In fact there are a ton of lists all for different purposes and no one will give you complete -peer protection since one will shield your client from spammers, one from the US Government [really? If you search on Google you will find people recommending this website, called i Blocklist, which collects various block lists but there are to many of them and they all have the same problem I said before: no complete 100% protection.
Looking for a nice and complete blocklist for Transmission can be a pain, especially if you’re not sure of which one to pick.
To get an idea, check for example the XRumer software.
This thing mimics human behavior to post ads, it creates email accounts, responds to emails it receives, bypasses captchas, it goes gently to stay unnoticed, etc.
There are increasing incidents of “bad traffic,” peers who send corrupt data in response to Bit Torrent calls, forcing users to have to re-download those sections of their files.
Users who transfer copyright-infringing material also have to worry about getting caught via these same methods.
The idea behind Peer Guardian was to block known bad or insecure IP connections automatically on computer systems.
It shipped with various lists, a P2P list for example, that you could use to block company IP addresses associated with copyrights holders, media companies and companies that were known to record P2P traffic.
Photo by fitbloggersguide On the more serious side, it shouldn’t be any surprise that your IP address is very easy to trace.To increase our effectiveness we need to complement our security solutions with our shared knowledge, our shared experience in this fight.Hopefully, there are many teams out there that do their best to identify the attacks and pinpoint the attackers. Blocklists of IPs (for use in firewalls), domains & URLs (for use in proxies), etc. Using IP blocklists at the internet side of your firewall is a key component of internet security. Although there are many tools (detection of malware, viruses, intrusion detection and prevention systems, etc) to help us isolate the bad guys, there are now a lot more than just such attacks. It it updated automatically from the script via a cron job. As time passes and the internet matures in our life, cybercrime is becoming increasingly sophisticated.