• To chevron_right

      DISH Sues ‘Pirate’ IPTV Services Lemo and Kemo in U.S. Court

      news.movim.eu / TorrentFreak • 8 April 2025 • 3 minutes

    dish ibcap With the continued growth of pirate IPTV services in recent years, TV broadcasters and distributors have been ramping up their anti-piracy efforts.

    The International Broadcaster Coalition Against Piracy ( IBCAP ) has been particularly active. It’s also the main driver behind a new lawsuit filed yesterday by DISH Network at a Texas federal court.

    Lemo TV & Kemo IPTV

    The American pay-TV provider accuses the operators of popular streaming services ‘Lemo TV’ and ‘Kemo IPTV’ of direct copyright infringement. These services, operating from Lemotv.com and Kemoiptv.com respectively, promise access to “over 18,000 live channels” and “over 8,400 shows” for a fraction of the price of legal subscriptions.

    “Defendants offer United States Subscribers a 36-hour free trial to the Service and sell Service Subscriptions for one device for $28.50 for six months, $39 for one year, $59 for two years, and $100 for four years,” the complaint notes.

    Lemo TV

    lemo

    In addition to selling direct to consumers, both services operate reseller programs. This allows third parties to launch their own custom-branded IPTV streaming sites and apps for under $200. Resellers purchase credits for use with their branded services which they can resell to their own customers at a significant markup.

    In a footnote, DISH claims that resellers of Lemo TV and Kemo IPTV include the following: Xtremehdiptv.org, Bestusiptv.com, Slingtvbox.com, 1dollariptv.com, Fubo-iptv.com, Tv-wave.com, Kemoiptv.shop, Geministreamz.us, Honeybeetv.com, Honeybeeiptv.org, Honeybeeiptv.io, Dynastyiptv.shop, Dynastyiptv.com, Dynasty-iptv.com, Caliptostreams.com, and 4kliveiptv.com.

    Reseller offer

    Unveiling the John Doe Operators

    The complaint alleges Lemo and Kemo use the services of Cloudflare and Namecheap, which are both based in the United States. However, the identities of the operators remain unknown. DISH hopes to uncover more information through this lawsuit so it can name the defendants in an amended complaint.

    To gather more information, DISH filed a motion to expedite discovery. Specifically, it seeks permission to subpoena a wide variety of third-party intermediaries who may be able to help identify the defendants.

    These include Cloudflare and Namecheap, but also other hosting companies, payment providers, and social media services such as 24 Shells, Des Equity, Hivelocity, Tucows, GoDaddy.com, DigitalOcean, Newfold Digital, Google, Coinbase, PayPal, Meta Platforms, and X Corp.

    The discovery request is not limited to the main Lemo and Kemo domains, but also includes the alleged reseller services, as shown below.

    Discovery Request

    other domains

    $25 Million in Damages

    The lawsuit mentions that at least 171 registered copyrighted works were infringed and DISH seeks the maximum of $150,000 in statutory damages for each, totaling over $25 million. In addition, the complaint seeks an injunction to transfer the infringing domain names.

    While their identities are currently unknown, DISH believes that the defendants acted willfully and on a massive scale, ignoring approximately 100 notices of infringement sent by IBCAP and DISH since February 2021.

    IBCAP executive director Chris Kuelling says that their anti-piracy lab classifies Lemo and Kemo among the most egregious IPTV services. During the first quarter of 2025, the services accounted for nearly 30% of all unauthorized streams detected on set-top box and IPTV services.

    Based on this data, IBCAP helps its members to select the prime candidates for legal action, which ultimately resulted in this week’s lawsuit.

    “This lawsuit is the latest example of our lab’s ability to identify the pirate services that are significantly infringing our members’ content and stack-rank such services in order to target and remove the worst infringers.”

    “This level of theft is unacceptable for our members, and we will put a swift stop to it—just as we have successfully done with numerous other pirate services through court-ordered injunctions,” Kuelling adds.

    A copy of the DISH Network complaint, filed yesterday at the U.S. District Court for the Southern District of Texas, is available here (pdf)

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      DISH Sues ‘Pirate’ IPTV Services Lemo and Kemo in U.S. Court

      news.movim.eu / TorrentFreak • 8 April 2025 • 3 minutes

    dish ibcap With the continued growth of pirate IPTV services in recent years, TV broadcasters and distributors have been ramping up their anti-piracy efforts.

    The International Broadcaster Coalition Against Piracy ( IBCAP ) has been particularly active. It’s also the main driver behind a new lawsuit filed yesterday by DISH Network at a Texas federal court.

    Lemo TV & Kemo IPTV

    The American pay-TV provider accuses the operators of popular streaming services ‘Lemo TV’ and ‘Kemo IPTV’ of direct copyright infringement. These services, operating from Lemotv.com and Kemoiptv.com respectively, promise access to “over 18,000 live channels” and “over 8,400 shows” for a fraction of the price of legal subscriptions.

    “Defendants offer United States Subscribers a 36-hour free trial to the Service and sell Service Subscriptions for one device for $28.50 for six months, $39 for one year, $59 for two years, and $100 for four years,” the complaint notes.

    Lemo TV

    lemo

    In addition to selling direct to consumers, both services operate reseller programs. This allows third parties to launch their own custom-branded IPTV streaming sites and apps for under $200. Resellers purchase credits for use with their branded services which they can resell to their own customers at a significant markup.

    In a footnote, DISH claims that resellers of Lemo TV and Kemo IPTV include the following: Xtremehdiptv.org, Bestusiptv.com, Slingtvbox.com, 1dollariptv.com, Fubo-iptv.com, Tv-wave.com, Kemoiptv.shop, Geministreamz.us, Honeybeetv.com, Honeybeeiptv.org, Honeybeeiptv.io, Dynastyiptv.shop, Dynastyiptv.com, Dynasty-iptv.com, Caliptostreams.com, and 4kliveiptv.com.

    Reseller offer

    Unveiling the John Doe Operators

    The complaint alleges Lemo and Kemo use the services of Cloudflare and Namecheap, which are both based in the United States. However, the identities of the operators remain unknown. DISH hopes to uncover more information through this lawsuit so it can name the defendants in an amended complaint.

