Setup a honeypot page to log the ‘users’ IP. Keep hitting it via their domain and you’ll build up a list of IP’s to block?
As an aside, I’ve fought credential stuffers by returning real looking but actually false data, and initiating password resets... start serving different data on each hit, you may need to be annoying enough that they give up.
How about automatically honeypotting them? Add some code to your site that will IP ban a user that searches for some random string (and when I say random, I mean literally generate a random string - something no legit user would search for).
Then, setup a script on your laptop or whatever to search this string on their domains every half hour or so.
Assuming the restaurants margin's are large enough to take the hit, delivery service's provide access to a perceived new market - people who wouldn't would have visited the restaurant in person, but would like a delivery.
Since a customer pays the same usual prices (+ a delivery fee), the brand has the same value on their next in-person visit.
The services are cut throat, they push for massive %'s and expect the retailer to push a 'Get delivery through xxx' message. I know of one service with an EPOS integration, they must be waking up to it now their business is proven.
There's one field in the app's request that's still unknown.
It's a header of seemingly encrypted data, along with a varying number of encrypted blocks (all the same length).
In those blocks could be anything, detailed gps co-ords, device details, there's a fair chance they can ban all these API users at the push of a button based on whatever's in those blocks.
Everything else is unencrypted - sent back and forth using the protobuf format, the formatting of the protobuf's were dropped on pastebin a few weeks ago.
As an aside, I’ve fought credential stuffers by returning real looking but actually false data, and initiating password resets... start serving different data on each hit, you may need to be annoying enough that they give up.