Sonarr and Radarr keep grabbing releases from a couple specific groups ( ‘SuccessfulCrab’ and ‘ELiTE’) for items that clearly haven’t even aired yet. These almost always contain only .scr or .lnk files, which have been blocklisted in my torrent client. This leaves Sonarr/Radarr awaiting manual intervention for ‘complete’ downloads that contain no files.
How do I get them to block anything and everything that contain the strings ‘SuccessfulCrab’ and ‘ELiTE’ ??? I want them to stop even trying to grab anything released by those two groups.
I’m so sick of dealing with these.
[EDIT]
OK, so I have been looking at this from the wrong angle.
It is not these groups that I’m upset with, but malware uploaders masquerading as release groups. These names can and will change, making this a game of wack-a-mole if I try to fight it this way.
Initially I’d followed instructions below to block these names/strings being grabbed by the arrs and that does work fantastically; but as above, wack-a-mole. Plus both SuccessfulCrab and ELiTE have plenty of good releases out there, it’s not their fault someone’s using their names.
So, I’m now running Cleanuparr.
This will maintain a large list of unwanted filetypes in qbittorrent. Then when qbit marks a torrent as complete because there are no wanted files, cleanupparr removes it from both qbit and the arr that requested it, while also triggering a new search for the item.
It can also cleanup items failing to import, stalled downloads, torrents stuck downloading metedata, or things that are just absurdly slow; with varying time scales/stringency.
I’ll run this for a bit and see how it goes.
Check out Cleanuparr! I started using it after seeing it recommended somewhere on Lemmy and haven’t seen these annoying downloads since. It also deals with stalled/slow/stuck-downloading-metadata torrents.
I’m taking a look at this. It looks like it’s the malware blocker portion that I’m interested in, but if I enable it and ‘delete known malware’, it just complains every minute that there are no blocklists enabled. (though the documents say it’s supposed to fetch one from a pages.dev url that has almost no content)
Do you have a specific malware blocklist configured? Enabling the specific service blocklists demands a url for one.
I can host/build a list over time for these to use if that’s what I’ve gotta do; just wondering if there’s a public collaboration on one already on the go.
/edit: found it
https://raw.githubusercontent.com/Cleanuparr/Cleanuparr/refs/heads/main/blacklist
Same here 🙌