The akamai excuse in the past was (2000);

Akamai said it does not scan end-user ports but that a glitch involving common personal firewall software and the latest version of the basic Internet transport protocol, HTTP 1.1, is causing false alarms that make it seem as if Akamai is sniffing around networked computers.

Yep, you are right. I also have a constant connection to akamai’s running and constantly have this in my logs: a23-66-254-13.deploy.akamaitechnologies.com 23.66.254.13 via port 80

Sitevet results for the Akamai AS:

AS Name: AKAMAI-ASN1 Akamai International B.V.

IPs allocated: 1045376

Blacklisted URLs: 1486

Hosts…

…malicious URLs? Yes

…badware? Yes

…botnet C&C servers? No

…exploit servers? No

…Zeus botnet servers? No

…Current Events? Yes

…phishing servers? No

…spam servers? No

…spam bots? No

…spam activity? No

polonus