So I guess this is made to defeat the usefulness of things like Tor and JAP, isn't it?
Actually, I don't think so, and I think that's part of the point of the last paragraph of the quote. Whatever system this is might be able to track back to the machine that sent the request itself. But the fact that the request was triggered by something that was received at that address via a TOR "tunnel" is still unknown (short of guessing with the help of traffic analysis).
So it's not defeating the real bad guys at all. It's just snaring us poor, law-abiding