MEMORANDUM OPINION AND ORDER
JAMES F. HOLDERMAN, Chief Judge:These six cases were consolidated for the purpose of this court ruling on a motion to compel that is based on nearly identical circumstances in each case. (Dkt. No. 9.)1 The subpoenas, which arose during discovery in four separate underlying cases, two pending in the Eastern District of California, one in the Eastern District of Virginia, and one in the Southern District of Texas,2 seek information from two internet service providers, Comcast Cable Communications, LLC (“Comcast”) and Cequel III Communications II, LLC d/b/a Cebridge Connections and Suddenlink Communications (“Suddenlink”) (collectively “the ISPs”). (Dkt. No. 12, Ex. A.) The ISPs objected to the subpoenas (Dkt. No. 12, Ex. C), and the plaintiffs filed a motion to compel compliance (Dkt. No. 12). For the reasons stated below, the motion to compel is granted in part and denied in part. In addition, Comcast filed a motion to consol*192idate two additional eases with this case. (Dkt. No. 18.) That motion is denied without prejudice.
BACKGROUND
The plaintiffs in each of the six cases are producers of pornographic videos.3 In each case, the plaintiffs allege that the John Doe defendants illegally reproduced and distributed a pornographic video in violation of the plaintiffs’ copyright.4 The defendants accessed the videos in each case from their computers through the use of a BitTorrent file sharing protocol. One other district court has previously explained that a Bit Torrent file sharing protocol is a decentralized method of distributing data on peer-to-peer (“P2P”) file sharing networks:
Since its release approximately 10 years ago, BitTorrent has allowed users to share files anonymously with other users. Instead of relying on a central server to distribute data directly to individual users, the BitTorrent protocol allows individual users to distribute data amo[ng] themselves by exchanging pieces of the file with each other to eventually obtain a whole copy of the file. When using the BitTor-rent protocol, every user simultaneously receives information from and transfers information to one another. In the BitTor-rent vernacular, individual download-ers/distributors of a particular file are called “peers.” The group of peers involved in downloading/distributing a particular file is called a “swarm.” A server which stores a list of peers in a swarm is called a “tracker.” A computer program that implements the BitTorrent protocol is called a BitTorrent “client.”
The BitTorrent protocol operates as follows. First, a user locates a small “torrent” file. This file contains information about the files to be shared and about the tracker, the computer that coordinates the file distribution. Second, the user loads the torrent file into a BitTorrent client, which automatically attempts to connect to the tracker listed in the torrent file. Third, the tracker responds with a list of peers and the BitTorrent client connects to those peers to begin downloading data from and distributing data to the other peers in the swarm. When the download is complete, the BitTorrent client continues distributing data to the peers in the swarm until the user manually disconnects [from] the swarm or the BitTorrent client otherwise does the same.5
Because the BitTorrent system allows each individual user to share information anonymously, the plaintiffs do not know the identity of each alleged defendant at this time. Instead, the plaintiffs have identified only a series of Internet Protocol (“IP”) addresses assigned to computers that accessed the copyrighted material, along with the date and time of each computer user’s alleged unlawful activity. In each case, the plaintiffs filed a motion for early discovery seeking leave to subpoena the ISPs to obtain the identifying information for each IP address. The respective courts in each case granted plaintiffs leave to subpoena the ISPs, (Dkt. No. 12, Ex. B), and the plaintiffs issued Federal Rule of Civil Procedure 45 subpoenas to each ISP calling for production at the office of the plaintiffs’ law firm in Chicago. (Dkt. No. 12, Ex. A.) Accordingly, the subpoenas were issued from this court, as required by Fed. *193R.Civ.P. 45(a)(2)(C) (requiring that the subpoena must issue “from the court for the district where the production ... is to be made”).
LEGAL STANDARD
Under Rule 45(c)(3), the court must quash or modify a subpoena to a non-party witness that “subjects a person to undue burden.” Fed.R.Civ.P. 45(c)(3)(A)(iv). When determining if a burden is undue, the court must ask whether “the burden of compliance with [the subpoena] would exceed the benefit of production of the material sought by it.” Nw. Mem’l Hosp. v. Ashcroft, 362 F.3d 923, 927 (7th Cir.2004). When making that inquiry, the court should consider “ ‘the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the litigation, and the importance of the proposed discovery in resolving the issues.’” Williams v. Blagojevich, No. 05 C 4673, 2008 WL 68680, at *3 (N.D.Ill. Jan. 2, 2008) (quoting Simon Prop. Grp. L.P. v. mySimon, Inc., 194 F.R.D. 639, 640 (S.D.Ind.2000) (Hamilton, J.)). “The party opposing discovery has the burden of showing the discovery is overly broad, unduly burdensome, or not relevant.” Id. (citation omitted).