    To gather more information, DISH filed a motion to expedite discovery. Specifically, it seeks permission to subpoena a wide variety of third-party intermediaries who may be able to help identify the defendants.

    These include Cloudflare and Namecheap, but also other hosting companies, payment providers, and social media services such as 24 Shells, Des Equity, Hivelocity, Tucows, GoDaddy.com, DigitalOcean, Newfold Digital, Google, Coinbase, PayPal, Meta Platforms, and X Corp.

    The discovery request is not limited to the main Lemo and Kemo domains, but also includes the alleged reseller services, as shown below.

    Discovery Request

    other domains

    $25 Million in Damages

    The lawsuit mentions that at least 171 registered copyrighted works were infringed and DISH seeks the maximum of $150,000 in statutory damages for each, totaling over $25 million. In addition, the complaint seeks an injunction to transfer the infringing domain names.

    While their identities are currently unknown, DISH believes that the defendants acted willfully and on a massive scale, ignoring approximately 100 notices of infringement sent by IBCAP and DISH since February 2021.

    IBCAP executive director Chris Kuelling says that their anti-piracy lab classifies Lemo and Kemo among the most egregious IPTV services. During the first quarter of 2025, the services accounted for nearly 30% of all unauthorized streams detected on set-top box and IPTV services.

    Based on this data, IBCAP helps its members to select the prime candidates for legal action, which ultimately resulted in this week’s lawsuit.

    “This lawsuit is the latest example of our lab’s ability to identify the pirate services that are significantly infringing our members’ content and stack-rank such services in order to target and remove the worst infringers.”

    “This level of theft is unacceptable for our members, and we will put a swift stop to it—just as we have successfully done with numerous other pirate services through court-ordered injunctions,” Kuelling adds.

    A copy of the DISH Network complaint, filed yesterday at the U.S. District Court for the Southern District of Texas, is available here (pdf)

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      DISH Sues ‘Pirate’ IPTV Services Lemo and Kemo in U.S. Court

      news.movim.eu / TorrentFreak • 8 April 2025 • 3 minutes

    dish ibcap With the continued growth of pirate IPTV services in recent years, TV broadcasters and distributors have been ramping up their anti-piracy efforts.

    The International Broadcaster Coalition Against Piracy ( IBCAP ) has been particularly active. It’s also the main driver behind a new lawsuit filed yesterday by DISH Network at a Texas federal court.

    Lemo TV & Kemo IPTV

    The American pay-TV provider accuses the operators of popular streaming services ‘Lemo TV’ and ‘Kemo IPTV’ of direct copyright infringement. These services, operating from Lemotv.com and Kemoiptv.com respectively, promise access to “over 18,000 live channels” and “over 8,400 shows” for a fraction of the price of legal subscriptions.

    “Defendants offer United States Subscribers a 36-hour free trial to the Service and sell Service Subscriptions for one device for $28.50 for six months, $39 for one year, $59 for two years, and $100 for four years,” the complaint notes.

    Lemo TV

    lemo

    In addition to selling direct to consumers, both services operate reseller programs. This allows third parties to launch their own custom-branded IPTV streaming sites and apps for under $200. Resellers purchase credits for use with their branded services which they can resell to their own customers at a significant markup.

    In a footnote, DISH claims that resellers of Lemo TV and Kemo IPTV include the following: Xtremehdiptv.org, Bestusiptv.com, Slingtvbox.com, 1dollariptv.com, Fubo-iptv.com, Tv-wave.com, Kemoiptv.shop, Geministreamz.us, Honeybeetv.com, Honeybeeiptv.org, Honeybeeiptv.io, Dynastyiptv.shop, Dynastyiptv.com, Dynasty-iptv.com, Caliptostreams.com, and 4kliveiptv.com.

    Reseller offer

    Unveiling the John Doe Operators

    The complaint alleges Lemo and Kemo use the services of Cloudflare and Namecheap, which are both based in the United States. However, the identities of the operators remain unknown. DISH hopes to uncover more information through this lawsuit so it can name the defendants in an amended complaint.

    To gather more information, DISH filed a motion to expedite discovery. Specifically, it seeks permission to subpoena a wide variety of third-party intermediaries who may be able to help identify the defendants.

    These include Cloudflare and Namecheap, but also other hosting companies, payment providers, and social media services such as 24 Shells, Des Equity, Hivelocity, Tucows, GoDaddy.com, DigitalOcean, Newfold Digital, Google, Coinbase, PayPal, Meta Platforms, and X Corp.

    The discovery request is not limited to the main Lemo and Kemo domains, but also includes the alleged reseller services, as shown below.

    Discovery Request

    other domains

    $25 Million in Damages

    The lawsuit mentions that at least 171 registered copyrighted works were infringed and DISH seeks the maximum of $150,000 in statutory damages for each, totaling over $25 million. In addition, the complaint seeks an injunction to transfer the infringing domain names.

    While their identities are currently unknown, DISH believes that the defendants acted willfully and on a massive scale, ignoring approximately 100 notices of infringement sent by IBCAP and DISH since February 2021.

    IBCAP executive director Chris Kuelling says that their anti-piracy lab classifies Lemo and Kemo among the most egregious IPTV services. During the first quarter of 2025, the services accounted for nearly 30% of all unauthorized streams detected on set-top box and IPTV services.

    Based on this data, IBCAP helps its members to select the prime candidates for legal action, which ultimately resulted in this week’s lawsuit.

    “This lawsuit is the latest example of our lab’s ability to identify the pirate services that are significantly infringing our members’ content and stack-rank such services in order to target and remove the worst infringers.”

    “This level of theft is unacceptable for our members, and we will put a swift stop to it—just as we have successfully done with numerous other pirate services through court-ordered injunctions,” Kuelling adds.

    A copy of the DISH Network complaint, filed yesterday at the U.S. District Court for the Southern District of Texas, is available here (pdf)

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      DAZN Pirate IPTV Action Coincided With Massive Public DNS Blockade

      news.movim.eu / TorrentFreak • 7 April 2025 • 4 minutes

    dazn Like many similar reports published most weeks by newspapers in Europe, an article published by Belgian media outlet L’Echo late Saturday evening pulled few punches.

