It is also fairly trivial to know whether someone is coming from a VPN, a corporate presence (which might also offer VPN services to employees), or something else.
For example, when I am VPN'd into campus, my IP address might be 35.7.41.39. But, if I do a "host lookup" on that IP address, I get:
% host 35.7.41.39
39.41.7.35.in-addr.arpa domain name pointer 0587671847.vpn.umich.net.
Pretty straightforward--I am coming in through the University of Michigan's VPN service.
In contrast, when my VPN is off, I end up coming from my home IP address. When I do a lookup on that, I get [address redacted]:
% host [redacted]
[redacted].in-addr.arpa domain name pointer [redacted].lightspeed.livnmi.sbcglobal.net.
Which is pretty clearly not a VPN, but rather a private fiber connection in southeast Michigan. So, if someone is
claiming to be using a VPN, it's easy to at least get 90% sure that they are/are not telling you the truth. You can spoof the names if you manage to be a little nefarious with DNS, but that's getting pretty clever for an internet discussion board shill.
This is complicated by the fact that I happen to also run a VPN server in my house. It's a long story. But only family members use that server, unless one of them has been compromised and doesn't know it/didn't tell me.