The BitTorrent protocol is used to distribute a wide range of digital contents efficiently to millions of people across all continents. It is not unusual to find as many as 50 million worldwide users at a time participating in the sharing and downloading activities.

New contents both legitimate and illegal appear on BitTorrent networks every day. Users discover new contents often through Web-based torrent search engines and index sites that are commonly referred to as torrent sites. The torrent sites do not discriminate between public and infringed contents. These sites actually assist the visitors in the process of locating the actual digital contents by providing a small torrent file or a magnet link that has the hash information, the map to find where the contents are on the BitTorrent DHT (Distributed Hash Table) network.

Resources and tools provided from this website either avoid or overcome many technical and legal issues associated with searching for digital contents through the traditional torrent sites by accessing the BitTorrent DHT directly.

The goal of this site is to help visitors to get a general picture of the vast BitTorrent traffic network. The DHT network also provides a glimpse of the popular and latest contents peers are sharing. It works more or less like a special purpose search engine viewing the content queues of currently participating peers without having to crawl any torrent sites or relying on users to upload or download anything. It is possible to monitor specific peers over a period of time for downloading patterns and activities. It is also possible to discover new contents of interest by viewing related contents from peers having similar contents that a user is looking for.
Depending upon the time of day, when there are more than 100 million users, a list of more than 1 million torrents can be obtained in less than one day from only one typical Intel i5-class computer. This is achievable since there is no transfer of data files including torrent or metadata files.

Once the captured data from the DHT are stored in a local database, meaningful statistics can then be establised to view one or more of the following information:

1. The distribution of users worlwide (Top 50 countries).
2. The number of unique torrents.
3. List of popular torrents.
4. List of most active peers.
5. List of most recent torrents.

Why DHT network, Pros and cons
Another advantage is that he no longer has to scrape torrents from external sites. Instead, he crawls the open DHT network for new content and adds this to his existing search index. Discover new contents by viewing what other peers are currently downloading (Related contents) Peers->Additional peers->Additional contents Monitor downloading activities from a specific peers (where the address come from) Establish the necessary profiles to monitor new contents of interested/related (need to find out how related contents work) 1. Do not have to rely on torrent index sites. If the torrent sites are temporarily unavailable or even disappear, the torrents are still active and available on DHT network.
2. If your address is anonymous (VPN-based, proxy-based), you will not be penalized to access the network via standard or extended Bit Torrent protocol. Membership sites can limit and ban trouble peers. Peers that has a very imbalanced ratio of seeding vs. leeching.
3. Full access to DHT without having to logging in.
4. Torrent sites may not have the particular torrent or category you are looking for.
5. The number of seeders and leechers reported by the torrent sites may not be up to date or even valid depending upon the current DHT network traffic.
6. Torrent sites show the most popular torrents and trends in a certain time frame but these may not be what you are interested in.
7. With extended BitTorrent protocol, DHT enables any participating peer without having to download or share anything to look at the torrent queue of a specific peer (IP address).
8. With DHT, the most popular trends can be established quickly by looking for the hash that has the most number of unique peers and leechers. Because of this feature it is possible to monitor the sharing activities of a specific peer.