Originally Posted by
lamphs
More of a rant...
Two different VPNs (and tried several different locations, including US-based), two different ISPs, two different browsers, and no login access to IHG unless I simply turn the VPN off (here in the DMV area). Why would IHG block the IP addresses of commercially available VPNs?
Ridiculous. I agree with the OP that major hotel changes should recognize the importance of VPNs. I was interested in two ICs, one Regent, and one Kimpton in Asia. I ended up booking similar Marriott and Hilton family properties - 20 nights over the next 3 months.
IHG is the only travel site that I use regularly with this issue - Marriott, Hilton, Best Western, UA, LH, WN, booking, etc.
End of rant...
Not saying if IHG or any other chain’s behavior is correct or not, as they each have their own risk profiles. However, most consumer VPN providers do little if any KYC and their nodes are often used for less legitimate purposes. In addition, most consumer VPN providers use the same colocation providers that also serve VM providers with little if any KYC. Therefore the networks VPN providers use likely have higher malicious traffic coming from.
So even if a company want to allow legitimate traffic from consumer VPN providers, it would be difficult to distinguish those traffic from potentially malicious traffic.