    The publication explained that after football broadcasters DAZN and 12th Player obtained authority from a local court for a new type of enforcement action, on Saturday Belgian ISPs blocked around 100 illegal streaming sites and five pirate IPTV providers. The measures were reportedly timed to take effect shortly before the start of the second day of the Belgian football championship play-offs, presumably to maximize the irritant effect of sudden pirate ssite blackouts.

    “DAZN: First of Its Kind”

    According to L’Echo, DAZN described the action as the “the first of its kind” and a “real step forward” in the fight against content piracy in Belgium. Comments like these are fairly standard in the anti-piracy arena, likewise claims that rightsholders have acquired a secret weapon capable of tipping the balance of power.

    L’Echo’s report was much more balanced but if the various components came together as planned, major disruption of live match streams at a crucial point in the season seemed to have a real chance of success.

    The groundwork was completed last month. An order issued by the Brussels Enterprise Court late March, authorized DAZN and 12th Player to engage in dynamic blocking boosted by a significant additional component.

    While this would be its first use in Belgium, dynamic blocking is already used extensively elsewhere. The mechanism allows for speedy responses to blocking countermeasures, including domain changes and the appearance of proxies and mirrors, and there’s no requirement for a follow-up legal procedure.

    Pirate sites are by now mostly familiar with dynamic blocking but in this case, the rightsholders also had an eye on spoiling a circumvention tactic popular with millions of users. Faced with blocking on Saturday, users in Belgium who switched from ISP-provided DNS to Cloudflare’s DNS wouldn’t have restored connectivity quite so easily. Moving to DNS provided by Google or Cisco may not have helped much either.

    Cloudflare, Google, and Cisco Ordered to Block DNS Resolvers

    Over the past several years, Cloudflare has faced several lawsuits that demanded pirate site blocking measures on its public DNS resolver. Rightsholders take the position that when ISPs implement DNS blocking, users shouldn’t be able to switch to a public DNS service like Cloudflare’s to regain access.

    Those cases mostly focused on Cloudflare in Italy but a site-blocking case filed by Canal+ in 2023, concluded in 2024 with Cloudflare, Google, and Cisco ordered to prevent use of their DNS resolvers to access dozens of pirate sites.

    In terms of platforms blocked in a single swoop, the order obtained by DAZN and 12th Player in Belgium may be even broader in scope.

    New Law, New Blocking Momentum

    New law passed in Belgium in 2022 aimed to strengthen rightsholders’ piracy-fighting capabilities. A new expedited judicial procedure at the Brussels Enterprise Court promised tougher measures such as dynamic blocking, and the creation of a new department within the Federal Public Service FPS Economy (SPF Économie).

    Documents seen by TorrentFreak late last week include a notice penned by the Belgian Online Anti-Piracy & Illegal Gambling Office . The notice references a “regulatory order” to block public DNS resolvers, stemming from a court order concerning claims of copyright infringement against pirate streaming sites.

    Domains For Blocking (public DNS resolvers) [dark square=domain unresponsive] dazn-cloud-belgium

    The notice does not mention DAZN or 12th Player by name but the nature of the domains (almost 140, all linked to illegal sports streaming sites) and the date of the notification (April 3, 2025) suggest a strong link to Saturday’s events. DAZN’s standing as a dominant rightsholder means the notice is unlikely to relate to anyone else.

    Pro Site-Blocking ISPs

    Site blocking has existed in Belgium for close to 15 years with The Pirate Bay an early target back in 2011. Until recently, however, site blocking measures have been quite patchy and lacked volume in general.

    By the summer of 2024, DAZN and 12th Player were helping to push that trend in a different direction after obtaining an order to block around 90 pirate streaming sites offering content to which the companies own the rights.

    Local ISPs Telenet NV, Proximus NV, Voo NV, and Orange Belgium NV were technically the defendants in that matter but the site blocking process in Belgium is completely non-adversarial. In February 2024, the CEOs of both Proximus and Orange openly spoke out in favor of site-blocking measures, with the former indicating they couldn’t come soon enough .

    Resistance is Futile – and Expensive

    Whether the Brussels Enterprise Court took the ISPs’ cooperation into account isn’t clear, but as far as we’re able to determine, the dynamic blocking order seems to have taken their compliance for granted. The same cannot be said of the operators of the public DNS resolvers, Cloudflare, Google, and Cisco.

    The Court reportedly set penalties at €100,000 per day for non-compliance, a sharp turnaround from the status quo barely a year ago when public DNS resolvers mostly considered themselves too distant from infringement to be held liable. Given that the vast majority of the sites in the blocking order act as portals or indexes for content not even they host, links to direct infringement are distant indeed.

    That raises the most important question of all: can blocking be considered successful if it doesn’t remove or even target the infringing streams that fuel the entire ecosystem?

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      DAZN Pirate IPTV Action Coincided With Massive Public DNS Blockade

      news.movim.eu / TorrentFreak • 7 April 2025 • 4 minutes

    dazn Like many similar reports published most weeks by newspapers in Europe, an article published by Belgian media outlet L’Echo late Saturday evening pulled few punches.

    The publication explained that after football broadcasters DAZN and 12th Player obtained authority from a local court for a new type of enforcement action, on Saturday Belgian ISPs blocked around 100 illegal streaming sites and five pirate IPTV providers. The measures were reportedly timed to take effect shortly before the start of the second day of the Belgian football championship play-offs, presumably to maximize the irritant effect of sudden pirate ssite blackouts.

    “DAZN: First of Its Kind”

    According to L’Echo, DAZN described the action as the “the first of its kind” and a “real step forward” in the fight against content piracy in Belgium. Comments like these are fairly standard in the anti-piracy arena, likewise claims that rightsholders have acquired a secret weapon capable of tipping the balance of power.

    L’Echo’s report was much more balanced but if the various components came together as planned, major disruption of live match streams at a crucial point in the season seemed to have a real chance of success.