ANALYSIS
Copyright owners have used “John Doe” suits against unidentified defendants as a means of enforcing their copyrights in digital material for nearly a decade. See Ronald N. Weikers, Data Security and Privacy Law § 9:133 (rev. 2011).6 Throughout the 2000s, for example, the music recording industry filed well over 10,000 John Doe lawsuits. Id. More recently, various movie studios have adopted the tactic in an effort to identify copyright infringers. See, e.g., Voltage Pictures, LLC v. Does 1-5,000, No. 10 C 873, 2011 WL 1807438, at *1 (D.D.C. May 12, 2011). Producers of pornographic movies have been particularly aggressive on this front. The lawyers representing the plaintiffs in these pending cases have to date filed at least 118 such lawsuits against over 15,000 John Does in the last year and a half alone. See Decl. of Charles E. Piehl and Exhibit A, AF Holdings, LLC, v. Does 1-135, No. 11 C 3336 (N.D.Cal. Feb. 22, 2012), ECF Nos. 43, 43-1 (providing a list of cases filed by plaintiffs’ law firm as of February 24, 2012).
Another court has described the common arc of the plaintiffs’ litigating tactics in those cases:
(1) a plaintiff sues anywhere from a few to thousands of Doe defendants for copyright infringement in one action; (2) the plaintiff seeks leave to take early discovery; (3) once the plaintiff obtains the identities of the IP subscribers through early discovery, it serves the subscribers with a settlement demand; (4) the subscribers, often embarrassed about the prospect of being named in a suit involving pornographic movies, settle. Thus, these mass copyright infringement eases have emerged as a strong tool for leveraging settlements—a tool whose efficiency is largely derived from the plaintiffs’ success in avoiding the filing fees for multiple suits and gaining early access en masse to the identities of alleged infringers.
MCGIP, LLC v. Does 1-149, No. 11 C 2331, 2011 WL 4352110, at *4 n. 5 (N.D.Cal. Sept. 16, 2011). The Doe defendants, of course, are not without recourse, as the ISPs often must notify them and give them a chance to object to the subpoenas before the ISPs divulge their identity. See 47 U.S.C. § 551(e)(2)(B) (providing that ISPs who qual*194ify as “cable providers” may not divulge personally identifiable information of a subscriber in response to a court order unless “the subscriber is notified of such order by the person to whom the order is directed”).
Many Doe defendants have appeared in various actions, raising two arguments that the subpoenas should be quashed. See, e.g., First Time Videos, LLC v. Does 1-76, 276 F.R.D. 254, 255 (N.D.Ill.2011). First, the Doe defendants who reside outside the judicial district in which the action was brought contend that they are not subject to personal jurisdiction of the court. Second, the Doe defendants contend that joinder of the defendants is improper under Federal Rule of Civil Procedure 20(a)(2). Some courts have rejected those arguments,7 but others have increasingly accepted them and severed the defendants or quashed the subpoenas.8
In the face of this stiffening judicial headwind, the plaintiffs here have adopted a new tactic to avoid the personal jurisdiction and joinder issues. In three of the underlying cases which prompted the subpoenas at issue here, the plaintiffs have sued only a single defendant who is connected to an IP address located in the district in which the plaintiffs brought suit, but are seeking in those single defendant cases discovery about other IP addresses belonging to computer users who are not joined as defendants.9 In the remaining underlying case, the plaintiffs have sued thirty-seven defendants, all of whom are connected to an IP address located in the jurisdiction in which the plaintiffs brought suit, and are seeking discovery only about IP addresses belonging to people joined as defendants.10 The court will address the subpoenas with respect to each type of case in turn.
I. Subpoenas Seeking Information about Non-Party IP Addresses: Cases 12 C 1080, 12 C 1083, 12 C 1085, 12 C 1086, and 12 C 1088
The ISPs contend that they “should not be subject to the burden—undue or otherwise— of providing the requested information that ultimately will not even be useful in the Underlying Actions.” (Dkt. No. 13, at 6.) The court agrees that the identity of individuals connected with nonparty IP addresses is not relevant to the pending claims.
Discovery is appropriate if the information sought is relevant, which means that it is “reasonably calculated to lead to the discovery of admissible evidence.” Fed.R.Civ.P. 26(b)(1); see also Williams, 2008 WL 68680, at *3 (“The scope of material obtainable by a Rule 45 subpoena is as broad as permitted under the discovery rules.... ” *195(citations omitted)). The plaintiffs attempt to justify the scope of the subpoenas in the single defendant cases by alleging in their complaints the existence of additional IP addresses representing “co-conspirators” who conspired to infringe the plaintiffs’ copyright by downloading the same file through the BitTorrent system. The plaintiffs have stated that, after discovery of the identity connected to each IP address, they intend “to seek leave of the Court to amend this complaint to join John Doe’s co-conspirators as defendants in this action pursuant to Fed. R.Civ.P. 20(a)(2).”11 The plaintiffs’ contention, in essence, is that identities of the non-parties associated with the IP addresses will be relevant to claims against future defendants who have not yet been sued. By that device, the plaintiffs can avoid all personal jurisdiction and joinder hurdles, and yet obtain the identifying information connected with hundreds of IP addresses located all over the country through a single lawsuit.12
To have relevance to the actions currently pending, however, the requested discovery must bear on the civil conspiracy and copyright claims against the current John Doe defendants. In light of the structure of the BitTorrent system, subpoenas seeking the identity of users of non-party IP addresses are not reasonably calculated to lead to the discovery of evidence relevant to the pending claims. BitTorrent users remain anonymous to other BitTorrent users, and have no connection to them beyond the mere fact that they downloaded the same file.13 It is therefore not a reasonable calculation that the individuals connected to the subpoenaed IP addresses will have any discoverable information related to the current defendants.
