operating systems, etc... but I'd need more information.

http://www.akamai.com for more information.

Expert Comment

ID: 35743340
Here's a good cross section of companies that use Akamai to host their files.  Note they are also now providing HD video as well.  Check your traffic, I'm betting you'll find the traffic is all coming INTO your network, not outward.


Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question