    The groundwork was completed last month. An order issued by the Brussels Enterprise Court late March, authorized DAZN and 12th Player to engage in dynamic blocking boosted by a significant additional component.

    While this would be its first use in Belgium, dynamic blocking is already used extensively elsewhere. The mechanism allows for speedy responses to blocking countermeasures, including domain changes and the appearance of proxies and mirrors, and there’s no requirement for a follow-up legal procedure.

    Pirate sites are by now mostly familiar with dynamic blocking but in this case, the rightsholders also had an eye on spoiling a circumvention tactic popular with millions of users. Faced with blocking on Saturday, users in Belgium who switched from ISP-provided DNS to Cloudflare’s DNS wouldn’t have restored connectivity quite so easily. Moving to DNS provided by Google or Cisco may not have helped much either.

    Cloudflare, Google, and Cisco Ordered to Block DNS Resolvers

    Over the past several years, Cloudflare has faced several lawsuits that demanded pirate site blocking measures on its public DNS resolver. Rightsholders take the position that when ISPs implement DNS blocking, users shouldn’t be able to switch to a public DNS service like Cloudflare’s to regain access.

    Those cases mostly focused on Cloudflare in Italy but a site-blocking case filed by Canal+ in 2023, concluded in 2024 with Cloudflare, Google, and Cisco ordered to prevent use of their DNS resolvers to access dozens of pirate sites.

    In terms of platforms blocked in a single swoop, the order obtained by DAZN and 12th Player in Belgium may be even broader in scope.

    New Law, New Blocking Momentum

    New law passed in Belgium in 2022 aimed to strengthen rightsholders’ piracy-fighting capabilities. A new expedited judicial procedure at the Brussels Enterprise Court promised tougher measures such as dynamic blocking, and the creation of a new department within the Federal Public Service FPS Economy (SPF Économie).

    Documents seen by TorrentFreak late last week include a notice penned by the Belgian Online Anti-Piracy & Illegal Gambling Office . The notice references a “regulatory order” to block public DNS resolvers, stemming from a court order concerning claims of copyright infringement against pirate streaming sites.

    Domains For Blocking (public DNS resolvers) [dark square=domain unresponsive] dazn-cloud-belgium

    The notice does not mention DAZN or 12th Player by name but the nature of the domains (almost 140, all linked to illegal sports streaming sites) and the date of the notification (April 3, 2025) suggest a strong link to Saturday’s events. DAZN’s standing as a dominant rightsholder means the notice is unlikely to relate to anyone else.

    Pro Site-Blocking ISPs

    Site blocking has existed in Belgium for close to 15 years with The Pirate Bay an early target back in 2011. Until recently, however, site blocking measures have been quite patchy and lacked volume in general.

    By the summer of 2024, DAZN and 12th Player were helping to push that trend in a different direction after obtaining an order to block around 90 pirate streaming sites offering content to which the companies own the rights.

    Local ISPs Telenet NV, Proximus NV, Voo NV, and Orange Belgium NV were technically the defendants in that matter but the site blocking process in Belgium is completely non-adversarial. In February 2024, the CEOs of both Proximus and Orange openly spoke out in favor of site-blocking measures, with the former indicating they couldn’t come soon enough .

    Resistance is Futile – and Expensive

    Whether the Brussels Enterprise Court took the ISPs’ cooperation into account isn’t clear, but as far as we’re able to determine, the dynamic blocking order seems to have taken their compliance for granted. The same cannot be said of the operators of the public DNS resolvers, Cloudflare, Google, and Cisco.

    The Court reportedly set penalties at €100,000 per day for non-compliance, a sharp turnaround from the status quo barely a year ago when public DNS resolvers mostly considered themselves too distant from infringement to be held liable. Given that the vast majority of the sites in the blocking order act as portals or indexes for content not even they host, links to direct infringement are distant indeed.

    That raises the most important question of all: can blocking be considered successful if it doesn’t remove or even target the infringing streams that fuel the entire ecosystem?

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      DAZN Pirate IPTV Action Coincided With Massive Public DNS Blockade

      news.movim.eu / TorrentFreak • 7 April 2025 • 4 minutes

    dazn Like many similar reports published most weeks by newspapers in Europe, an article published by Belgian media outlet L’Echo late Saturday evening pulled few punches.

    The publication explained that after football broadcasters DAZN and 12th Player obtained authority from a local court for a new type of enforcement action, on Saturday Belgian ISPs blocked around 100 illegal streaming sites and five pirate IPTV providers. The measures were reportedly timed to take effect shortly before the start of the second day of the Belgian football championship play-offs, presumably to maximize the irritant effect of sudden pirate ssite blackouts.

    “DAZN: First of Its Kind”

    According to L’Echo, DAZN described the action as the “the first of its kind” and a “real step forward” in the fight against content piracy in Belgium. Comments like these are fairly standard in the anti-piracy arena, likewise claims that rightsholders have acquired a secret weapon capable of tipping the balance of power.

    L’Echo’s report was much more balanced but if the various components came together as planned, major disruption of live match streams at a crucial point in the season seemed to have a real chance of success.

    The groundwork was completed last month. An order issued by the Brussels Enterprise Court late March, authorized DAZN and 12th Player to engage in dynamic blocking boosted by a significant additional component.

    While this would be its first use in Belgium, dynamic blocking is already used extensively elsewhere. The mechanism allows for speedy responses to blocking countermeasures, including domain changes and the appearance of proxies and mirrors, and there’s no requirement for a follow-up legal procedure.

    Pirate sites are by now mostly familiar with dynamic blocking but in this case, the rightsholders also had an eye on spoiling a circumvention tactic popular with millions of users. Faced with blocking on Saturday, users in Belgium who switched from ISP-provided DNS to Cloudflare’s DNS wouldn’t have restored connectivity quite so easily. Moving to DNS provided by Google or Cisco may not have helped much either.

    Cloudflare, Google, and Cisco Ordered to Block DNS Resolvers

    Over the past several years, Cloudflare has faced several lawsuits that demanded pirate site blocking measures on its public DNS resolver. Rightsholders take the position that when ISPs implement DNS blocking, users shouldn’t be able to switch to a public DNS service like Cloudflare’s to regain access.