Moreover, it appears that the claims of civil conspiracy themselves are unfounded, because the plaintiffs have not pleaded the existence of an agreement among the alleged conspirators. See Hard Drive Prods., Inc. v. Does 1-55, No. 11 C 2798, 2011 WL 4889094, at *5 (N.D.Ill. Oct. 12, 2011) (Darrah, J.) (“Hard Drive’s conspiracy claim fails because it has not pled the existence of an agreement among Does 1-55 to commit copyright infringement.”). Additionally, based on what has been pleaded, it does not appear plausible that plaintiffs could plead the existence of a conspiracy. Consequently, the court finds that the complaints’ allegations of civil conspiracy are only unjustified attempts to bolster the obtaining of irrelevant discovery about non-parties.
It is thus plain that the plaintiffs are not seeking information about the non-party IP addresses for the purpose of litigating their current claims. Instead, the plaintiffs intend to either sue the individuals whose identity they uncover or, more likely, to negotiate a settlement with those individuals. When evaluating relevancy, “a court is not required to blind itself to the purpose for which a party seeks information.” Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340, 353, 98 S.Ct. 2380, 57 L.Ed.2d 253 (1978). Thus, “when the purpose of a discovery request is to gather information for use in proceedings other than the pending suit, dis*196covery properly is denied.” Id. That is precisely the situation here.
The court notes that denying discovery about non-party IP addresses will not leave the plaintiffs without a remedy to uncover the identity of these and other purported copyright infringers. The plaintiffs need merely sue each IP address in the district in which the address is located,14 and then subpoena the ISPs for identifying information pertaining to that IP address. What the plaintiffs may not do, however, is improperly use court processes15 by attempting to gain information about hundreds of IP addresses located all over the country in a single action, especially when many of those addresses fall outside of the court’s jurisdiction. Accordingly, the motion to compel is denied with respect to the all of the subpoenas in which the plaintiffs are seeking the identity associated with non-party IP addresses.
II. The Subpoena Seeking Information about a Defendant IP Address: Case 12 C 1057
The remaining subpoena, in Pacific Century International, Ltd. v. John Does 1-37, No. 12 C 1057, seeks the identity of only a single Doe defendant from Suddenlink. There are no relevancy concerns related to that subpoena, because the IP address about which the plaintiffs are seeking information is already a defendant. Moreover, the defendant IP address is subject to the personal jurisdiction of the Southern District of Texas, where the suit was brought. See Complaint ¶ 6, Pac. Century Int’l Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex. Dec. 16, 2011).
The joinder issue is still relevant, however, because the underlying case was brought against thirty-seven Doe defendants. The ISPs cite several BitTorrent copyright cases in this district and elsewhere in which courts have severed all but one defendant after finding joinder of multiple Does improper. None of the cases is on point, however. Most of the cases addressed the joinder issue after one or more of the Doe defendants objected to the subpoena.16 In the rest, the court severed the defendants when the plaintiff moved for expedited discovery, before any subpoenas had been issued or discovery approved.17 None of the cases was decided following an objection to a subpoena by an ISP after discovery had already been authorized by the court hearing the underlying case.
The court recognizes the burden on ISPs caused by such subpoenas when joinder is potentially improper, particularly in cases in which the plaintiff seeks the identity of hundreds of Doe defendants. Even though any one subpoena may impose a relatively modest burden, over time the burden on the ISPs of multiple subpoenas may be substantial. See Deck of Charles E. Piehl & Ex. A, AF Holdings, LLC, v. Does 1-135, No. 11 C 3336 (N.D.Cal. Feb. 22, 2012), EOF Nos. 43, 43-1 (noting that the plaintiffs’ lawyers have sub*197poenaed information relating to 15,000 IP addresses in the last year and a half). Moreover, it is difficult for the ISPs to object before the approval of early discovery, given that they likely will not learn of such eases until they are served with a subpoena.
Nonetheless, the court will grant the motion to compel in Case 12 C 1057 for three reasons. First, this court is hesitant to make a ruling that could be interpreted as contrary to the earlier ruling of the Southern District of Texas, which approved early discovery, including the issuance of a subpoena to Sud-denlink, despite the potential joinder issues. (Dkt. No. 2, Ex. B.) Second, the subpoena requires Suddenlink to contact the individual associated with the IP address and provide him or her an opportunity to object to the subpoena. {Id.) Accordingly, the Doe defendant will have the opportunity to object on the ground of improper joinder before his or her identity is provided in response to the subpoena. Third, the subpoena seeks the identity of only a single IP address out of the thirty-seven joined as defendants. In that situation, the burden on Suddenlink appears minimal, as compared to a situation in which the subpoena seeks information about many IP addresses.
The ISPs also raise one additional issue with respect to the subpoena in Case 12 C 1057. The ISPs contend that the subpoena should be quashed because the plaintiff in Case 12 C 1057 has not stated a prima facie case of copyright infringement. Under the Copyright Act, “no civil action for infringement of the copyright in any United States work shall be instituted until preregistration or registration of the copyright claim has been made in accordance with this title.” 17 U.S.C. § 411(a). Here, the plaintiff alleges that it has submitted a registration application, but the application has not yet been approved by the U.S. Copyright Office. See Complaint ¶ 25, Pac. Century Int'l Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex. Dec. 16, 2011).
