Some 'infringement notices' arrived in our abuse folder this week.
Instead of pressing the DEL key I've been investigating some of these.
I have obfuscated some of the following abuse notice
Notice of Claimed Infringement - Case ID XX
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Notice ID:   XX
Notice Date: 2021-07-20TXX:XX:XXZ
ISP PARENTCO INC.
Dear Sir or Madam:
 
I cert.ify und.er pena.lty of per.jury that I am au.thoriz.ed to ac.t on beh.alf of the Vi@c_omC?S Inc. compa.nies C?S Broa.dcasting Inc., CB? Stu?dios Inc., Para_mount Pi_ctures Corpora_tion, Sh-ow-time Netw-orks Inc., Vi com Intern-ational, Inc., and oth.er V-i-@-c-omC-B-S Inc. subsid.iaries and affil.iates (collecti.vely, the "Rig.hts Own.ers"), th.e ow.ners o.f cert.ain exclu.sive inte.llectual prop.erty ri.ghts in the cop.yrighted wo.rk(s) ident.ified in this noti.ce. I h.ave a go.od fai.th bel.ief th.at the inform.ation in this not.ice is accu..rate.
BS BS BS BS BS and more BS
 
OK, so lets see how they send these notices 
Spin up a clean Win10 instance, install v2.84 and see what happens:
paste in the infohash reported...
Some 100% seeders looks good... some partials with bi-directional traffic, and some SCUMBAG IP's "lurking" with NO FILES!
This is an Anti-P2P enforcement bot - and again looks like they need two positive hits as evidence.
88.208.201.113 :51500  Location: United Kingdom ISP: F_a_s_t_h_o_s_t_s UK
185.107.94.48  :51500  Location: Netherlands    ISP: N_F_O_r_c_e NL
 
Again more dumbass stupid config, Port 51500 giving the game away on a massive range of their machines.
Probe some of the NL machines
IP             RDNS                   PORT              P2P_handshake_true
185.107.94.5   185.107.94.5           51500             True
185.107.94.13  185.107.94.13          51500             True
185.107.94.14  185.107.94.14          51500             True
185.107.94.47  185.107.94.47          51500             True
185.107.94.48  185.107.94.48          51500             True
185.107.94.58  185.107.94.58          51500             True
185.107.94.59  185.107.94.59          51500             True
185.107.94.62  185.107.94.62          51500             True
 
This is definitely dodgy AF!
Block it folks!
Tixati IP FILTER FILE:
# f_a_s_t_hosts and nfo_rce
FAASTHSTS:70.35.192.0-70.35.207.255
FAASTHSTS:77.68.32.0-77.68.63.255
FAASTHSTS:79.99.40.0-79.99.47.255
FAASTHSTS:88.208.192.0-88.208.251.255
FAASTHSTS:109.228.0.0-109.228.63.255
FAASTHSTS:213.171.192.0-213.171.223.255
FAASTHSTS:217.174.240.0-217.174.255.255
N_F_O_RCE:185.107.94.0-185.107.95.255
 
Going further, constantly probing these machines for handshakes, I found they often identify differently
They have gone to significant effort to "hide" the identifiers:
AND it seems this has been here a long time. Judging by some of the ANCIENT software versions
Bitcomet 1.35
uTorrent 3.1.3
Mainline 7.4.1
Transmission 2.61
Azureus 5.2.0
Vuze 5.2.0.1
+more
 
Interesting!
I'm ALWAYS logging...  ;-D