    Those cases mostly focused on Cloudflare in Italy but a site-blocking case filed by Canal+ in 2023, concluded in 2024 with Cloudflare, Google, and Cisco ordered to prevent use of their DNS resolvers to access dozens of pirate sites.

    In terms of platforms blocked in a single swoop, the order obtained by DAZN and 12th Player in Belgium may be even broader in scope.

    New Law, New Blocking Momentum

    New law passed in Belgium in 2022 aimed to strengthen rightsholders’ piracy-fighting capabilities. A new expedited judicial procedure at the Brussels Enterprise Court promised tougher measures such as dynamic blocking, and the creation of a new department within the Federal Public Service FPS Economy (SPF Économie).

    Documents seen by TorrentFreak late last week include a notice penned by the Belgian Online Anti-Piracy & Illegal Gambling Office . The notice references a “regulatory order” to block public DNS resolvers, stemming from a court order concerning claims of copyright infringement against pirate streaming sites.

    Domains For Blocking (public DNS resolvers) [dark square=domain unresponsive] dazn-cloud-belgium

    The notice does not mention DAZN or 12th Player by name but the nature of the domains (almost 140, all linked to illegal sports streaming sites) and the date of the notification (April 3, 2025) suggest a strong link to Saturday’s events. DAZN’s standing as a dominant rightsholder means the notice is unlikely to relate to anyone else.

    Pro Site-Blocking ISPs

    Site blocking has existed in Belgium for close to 15 years with The Pirate Bay an early target back in 2011. Until recently, however, site blocking measures have been quite patchy and lacked volume in general.

    By the summer of 2024, DAZN and 12th Player were helping to push that trend in a different direction after obtaining an order to block around 90 pirate streaming sites offering content to which the companies own the rights.

    Local ISPs Telenet NV, Proximus NV, Voo NV, and Orange Belgium NV were technically the defendants in that matter but the site blocking process in Belgium is completely non-adversarial. In February 2024, the CEOs of both Proximus and Orange openly spoke out in favor of site-blocking measures, with the former indicating they couldn’t come soon enough .

    Resistance is Futile – and Expensive

    Whether the Brussels Enterprise Court took the ISPs’ cooperation into account isn’t clear, but as far as we’re able to determine, the dynamic blocking order seems to have taken their compliance for granted. The same cannot be said of the operators of the public DNS resolvers, Cloudflare, Google, and Cisco.

    The Court reportedly set penalties at €100,000 per day for non-compliance, a sharp turnaround from the status quo barely a year ago when public DNS resolvers mostly considered themselves too distant from infringement to be held liable. Given that the vast majority of the sites in the blocking order act as portals or indexes for content not even they host, links to direct infringement are distant indeed.

    That raises the most important question of all: can blocking be considered successful if it doesn’t remove or even target the infringing streams that fuel the entire ecosystem?

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      Cloning Premier League’s Pirate Site DMCA Subpoena Toolkit

      news.movim.eu / TorrentFreak • 7 April 2025 • 6 minutes

    premier-os Most prevalent in the movie and TV show sectors, applications for DMCA subpoenas are regularly filed at courts in the United States.

    Aside from their intended purpose, DMCA subpoenas can provide useful clues about future anti-piracy strategies. When subpoenas are contested by intermediaries, subpoena applications sometimes become copyright cases in their own right. From a rightsholders’ perspective, in some cases they may be the only potential source of information yet to be exhausted.

    Getting Prepared

    A few days ago, the UK’s Premier League asked a California federal court to issue a DMCA subpoena against Cloudflare. The application identifies 38 target pirate streaming sites , many of which utilize multiple domains. Since the platforms all use Cloudflare, the Premier League hopes that information held by the company will help to unmask the sites’ currently anonymous operators.

    Before filing an application under Section 512(h) of the DMCA, which allows copyright owners to obtain a subpoena and receive “information sufficient to identify an anonymous infringer,” applicants are first required to send DMCA takedown notices to the platform in question. The notices should identify the infringing content and state where the content can be found; in cases involving streaming sites, the right tools can prove helpful.

    Recreating the Toolkit

    The screenshot below shows a live match playing on a pirate streaming site. Culled from the Premier League’s application, it provides clues that allow us to start identifying the tools in use and the problems they’re likely to solve once combined with Open Source Intelligence ( OSINT ).

    At a basic level in this context, OSINT can be almost any information made available on the internet. The screenshot is our primary source; it will help us identify the tools to recreate the toolkit, which in turn will use other public information sources to satisfy the requirements of the application.

    M3U8 Sniffer

    m3u8sniffer In this example it appears that when the Premier League visited the website sporttuna.pro, they were redirected to sporttuna.website and then to sporttuna.xyz (boxed in red).

    Like most pirate sites, the ‘backend link’ or source of the stream (boxed in green) isn’t on public display. These links can be obtained in various ways but in this case, Chrome extension M3U8 Sniffer is the weapon of choice.

    M3U8 Sniffer m3u8sniffer-v1

    From the developer’s website: The extension intercepts visited web page’s network requests and identifies all m3u8 video stream URLs. When a m3u8 URL request is found, it is displayed in a box that overlays the visited web page (see images above) from which you can copy the m3u8 URL or play the video stream. Also, you can open the extension’s popup window to view the first and last m3u8 URLs found for each site, as well as to set a variety of extension options.

    M3U8 Sniffer is a free extension available from the Chrome Web Store. Further information is available from the developer at SnifferTV.com .

    Identifying the Remaining Tools

    Identifying the remaining tools was a little time-consuming but if we said the method was advanced or complicated, that would be a lie.

    We simply trawled through the browser evidence images and took screenshots of the toolbars. These contain the icons of the apps used to obtain the evidence.

    After extracting the toolbar icons we put those we recognized to the side, then identified the remainder using reverse image search tools. Straightforward options include Google Images and Google Lens .

    As an alternative, Chrome extension RevEye Reverse Image Search provides instant results from Google, Bing, Yandex, and TinEye.