Circuits are split over whether submitting an application satisfies § 411(a), even in the absence of approval of the application. See Brooks-Ngwenya v. Indianapolis Pub. Schs., 564 F.3d 804, 806 (7th Cir.2009). In the Fifth Circuit, where the underlying complaint was filed, merely filing an application is sufficient. See Apple Barrel Prods., Inc. v. R.D. Beard, 730 F.2d 384, 386-87 (5th Cir. 1984); see also Chi. Bd. of Educ. v. Substance, Inc., 354 F.3d 624, 631 (7th Cir.2003) (“[A]n application for registration must be filed before the copyright can be sued upon.”). Applying the application approach, the plaintiff has sufficiently pleaded a claim of copyright infringement to support enforcement of the subpoena.
Accordingly, the court will grant the motion to compel in Case 12 C 1057 only. Sud-denlink will have 70 days to comply with the subpoena from the date of this order, giving it time to comply with its obligation to notify the subscriber whose identity was subpoenaed and to give him or her an opportunity to object. (Dkt. No. 2, Ex. B.)
III. Motion to Consolidate Two Additional Cases
Finally, Comcast has filed a motion to consolidate two additional eases with this ease (Dkt. No. 18 (seeking consolidation of Pacific Century International, Ltd. v. Does 1-25, No. 12 C 1535 (N.D.Ill) and Hard Drive Productions, Inc. v. Does 1-54, No. 12 C 1532 (N.D.Ill)).) Both of those cases originated in this district. Moreover, the court in both cases has granted the plaintiffs leave to serve early discovery on the ISPs to obtain identifying information of IP addresses. No motion to quash or motion to compel has yet been filed in either of the cases, however, so the motion to consolidate is denied at this time. Should a motion to compel or a motion to quash be filed in those eases, the court will entertain a motion to consolidate that motion only before this court, while leaving the underlying actions assigned to the judges to whom they are currently assigned.
CONCLUSION
For the reasons listed above, the plaintiffs’ motion to compel is granted in part and denied in part. (Dkt. No. 12). The subpoenas in Cases 12 C 1080,12 C 1083,12 C 1085, 12 C 1086, and 12 C 1088 are quashed. Suddenlink shall comply with the subpoena *198in Case 12 C 1057 within 70 days of the date of this order. Comcast’s motion to consolidate (Dkt. No. 18) is denied without prejudice.
MEMORANDUM OPINION AND ORDER
These six cases were consolidated for the purpose of this court ruling on a motion to compel information about anonymous internet users identified only by their IP addresses that the plaintiffs subpoenaed from two internet service providers, Comcast Cable Communications, LLC (“Comcast”) and Ce-quel III Communications II, LLC, d/b/a Ce-bridge Communications and Suddenlink Communications (“Suddenlink”) (collectively “the ISPs”). (Dkt. No. 9.) On March 30, 2012, the court granted in part and denied in part the plaintiffs’ motion to compel. (Dkt. No. 22.)
Pending before the court is the plaintiffs’ motion to alter or amend the judgment under Fed.R.Civ.P. 59(e). (Dkt. No. 25.) For the reasons explained below, that motion is denied.
BACKGROUND
The plaintiffs in each of the six cases are producers of pornographic videos.1 In each case, the plaintiffs allege that the John Doe defendants illegally reproduced and distributed a pornographic video in violation of the plaintiffs’ copyright.2 The defendants accessed the videos in each ease from their computers through the use of a BitTorrent file sharing protocol. One other district court has previously explained that a BitTor-rent file sharing protocol is a decentralized method of distributing data on peer-to-peer (“P2P”) file sharing networks:
Since its release approximately 10 years ago, BitTorrent has allowed users to share files anonymously with other users. Instead of relying on a central server to distribute data directly to individual users, the BitTorrent protocol allows individual users to distribute data amo[ng] themselves by exchanging pieces of the file with each other to eventually obtain a whole copy of the file. When using the BitTor-rent protocol, every user simultaneously receives information from and transfers information to one another. In the BitTor-rent vernacular, individual download-ers/distributors of a particular file are called “peers.” The group of peers involved in downloading/distributing a particular file is called a “swarm.” A server which stores a list of peers in a swarm is called a “tracker.” A computer program that implements the BitTorrent protocol is called a BitTorrent “client.”
The BitTorrent protocol operates as follows. First, a user locates a small “torrent” file. This file contains information about the files to be shared and about the tracker, the computer that coordinates the file distribution. Second, the user loads the torrent file into a BitTorrent client, which automatically attempts to connect to the tracker listed in the torrent file. Third, the tracker responds with a list of peers and the BitTorrent client connects to those peers to begin downloading data from and distributing data to the other peers in the swarm. When the download is complete, the BitTorrent client continues distributing data to the peers in the swarm until the user manually disconnects [from] the swarm or the BitTorrent client otherwise does the same.3
*199Because the BitTorrent system allows each individual user to share information anonymously, the plaintiffs filed their suits without knowing the identity of the defendants. Instead, the plaintiffs identified only a series of Internet Protocol (“IP”) addresses assigned to computers that accessed the copyrighted material, along with the date and time of each computer user’s alleged unlawful activity. In each ease, the plaintiffs filed a motion for early discovery seeking leave to subpoena the ISPs to obtain the identifying information for each IP address. The respective courts in each case granted plaintiffs leave to subpoena the ISPs, (Dkt. No. 12, Ex. B), and the plaintiffs issued Federal Rule of Civil Procedure 45 subpoenas to each ISP calling for production at the office of the plaintiffs’ law firm in Chicago. (Dkt. No. 12, Ex. A.) Accordingly, the subpoenas were issued from this court, and the plaintiffs moved to compel production from the ISPs.
