It is enough to be used as evidence, it isn't enough, by itself, to definitively prove identity. It might be enough to get a subpoena to image the computers at the IP address. From there you might find the offending material that was broadcast, VPN accounts, chat logs talking about planning it, etc...