Jammed it into Discord, the Discord backend directly accesses the site in order to embed a summary, which places the IP the Title block. I'm now vaguely aware of the fact that, at least part of Discord's backend is running on GCP. They haven't used it to torrent anything, however.
Interesting, I downloaded World of Tanks a few days ago and that is the only thing that shows up for me here. I didn't even realize that it was distributed over bittorrent.
Snarky and pointless reply. It's still interesting information in the United States, where CGN is rare and residences can keep the same IP address for months or years.
The data on this website has been verified as wildly inaccurate by many many people. It often produces very fake data (including CSAM!) that most certainly was never downloaded from a particular IP. Sometimes it shows nothing when it should, sometimes it appears 100% accurate, sometimes it's a bit of both, and sometimes it's completely inaccurate. Never trust anything you see here, believing ANY of it could be very dangerous.
I run transmission web in a docker container which connects to a VPN on startup. It can connect to many popular VPN providers. That way my home connection is for normal browsing, and all my Linux torrents are limited to that container.
I find the easiest way to set it up is using docker. Running openvpn or wireguard in a docker container (they often have a killswitch built in), then having my transmission and other docker containers use it as its network. The docker image I use for wireguard with PIA is thrnz/docker-wireguard-pia
it’s mostly porn! I was researching some DHT crawler work recently and came across some interesting papers. Here’s a super fun high level read on someone who crawled the BitTorrent distributed hash table using a Sybil attack:
Completely inaccurate and extremely dangerous. Even shows alleged CSAM content on IP's I know for a fact have never torrented or are even routed to any device.