The court granted the motion to compel with respect to Case 12 C 1057. The court denied the motion to compel and quashed the subpoenas in the other five cases because those subpoenas sought information about IP addresses connected to individuals who were not parties in the underlying cases. (Dkt. No. 23, at 11.) The court held that producing any information about nonparties placed an undue burden on the ISPs, because information about non-parties was irrelevant to the plaintiffs’ civil conspiracy and copyright claims. {Id. at 8-11.) Consequently, it was “plain that the plaintiffs are not seeking information about the non-party IP addresses for the purpose of litigating their current claims.” {Id. at 10.)
LEGAL STANDARD
“[A] Rule 59(e) motion will be granted only in the case of a manifest error of law or fact, or newly discovered evidence.” Abcarian v. McDonald, 617 F.3d 931, 943 (7th Cir.2010). A manifest error of law is demonstrated by a court’s “wholesale disregard, misapplication, or failure to recognize controlling precedent.” Oto v. Metropolitan Life Ins. Co., 224 F.3d 601, 606 (7th Cir. 2000).
ANALYSIS
The plaintiffs ask the court to alter or amend the judgment in three respects. The court will address each in turn.
I. Discovery of Identity of Doe Defendants
First, the plaintiffs point out that in two of the underlying cases, the defendant John Doe is a subscriber of Comcast with an IP address among those subpoenaed by the plaintiffs. They therefore ask that the judgment be altered to order the ISPs to turn over information about those two IP addresses.
The plaintiffs are correct that the identities connected with the IP addresses of two defendants were subpoenaed from Comcast. See Amended Complaint [Dkt. No. 6, Ex. A], Pac. Century Int’l, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal. Jan. 5, 2012) (IP address 76.114.33.61); Amended Complaint [Dkt. No. 6, Ex. A], Hard Drive Prods., Inc. v. Unknown, No. 11 C 3476 (E.D.Cal. Jan. 5, 2012) (IP address 67.172.174.86). They are also correct that information connected to those two addresses is discoverable under the rules articulated in the court’s order of March 30. (Dkt. No. 23.) Nonetheless, the court correctly quashed the subpoenas seeking information about those two addresses because those subpoenas also requested information about non-party IP addresses. {Id. at 11.) If the plaintiffs issue additional subpoenas seeking information from only party IP addresses, they can be enforced under the court’s order (assuming they are otherwise enforceable under law).
II. The Propriety of Addressing the Issue of Relevance
Second, the plaintiffs contend that the court improperly raised the issue of the relevance of the requested discovery sua sponte, and that the ISPs waived any relevance objection by not mentioning it in their brief on the motion to compel. (Dkt. No. 13.) The issue of relevance was, however, properly presented to the court. The ISPs’ response *200to the motion to compel plainly contended that the requested discovery imposed an undue burden on them. (See, e.g., id. at 4 (“Given the apparent and expected abuse of the discovery process, these procedural anomalies, and inherent substantive defects in the Underlying Actions ... Comcast and Suddenlink [would] be unduly burdened by having to comply with the Subpoenas----”); id. at 5 (“When a motion to compel compliance with a subpoena is filed against a non-party, Fed.R.Civ.P. 45 requires a court to quash or modify a subpoena if that subpoena subjects a person to undue burden. Fed. R.Civ.P. 45(c)(3)(A)(iv).”); id. at 11 (“Com-cast and Suddenlink ... are seeking to avoid the undue burden of complying with Subpoenas that were issued without regard to proper procedure.”); id. at 15 (“Given this defect, Comcast and Suddenlink would be unduly burdened by having to comply with the Subpoenas.”).)
Any inquiry into whether a burden is undue requires a court to assess the benefit of the information to the requesting party, and thus the relevance of the subpoenaed information to the underlying case. Cf. Deitch-man v. E.R. Squibb & Sons, Inc., 740 F.2d 556, 559 (7th Cir.1984) (“When protection from a deposition subpoena is sought, the court must apply a balancing test to determine whether the need of the party seeking disclosure outweighs the adverse effect such disclosure would have on the policies underlying the [claimed] privilege.” (alteration in original) (quotation marks and citation omitted)). The ISPs noted that rule in their briefing. (Dkt. No. 13, at 5 (“To determine the existence of undue burden, this Court compares the burden of compliance with the benefit of production of the material sought.” (citing Nw. Mem’l Hosp. v. Ashcroft, 362 F.3d 923, 927 (7th Cir.2004))).) They then argued that the burden on them was undue because the information was not relevant to the underlying actions. (Dkt. No. 13, at 6 (“Comcast and Suddenlink should not be subject to the burden—undue or otherwise—of providing the requested information that ultimately will not even be useful in the Underlying Actions.”).)
