Client Reputation Overview
Client Reputation provides information to our customers regarding the reputation of IP addresses that interact with the Akamai Intelligent Platform. Customers use Client Reputation to better protect their applications against DDoS and application layer attacks. It does this by identifying and sharing with customers the likelihood that particular IP Addresses fall into one of the following malicious categories web attackers, Denial of Service(DoS) attackers, scanning tools and web scrapers.
Client Reputation leverages advanced algorithms to compute a risk score based on prior behavior as observed over the Akamai network. Based on this information, Akamai assigns risk scores to each IP Address and allows customers to choose which actions to take on an IP address with specific risk scores.
Information that users provide via the Client Reputation Investigation Request shall be subject to Akamai’s Privacy Statement for Akamai Sites.
Lookup
To view the reputation of your IP address, validate that you are not a robot by solving the provided captcha and click 'Go'
Results
Your IPv4 Address received a bad risk score.
The IPv4 Address was associated with the following malicious activity:
Your IPv6 Address received a bad risk score.
The IPv6 Address was associated with the following malicious activity:
To request that the reputation of your IP address be investigated, provide the information below, validate that you are not a robot by solving the provided captcha and click "Investigate".
Frequently Asked Questions
Why is Akamai blocking me?
Akamai does not block users from accessing our customers' websites. However, our customers can use tools and policies which may in turn block you (the end user). Our customers use these rules to protect them and you from malicious actors on the internet. Some common reasons could include:- Explicit IP blocking / blacklisting
- Location-based backlisting
- Rule-based blocking (i.e. web application firewall protections)
- Reputation-base blocking
- HTTP request rate controls (e.g. DoS protections)
- Web application layer attacks such as: SQL Injection, Cross-Site Scripting, Local File Inclusion, Remote Command Execution, Remote File Inclusion, etc.
- Volumetric attacks or similar high rate HTTP traffic
- Web contents scraping, data mining, web content indexing and similar automated web activities
- Web vulnerability scanning using automated tools