Skip to content
Back to Blog
Featured Post

Access Denied: Edgesuite Edition - When Your Browser Extensions Become Attack Vectors

Tried booking a flight. Got blocked. VPN didn't help. IP was clean. Turns out Akamai thinks my 21 security extensions make me look like a hacker. They're not wrong.

December 31, 2025
3 min read
---

Last week I tried booking a flight on Indigo. Access Denied. Tried MakeMyTrip. Access Denied. Ixigo? Same story. Yatra? Blocked.

My banking apps worked fine. But every travel booking site using Akamai's CDN decided I was public enemy number one. Sometimes the site would load, then the OTP API calls would silently fail. Making a complete fool out of me at checkout.

Indigo Access Denied
Indigo Access Denied
MakeMyTrip Access Denied
MakeMyTrip Access Denied

The Debugging Rabbit Hole

First thought: bad IP from my ISP's CGNAT pool. Changed my IP. Worked for 10 minutes. Then blocked again.

Second thought: maybe Akamai's IP reputation is flagging me. Checked their Client Reputation lookup.

Akamai Clean IP Reputation
Akamai Clean IP Reputation

Nope. Clean as a whistle.

My IP Info - Tata Play, Bengaluru
My IP Info - Tata Play, Bengaluru

Google dorking time. Found tons of users globally facing the same issue. Not ISP-specific. Not India-specific. Something else was up.

Then I found this blog that pointed at browser extensions. Interesting.

The Lightbulb Moment

Switched from Arc to Chrome. Still blocked. Because I carried over the same 21 extensions like a digital hoarder.

My Extension Arsenal - Part 1
My Extension Arsenal - Part 1
My Extension Arsenal - Part 2
My Extension Arsenal - Part 2

Here's my toolkit: Wappalyzer, Shodan, Trufflehog, DotGit, and a bunch of OSINT/greyhat recon tools. The same extensions I use for security research were making me look like an attacker to Akamai's WAF.

Turned off all extensions. Instant access to every site.

What's Actually Happening

Akamai's WAF isn't counting your requests. It's analyzing payload signatures. Browser extensions inject JavaScript, modify headers, and add tracking parameters to every request. To a WAF, that looks identical to automated scraping tools or injection attempts.

My security toolkit became my own DoS attack vector. Poetic, really.

Some users reported User-Agent changes helped. I didn't test that. I also didn't have time to debug which of the 21 extensions was the actual culprit. Life's too short for that level of troubleshooting.

The Takeaway

WAF rules are aggressive by design. Your legitimate security tools look exactly like attack vectors because, well, they kind of are. The line between security researcher and threat actor is thinner than we'd like to admit.

  • If you're getting blocked by Akamai with a clean IP:
  • Check your extensions first, not your ISP
  • VPN working temporarily? That's behavioral detection, not IP blocking
  • The Client Reputation tool won't catch extension-based triggers
  • Your OSINT toolkit makes CDNs nervous

Infrastructure is meant to keep bad actors out. Sometimes it keeps infrastructure wizards out too. Not fun.

Got blocked by Akamai with your security toolkit? Which extension was your culprit? Reach out if this saved you from the same rabbit hole.

Related Posts

Hard-learned lessons from debugging Kubernetes issues at 3 AM. These tricks will save you hours of frustration.

kubernetesdevopsdebugging

Your containers are probably insecure. Here's how I learned to harden Docker containers the hard way, and the security mistakes that almost cost us.

dockersecuritycontainers

Comments

Loading comments...