To be sure, the ISPs did not focus on the irrelevance of the requested information as much as on their other arguments regarding improper joinder and the lack of personal jurisdiction. Nonetheless, they did raise the issue in their brief, and the plaintiffs had ample opportunity to present their position on the issue in their reply brief. (Dkt. No. 16.) Thus, the court committed no manifest error of law or fact when it properly addressed the relevance of the requested information in its ruling.
The plaintiffs also contend that the court should not have ruled on relevance because the courts in the underlying actions have already ruled that discovery of information related to the nonparty IP addresses was appropriate in each case. (Dkt. No. 25, at 5.) The ISPs, however, were not a party to the proceedings in the underlying actions and had no chance to object. Moreover, the courts in those cases were addressing only the question of whether the requested information was relevant at all. That question is fundamentally different from the question facing this court—whether the requested information was relevant enough to justify on balance a decision to impose the burden of information production on the subpoenaed non-party ISPs. Accordingly, there is no conflict between this court’s ruling and the decisions of the courts in the underlying actions.
III. The Plaintiffs’ Contributory Infringement Claim
Third, the plaintiffs contend that the court’s order failed to consider the relevance of the requested discovery to the plaintiffs’ claims of contributory infringement. Specifically, the plaintiffs argue that to show that the Doe defendants committed contributory infringement, the plaintiffs must first show that the individuals connected to the non-party IP addresses directly infringed the plaintiffs’ copyrights. See Cable/Home Commc’n Corp. v. Network Prods., Inc., 902 F.2d 829, 845 (11th Cir.1990). Discovery of the identity connected to the non-party IP addresses, the plaintiffs argue, is necessary to make that showing, and thus relevant to the plaintiffs’ claim against the Doe defendants.
*201In response, the ISPs contend that, at this point in the litigation, the only information the plaintiffs have alleged about the Doe defendants’ infringing activity is a single date and time during which the IP addresses associated with the defendants were engaged in allegedly infringing activity. (Dkt. No. 29, at 8.) It is possible that each Doe defendant was present in the BitTorrent swarm, making copyrighted material available for others to download, for a period considerably longer than that single moment. (See Dkt. No. 30, at 6.) Nonetheless, at this stage, during early discovery, there are no allegations indicating how long the Doe defendants were present in the swarm.
Until the plaintiffs have that information (which will be available after the identity of the Doe defendants is ascertained and the parties proceed with regularly scheduled discovery), any early discovery about non-party IP addresses imposes an undue burden on the subpoenaed ISPs. Without any knowledge about the defendants’ participation in the swarm, the plaintiffs now are merely speculating that the hundreds of IP addresses about which they seek information participated in the same swarm as the defendant. After learning the period during which the respective Doe defendants were engaged in the swarm, by contrast, the plaintiffs can seek information about only IP addresses who were present in the same swarm and whose infringement the Doe defendants may actually have contributed to, likely a much smaller number. Accordingly, waiting until a later stage to allow this discovery will diminish the burden on the ISPs.
In addition, because the plaintiffs are able to learn the identity connected to the IP addresses listed as defendants, they do not need the information about the non-parties to proceed. See First Time Videos, LLC v. Doe, No. CIV S-12-621, 2012 WL 1355725, at *4 (E.D.Cal. Apr. 18, 2012) (“Therefore, because plaintiff does not need expedited discovery regarding the alleged co-conspirators in order to proceed with this case, that “need” does not outweigh the prejudice to the ISPs, which would necessarily incur some burden (albeit minimal) in responding to the subpoenas.”). The plaintiffs’ need for the discovery is therefore diminished.4
Finally, despite the plaintiffs’ assurances, the court is still not convinced that the plaintiffs are seeking discovery about the non-parties for use in the underlying litigation against the Doe defendants. As the court explained in its March 30 order, it appears that the plaintiffs’ goal is instead “to either sue the individuals whose identity they uncover or, more likely, to negotiate a settlement with those individuals.” (Dkt. No. 23, at 10.) Denying early discovery of the non-party IP addresses will ensure that the plaintiffs intend to continue with their claims against the named defendants before imposing the burden on the ISPs of producing the identifying information of non-parties.
CONCLUSION
For the reasons explained above, the plaintiffs’ motion to alter or amend the judgment (Dkt. No. 25) is denied.
. All docket numbers refer to docket entries in the lead case, Pacific Century International, Ltd. v. John Does 1-37, No. 12 C 1057.
. Pac. Century Int’l, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal.); Hard Drive Prods., Inc. v. Unknown, No. 11 C 3476 (E.D.Cal.); First Time Videos, LLC v. John Doe, No. 11 C 690 (E.D.Va.); Pac. Century Int’l Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex.).
. The facts are drawn from the operative complaint in the four cases underlying the six subpoenas. See Amended Complaint [Dkt. No. 6], Pac. Century Int’l, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal. Jan. 5, 2012); Amended Complaint [Dkt. No. 6], Hard Drive Prods., Inc. v. Unknown, No. 11 C 3476 (E.D.Cal. Jan. 5, 2012); Amended Complaint [Dkt. No. 3], First Time Videos, LLC v. John Doe, No. 11 C 690 (E.D.Va. Jan. 4, 2012); Complaint [Dkt. No. 1], Pac. Century Int'l Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex. Dec. 16, 2011).