    (Note: Bad extensions exist, trust nobody, check the source )

    Internet Download Manager

    idm Given that M3U8 Sniffer “does NOT provide functionality to download the actual video streams” another piece of software comes in handy. IDM is a popular choice in the niche and appears to be the downloader of choice in this particular toolkit.

    From the official website: When you click on a download link in a browser, IDM will take over the download and accelerate it. You don’t need to do anything special, just browse the Internet as you usually do. IDM will catch your downloads and accelerate them. IDM supports HTTP, FTP, HTTPS and MMS protocols.

    Unfortunately, IDM isn’t free but it is free to try via a 30-day trial . Some prefer JDownloader since the price is more predictable, but there are plenty of options in this niche.

    Fiddler

    fiddler2 Our best guess at identifying this next tool comes with a small caveat that its icon was almost impossibly blurred and even when fresh it’s still pretty basic. Ultimately, a green diamond and a single white ‘F’ works here.

    Fiddler and tools with similar functionality (web debugging proxy tools) are used extensively by developers and investigators when keeping a close eye on HTTP traffic is a must. For those who’ve never cared to take a closer look, it can be real eye-opener. Even the most innocuous websites can behave pretty badly until users notice, so there’s never a bad time to take a first look.

    Fiddler Classic and Fiddler Everywhere are both available as free trials, and the same is true for Charles Proxy which appears regularly as evidence in Indian site-blocking cases.

    Some prefer to monitor traffic with Wireshark but for others it can be too much. Open source and available on Linux, Windows (GUI), and macOS, MITM Proxy will scratch most itches for free.

    mitm-proxy

    At a pocket friendly price of $0.00, the open source MITM Proxy (man-in-the-middle) does exactly as its name suggests, making it a popular choice.

    Instant Datascraper

    insstant datascraper Scraping data from websites in a structured and usable format isn’t always easy and for big jobs, things can quickly descend into a time-wasting nightmare.

    Instant Data Scraper hopes to eliminate the frustrations often associated with scraping and with over a million users, people seem happy with the results.

    It’s impossible to say how the Premier League uses Instant Datascraper, but it could easily consume a visible members’ list in an instant or scrape a mountain of forum posts. The options are only limited by data becoming unavailable.

    From the official site: Instant Data Scraper is an automated data extraction tool for any website. It uses AI to predict which data is most relevant on a HTML page and allows saving it to Excel or CSV file (XLS, XLSX, CSV). This tool does not require website specific scripts, instead it uses heuristic AI analysis of HTML structure to detect data for extraction. This means that our scraping method works just as well with small and lesser known websites, as it does with global giants like Amazon. Also, our users do not need to have any coding, json or xml skills

    The software is free and available direct from webrobots.io and the Chrome Store .

    IPNetInfo | Investigator

    IPNetInfo describes itself a small utility that allows people to easily find all available information about an IP address. That includes the owner of the IP address and sundry other details. Hosted on Nirsoft.com and GitHub respectively, both also have a bit more to offer.

    Investigator is actually a collection of useful tools , one of which is bound to come in useful sooner or later. Developed by Nirsoft, IPNetInfo is surrounded by dozens of other useful free tools at Nirsoft.net so still worth a quick visit.

    Those with access to a Linux command line also have access to the best tools when investigating domains, IP addresses, and DNS. For Windows users or those who simply prefer the convenience of GUIs, the following perform well and look great too: Digger Tools , DNSViz , URLQuery , DMNSApp , URLScan , and WebCheck .

    Finally, a pair of outliers to consider.

    The End: Emulators

    emulators Given that there are Android emulators that are less elaborate, more predictable, and therefore better suited to the assumed job in hand, the discovery of two fairly elaborate emulators in the toolkit initially seems a little puzzling.

    There’s bound to be a good reason they’re installed but right now, those reasons will have to wait until another day.

    Of course, the answers to these questions and others like them, are always out there. ‘Out there’ is a very, very big place but the answers usually give themselves up quite quickly once curiosity arrives.

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      Cloning Premier League’s Pirate Site DMCA Subpoena Toolkit

      news.movim.eu / TorrentFreak • 7 April 2025 • 6 minutes

    premier-os Most prevalent in the movie and TV show sectors, applications for DMCA subpoenas are regularly filed at courts in the United States.

    Aside from their intended purpose, DMCA subpoenas can provide useful clues about future anti-piracy strategies. When subpoenas are contested by intermediaries, subpoena applications sometimes become copyright cases in their own right. From a rightsholders’ perspective, in some cases they may be the only potential source of information yet to be exhausted.

    Getting Prepared

    A few days ago, the UK’s Premier League asked a California federal court to issue a DMCA subpoena against Cloudflare. The application identifies 38 target pirate streaming sites , many of which utilize multiple domains. Since the platforms all use Cloudflare, the Premier League hopes that information held by the company will help to unmask the sites’ currently anonymous operators.

    Before filing an application under Section 512(h) of the DMCA, which allows copyright owners to obtain a subpoena and receive “information sufficient to identify an anonymous infringer,” applicants are first required to send DMCA takedown notices to the platform in question. The notices should identify the infringing content and state where the content can be found; in cases involving streaming sites, the right tools can prove helpful.

    Recreating the Toolkit

    The screenshot below shows a live match playing on a pirate streaming site. Culled from the Premier League’s application, it provides clues that allow us to start identifying the tools in use and the problems they’re likely to solve once combined with Open Source Intelligence ( OSINT ).

    At a basic level in this context, OSINT can be almost any information made available on the internet. The screenshot is our primary source; it will help us identify the tools to recreate the toolkit, which in turn will use other public information sources to satisfy the requirements of the application.

    M3U8 Sniffer

    m3u8sniffer In this example it appears that when the Premier League visited the website sporttuna.pro, they were redirected to sporttuna.website and then to sporttuna.xyz (boxed in red).

    Like most pirate sites, the ‘backend link’ or source of the stream (boxed in green) isn’t on public display. These links can be obtained in various ways but in this case, Chrome extension M3U8 Sniffer is the weapon of choice.

