Hello everyone,
I did a packet capture recently, and noticed some evidence of public torrents used to DDoS servers and perhaps individual users through fake peers. Those connections have destination ports 1, 80 and 443 and occur several times a second. The affected servers mostly discard the traffic, but sometimes respond with a HTTP 400 error.
Therefore, I recommend adding those to your client's port blacklist (bt.no_connect_to_services_list in uTorrent, "ignore peers with these data ports" in BiglyBT); even better, add all ports between 1 and 1024 if possible, since few if any legitimate peers use them. This setting does not affect tracker communication, so there should be no drawbacks. Furthermore, if you don't require Local Peer Discovery or UPnP, adding all private and reserved ranges to your IP filter is also a good idea.
If you notice any strange tracker URLs, look them up at the following lists and decide for yourself whether they're trustworthy or not.
https://github.com/ngosang/trackersl.../blacklist.txt
https://newtrackon.com/
Bookmarks