. In Pacific Century International Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex.) and Pacific Century International, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal.), the video at issue is entitled "Amateur Creampies—Laney Boggs." In Hard Drive Productions, Inc. v. Unknown, No. 11 C 3476 (E.D.Cal.), the video is entitled "Amateur Allure—Dylan.” In First Time Videos, LLC v. John Doe, No. 11 C 690 (E.D.Va.), the video is entitled "FTV—Tiffany.”
. MCGIP, LLC v. Does 1-30, No. 11 C 3680, 2011 WL 3501720, at *1 (N.D.Cal. Aug. 10, 2011) (quoting Diabolic Video Prods., Inc. v. Does 1-2099, No. 10 C 5865, 2011 WL 3100404, at *1 (N.D.Cal. May 31, 2011)).
. Prior to 2003, copyright owners primarily identified infringers by using a provision of the Digital Millennium Copyright Act ("DMCA”), 17 U.S.C. § 512(h)(1), which allows copyright owners to issue subpoenas to ISPs to identify the IP addresses of alleged infringers even before filing suit. Id. In 2003, the D.C. Circuit held that the DMCA’s provision applied only when an ISP "stor[es] the infringing material on its server” and not when an ISP acts “only as a conduit for data transferred between two internet users, such as ... sharing P2P files.” Recording Indus. Ass'n of Am., Inc. v. Verizon Internet Servs., Inc., 351 F.3d 1229, 1233-35 (D.C.Cir.2003); accord In re Charter Commc’ns, Inc., Subpoena Enforcement Matter, 393 F.3d 771 (8th Cir.2005); Interscope Records v. Does 1-7, 494 F.Supp.2d 388 (E.D.Va.2007). The DMCA's provision thus became inadequate for digital copyright owners attempting to identify users downloading copyrighted material on P2P networks.
. See, e.g., First Time Videos, 276 F.R.D. at 255 (Bucklo, J.) (holding that joinder is appropriate and the court has personal jurisdiction); First Time Videos, LLC v. Does 1-500, 276 F.R.D. 241, 251-52 (N.D.Ill.2011) (Castillo, J.) (denying motion to dismiss and motion to sever); MGCIP v. Does 1-316, No. 10 C 6677, 2011 WL 2292958 (N.D.Ill. June 9, 2011) (Kendall, J.) (denying motion to dismiss for lack of personal jurisdiction).
. See, e.g., Millenium TGA v. Doe, No. 10 C 5603, 2011 WL 7444064 (N.D.Ill. Sept. 26, 2011) (Manning, J.) (dismissing case for lack of personal jurisdiction and improper venue after previous order severing all other potential defendants); On the Cheap, LLC v. Does 1-5011, No. 10 C 4472, 2011 WL 4018258 (N.D.Cal. Sept. 6, 2011) (severing defendants); Digiprotect USA Corp. v. Does 1-266, No. 10 C 8759, 2011 WL 1466073 (S.D.N.Y. Apr. 13, 2011) (denying discovery of the identities of defendants whom plaintiff had not shown to be subject to the court's jurisdiction); Order, W. Coast Prods., Inc. v. Does, 1-2010, No. 10 C 0093 (N.D.W.V. Dec. 16, 2010) (severing defendants and allowing amended complaints only against individuals with IP addresses in West Virginia); CP Prods., Inc. v. Does 1-300, No. 10 C 6255, 2011 WL 737761, at *1 (N.D.Ill. Feb. 24, 2011) (Shadur, J.) ("[T]here is no justification for dragging into an Illinois federal court, on a wholesale basis, a host of unnamed defendants over whom personal jurisdiction clearly does not exist and—more importantly—as to whom [plaintiff’s] counsel could readily have ascertained that fact.”).
. Amended Complaint ¶ 6, Pac. Century Int'l, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal. Jan. 5, 2012); Amended Complaint ¶ 6, Hard Drive Prods., Inc. v. Unknown, No. 11 C 3476 (E.D.Cal. Jan. 5, 2012); Amended Complaint ¶ 6, First Time Videos, LLC v. John Doe, No. 11 C 690 (E.D.Va. Jan. 4, 2012); see also (PI.'s Reply 4-5 ("With respect to the [ISPs] joinder arguments, in three of the underlying actions Plaintiff named only a single putative defendant.... It is axiomatic to say that a single defendant cannot be misjoined with himself.” (citations omitted))).
. Complaint ¶ 6, Pac. Century Int’l Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex. Dec. 16, 2011).
. Amended Complaint ¶ 44, Pac. Century Int’l, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal. Jan. 5, 2012); accord Amended Complaint ¶ 44, Hard Drive Prods., Inc. v. Unknown, No. 11 C 3476 (E.D.Cal. Jan. 5, 2012) (making an identical statement); Amended Complaint ¶ 43, First Time Videos, LLC v. John Doe, No. 11 C 690 (E.D.Va. Jan. 4, 2012) (same).
. Of course, bringing suit against the additional defendants may not be necessary, because the plaintiffs can use the identifying information to leverage a settlement before ever actually suing. See Digiprotect USA Corp., 2011 WL 1466073, at *2 (“The court ... remains concerned!] that defendants over whom the court has no personal jurisdiction will simply settle with plaintiff rather [than] undertake the time and expense required to assert their rights.").