    M3U8 Sniffer m3u8sniffer-v1

    From the developer’s website: The extension intercepts visited web page’s network requests and identifies all m3u8 video stream URLs. When a m3u8 URL request is found, it is displayed in a box that overlays the visited web page (see images above) from which you can copy the m3u8 URL or play the video stream. Also, you can open the extension’s popup window to view the first and last m3u8 URLs found for each site, as well as to set a variety of extension options.

    M3U8 Sniffer is a free extension available from the Chrome Web Store. Further information is available from the developer at SnifferTV.com .

    Identifying the Remaining Tools

    Identifying the remaining tools was a little time-consuming but if we said the method was advanced or complicated, that would be a lie.

    We simply trawled through the browser evidence images and took screenshots of the toolbars. These contain the icons of the apps used to obtain the evidence.

    After extracting the toolbar icons we put those we recognized to the side, then identified the remainder using reverse image search tools. Straightforward options include Google Images and Google Lens .

    As an alternative, Chrome extension RevEye Reverse Image Search provides instant results from Google, Bing, Yandex, and TinEye.

    (Note: Bad extensions exist, trust nobody, check the source )

    Internet Download Manager

    idm Given that M3U8 Sniffer “does NOT provide functionality to download the actual video streams” another piece of software comes in handy. IDM is a popular choice in the niche and appears to be the downloader of choice in this particular toolkit.

    From the official website: When you click on a download link in a browser, IDM will take over the download and accelerate it. You don’t need to do anything special, just browse the Internet as you usually do. IDM will catch your downloads and accelerate them. IDM supports HTTP, FTP, HTTPS and MMS protocols.

    Unfortunately, IDM isn’t free but it is free to try via a 30-day trial . Some prefer JDownloader since the price is more predictable, but there are plenty of options in this niche.

    Fiddler

    fiddler2 Our best guess at identifying this next tool comes with a small caveat that its icon was almost impossibly blurred and even when fresh it’s still pretty basic. Ultimately, a green diamond and a single white ‘F’ works here.

    Fiddler and tools with similar functionality (web debugging proxy tools) are used extensively by developers and investigators when keeping a close eye on HTTP traffic is a must. For those who’ve never cared to take a closer look, it can be real eye-opener. Even the most innocuous websites can behave pretty badly until users notice, so there’s never a bad time to take a first look.

    Fiddler Classic and Fiddler Everywhere are both available as free trials, and the same is true for Charles Proxy which appears regularly as evidence in Indian site-blocking cases.

    Some prefer to monitor traffic with Wireshark but for others it can be too much. Open source and available on Linux, Windows (GUI), and macOS, MITM Proxy will scratch most itches for free.

    mitm-proxy

    At a pocket friendly price of $0.00, the open source MITM Proxy (man-in-the-middle) does exactly as its name suggests, making it a popular choice.

    Instant Datascraper

    insstant datascraper Scraping data from websites in a structured and usable format isn’t always easy and for big jobs, things can quickly descend into a time-wasting nightmare.

    Instant Data Scraper hopes to eliminate the frustrations often associated with scraping and with over a million users, people seem happy with the results.

    It’s impossible to say how the Premier League uses Instant Datascraper, but it could easily consume a visible members’ list in an instant or scrape a mountain of forum posts. The options are only limited by data becoming unavailable.

    From the official site: Instant Data Scraper is an automated data extraction tool for any website. It uses AI to predict which data is most relevant on a HTML page and allows saving it to Excel or CSV file (XLS, XLSX, CSV). This tool does not require website specific scripts, instead it uses heuristic AI analysis of HTML structure to detect data for extraction. This means that our scraping method works just as well with small and lesser known websites, as it does with global giants like Amazon. Also, our users do not need to have any coding, json or xml skills

    The software is free and available direct from webrobots.io and the Chrome Store .

    IPNetInfo | Investigator

    IPNetInfo describes itself a small utility that allows people to easily find all available information about an IP address. That includes the owner of the IP address and sundry other details. Hosted on Nirsoft.com and GitHub respectively, both also have a bit more to offer.

    Investigator is actually a collection of useful tools , one of which is bound to come in useful sooner or later. Developed by Nirsoft, IPNetInfo is surrounded by dozens of other useful free tools at Nirsoft.net so still worth a quick visit.

    Those with access to a Linux command line also have access to the best tools when investigating domains, IP addresses, and DNS. For Windows users or those who simply prefer the convenience of GUIs, the following perform well and look great too: Digger Tools , DNSViz , URLQuery , DMNSApp , URLScan , and WebCheck .

    Finally, a pair of outliers to consider.

    The End: Emulators

    emulators Given that there are Android emulators that are less elaborate, more predictable, and therefore better suited to the assumed job in hand, the discovery of two fairly elaborate emulators in the toolkit initially seems a little puzzling.

    There’s bound to be a good reason they’re installed but right now, those reasons will have to wait until another day.

    Of course, the answers to these questions and others like them, are always out there. ‘Out there’ is a very, very big place but the answers usually give themselves up quite quickly once curiosity arrives.

    From: TF , for the latest news on copyright battles, piracy and more.

    • To chevron_right

      Cloning Premier League’s Pirate Site DMCA Subpoena Toolkit

      news.movim.eu / TorrentFreak • 7 April 2025 • 6 minutes

    premier-os Most prevalent in the movie and TV show sectors, applications for DMCA subpoenas are regularly filed at courts in the United States.

    Aside from their intended purpose, DMCA subpoenas can provide useful clues about future anti-piracy strategies. When subpoenas are contested by intermediaries, subpoena applications sometimes become copyright cases in their own right. From a rightsholders’ perspective, in some cases they may be the only potential source of information yet to be exhausted.

    Getting Prepared

    A few days ago, the UK’s Premier League asked a California federal court to issue a DMCA subpoena against Cloudflare. The application identifies 38 target pirate streaming sites , many of which utilize multiple domains. Since the platforms all use Cloudflare, the Premier League hopes that information held by the company will help to unmask the sites’ currently anonymous operators.

    Before filing an application under Section 512(h) of the DMCA, which allows copyright owners to obtain a subpoena and receive “information sufficient to identify an anonymous infringer,” applicants are first required to send DMCA takedown notices to the platform in question. The notices should identify the infringing content and state where the content can be found; in cases involving streaming sites, the right tools can prove helpful.

