I thought there were logs to trace all that stuff.
I’ve always wondered about how that works, tho, given that non-static IP addresses get recycled every 8 hours or so. That’s gotta make it way more difficult to track it down.
But that just gets you to a CPE (Customer Premises Equipment). Which may or may not be a wireless router, and if it is, may or may not be secured.
Do a war drive and look for 'linksys' as wireless router names. There are LOTS of unsecured wireless routers out there.
Stand everything on it's head and be a bad guy. You want to get X off of the internet, and you don't want it tracked back to you.
Get a laptop without a Broadcom wifi card. Tinker with the MAC on the card to make it not yours. Software only, so if checked after turning it off, it shows up as your normal MAC.
Then, go trolling for 5 or 10 unsecured wireless networks nearby. When you find them, write a script to share them in the time domain.
You have to make sure you don't drop state for the protocol and application, but it's very doable.
The only people that get cold busted are the idiots, or the truly malevolent that require megabucks to track. Everybody in between, not so much.
/johnny