. It is true that, assuming the BitTorrent users were accessing the network at the same time, they may have downloaded and uploaded pieces of the same file from each other’s computers as part of the same swarm. See MCGIP, LLC, 2011 WL 3501720, at *1. Nonetheless, a BitTorrent user need not communicate with other users in any other way. Id. Indeed, a BitTorrent user will have no information about other users other than their IP addresses, the same information the plaintiffs already possess. Id.; cf. Hard Drive Prods., Inc. v. Does 1-188, 809 F.Supp.2d 1150, 1163 (N.D.Cal.2011) (”[E]ven if the IP addresses at issue ... all came from a single swarm, there is no evidence to suggest that each of the addresses 'acted in concert' with all of the others.”).
. As the parties both indicate, it is possible to uncover the location of any IP address through the use of free online tools, such as http://ip-address-lookup-v4.
. In addition to the procedural improprieties outlined above, the plaintiffs’ tactics deny the federal courts additional revenue from filing fees in the suits that should be filed to obtain the information the plaintiffs desire. CP Prods., 2011 WL 737761, at *1 ("No predicate has been shown for thus combining 300 separate actions on the cheap—if CP had sued the 300 claimed infringers separately for their discrete infringements, the filing fees alone would have aggregated $105,000 rather than $350.’’).
. See Written Opinion, Millennium TGA, Inc. v. Does 1-100, No. 10 C 5603 (N.D.Ill. Mar. 31, 2011) (Manning, J.); Minute Entry, Future Blue, Inc. v. Does 1-300, No. 10 C 6256 (N.D.Ill. June 8, 2011) (Conlon, J.); Written Opinion, Lightspeed Media Corp. v. Does 1-100, No. 10 C 5604 (N.D.Ill. Mar. 31, 2011) (Manning, J.); see also Hard Drive Prods., 809 F.Supp.2d at 1157; La-Face Records, LLC v. Does 1-38, No. 07 C 298, 2008 WL 544992 (E.D.N.C. Feb. 27, 2008).
. Hard Drive Prods., Inc. v. Does 1-130, No. 11 C 3826, 2011 WL 5573960, 2011 U.S. Dist. LEXIS 132449 (N.D.Cal. Nov. 16, 2011); Digital Sin, Inc. v. Doe, No. 11 C 4397, 2011 U.S. Dist. LEXIS 128033 (N.D.Cal. Nov. 4, 2011); Liberty Media Holdings, LLC v. BitTorrent Swarm, 277 F.R.D. 669 (S.D.Fla.2011); Order, Boy Racer, Inc. v. Does 2-52, No. 11-2834 (N.D.Cal.); Pac. Century Int’l Ltd. v. Does 1-101, No. 11 C 2533, 2011 WL 2690142 (N.D.Cal. July 8, 2011); Diabolic Video Prods., Inc. v. Does 1-2099, 2011 WL 3100404 (N.D.Cal. May 31, 2011); Millennium TGA, Inc. v. Doe, No. 11 C 2258, 2011 WL 1812786 (N.D.Cal. May 12, 2011).
. The facts are drawn from the operative complaint in the four cases underlying the six subpoenas. See Amended Complaint [Dkt. No. 6], Pac. Century Int’l, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal. Jan. 5, 2012); Amended Complaint [Dkt. No. 6], Hard Drive Prods., Inc. v. Unknown, No. 11 C 3476 (E.D.Cal. Jan. 5, 2012); Second Amended Complaint [Dkt. No. 23], First Time Videos, LLC v. William Meyer, Jr., No. 11 C 690 (E.D.Va. Jan. 4, 2012); Complaint [Dkt. No. 1], Pac. Century Int'l Ltd. v. Does 1-37, No. 11 C 4430 (S.D.Tex. Dec. 16, 2011).
. In Pacific Century International Ltd. v. Does 1-37, No. 11C 4430 (S.D.Tex.) and Pacific Century International, Ltd. v. Unknown, No. 11 C 3479 (E.D.Cal.), the video at issue is entitled "Amateur Creampies—Laney Boggs.” In Hard Drive Productions, Inc. v. Unknown, No. 11 C 3476 (E.D.Cal.), the video is entitled "Amateur Allure—Dylan.” In First Time Videos, LLC v. William Meyer, Jr., No. 11 C 690 (E.D.Va.), the video is entitled "FTV—Tiffany.”
. MCGIP, LLC v. Does 1-30, No. 11 C 3680, 2011 WL 3501720, at *1 (N.D.Cal. Aug. 10, 2011) (alteration in original) (quoting Diabolic Video *199Prods., Inc. v. Does 1-2099, No. 10 C 5865, 2011 WL 3100404, at *1 (N.D.Cal. May 31, 2011)).
. The plaintiffs contend that their need at this stage is nonetheless urgent, because the ISPs may destroy the IP address information in the regular course of business. That concern is minimal, however, because the ISPs have a duty to preserve “relevant evidence over which [they] had control and reasonably knew or could reasonably foresee was material to a potential legal action." China Ocean Shipping (Group) Co. v. Simone Metals Inc., No. 97 C 2694, 1999 WL 966443, at *3 (N.D.Ill. Sept. 30, 1999) (collecting cases).