    Recreating the Toolkit

    The screenshot below shows a live match playing on a pirate streaming site. Culled from the Premier League’s application, it provides clues that allow us to start identifying the tools in use and the problems they’re likely to solve once combined with Open Source Intelligence ( OSINT ).

    At a basic level in this context, OSINT can be almost any information made available on the internet. The screenshot is our primary source; it will help us identify the tools to recreate the toolkit, which in turn will use other public information sources to satisfy the requirements of the application.

    M3U8 Sniffer

    m3u8sniffer In this example it appears that when the Premier League visited the website sporttuna.pro, they were redirected to sporttuna.website and then to sporttuna.xyz (boxed in red).

    Like most pirate sites, the ‘backend link’ or source of the stream (boxed in green) isn’t on public display. These links can be obtained in various ways but in this case, Chrome extension M3U8 Sniffer is the weapon of choice.

    M3U8 Sniffer m3u8sniffer-v1

    From the developer’s website: The extension intercepts visited web page’s network requests and identifies all m3u8 video stream URLs. When a m3u8 URL request is found, it is displayed in a box that overlays the visited web page (see images above) from which you can copy the m3u8 URL or play the video stream. Also, you can open the extension’s popup window to view the first and last m3u8 URLs found for each site, as well as to set a variety of extension options.

    M3U8 Sniffer is a free extension available from the Chrome Web Store. Further information is available from the developer at SnifferTV.com .

    Identifying the Remaining Tools

    Identifying the remaining tools was a little time-consuming but if we said the method was advanced or complicated, that would be a lie.

    We simply trawled through the browser evidence images and took screenshots of the toolbars. These contain the icons of the apps used to obtain the evidence.

    After extracting the toolbar icons we put those we recognized to the side, then identified the remainder using reverse image search tools. Straightforward options include Google Images and Google Lens .

    As an alternative, Chrome extension RevEye Reverse Image Search provides instant results from Google, Bing, Yandex, and TinEye.

    (Note: Bad extensions exist, trust nobody, check the source )

    Internet Download Manager

    idm Given that M3U8 Sniffer “does NOT provide functionality to download the actual video streams” another piece of software comes in handy. IDM is a popular choice in the niche and appears to be the downloader of choice in this particular toolkit.

    From the official website: When you click on a download link in a browser, IDM will take over the download and accelerate it. You don’t need to do anything special, just browse the Internet as you usually do. IDM will catch your downloads and accelerate them. IDM supports HTTP, FTP, HTTPS and MMS protocols.

    Unfortunately, IDM isn’t free but it is free to try via a 30-day trial . Some prefer JDownloader since the price is more predictable, but there are plenty of options in this niche.

    Fiddler

    fiddler2 Our best guess at identifying this next tool comes with a small caveat that its icon was almost impossibly blurred and even when fresh it’s still pretty basic. Ultimately, a green diamond and a single white ‘F’ works here.

    Fiddler and tools with similar functionality (web debugging proxy tools) are used extensively by developers and investigators when keeping a close eye on HTTP traffic is a must. For those who’ve never cared to take a closer look, it can be real eye-opener. Even the most innocuous websites can behave pretty badly until users notice, so there’s never a bad time to take a first look.

    Fiddler Classic and Fiddler Everywhere are both available as free trials, and the same is true for Charles Proxy which appears regularly as evidence in Indian site-blocking cases.

    Some prefer to monitor traffic with Wireshark but for others it can be too much. Open source and available on Linux, Windows (GUI), and macOS, MITM Proxy will scratch most itches for free.

    mitm-proxy

    At a pocket friendly price of $0.00, the open source MITM Proxy (man-in-the-middle) does exactly as its name suggests, making it a popular choice.

    Instant Datascraper

    insstant datascraper Scraping data from websites in a structured and usable format isn’t always easy and for big jobs, things can quickly descend into a time-wasting nightmare.

    Instant Data Scraper hopes to eliminate the frustrations often associated with scraping and with over a million users, people seem happy with the results.

    It’s impossible to say how the Premier League uses Instant Datascraper, but it could easily consume a visible members’ list in an instant or scrape a mountain of forum posts. The options are only limited by data becoming unavailable.

    From the official site: Instant Data Scraper is an automated data extraction tool for any website. It uses AI to predict which data is most relevant on a HTML page and allows saving it to Excel or CSV file (XLS, XLSX, CSV). This tool does not require website specific scripts, instead it uses heuristic AI analysis of HTML structure to detect data for extraction. This means that our scraping method works just as well with small and lesser known websites, as it does with global giants like Amazon. Also, our users do not need to have any coding, json or xml skills

    The software is free and available direct from webrobots.io and the Chrome Store .

    IPNetInfo | Investigator

    IPNetInfo describes itself a small utility that allows people to easily find all available information about an IP address. That includes the owner of the IP address and sundry other details. Hosted on Nirsoft.com and GitHub respectively, both also have a bit more to offer.

    Investigator is actually a collection of useful tools , one of which is bound to come in useful sooner or later. Developed by Nirsoft, IPNetInfo is surrounded by dozens of other useful free tools at Nirsoft.net so still worth a quick visit.

    Those with access to a Linux command line also have access to the best tools when investigating domains, IP addresses, and DNS. For Windows users or those who simply prefer the convenience of GUIs, the following perform well and look great too: Digger Tools , DNSViz , URLQuery , DMNSApp , URLScan , and WebCheck .

    Finally, a pair of outliers to consider.

    The End: Emulators

    emulators Given that there are Android emulators that are less elaborate, more predictable, and therefore better suited to the assumed job in hand, the discovery of two fairly elaborate emulators in the toolkit initially seems a little puzzling.

    There’s bound to be a good reason they’re installed but right now, those reasons will have to wait until another day.

    Of course, the answers to these questions and others like them, are always out there. ‘Out there’ is a very, very big place but the answers usually give themselves up quite quickly once curiosity arrives.

    From: TF , for the latest news on copyright battles, piracy and more.