Yes, there are real attacks on constructions build from 8-byte blocks. And no, that's not how real-world crypto attacks work; we don't use supercomputers to mount brute-force searches.†
A 2015 recommendation for Blowfish is cryptographic malpractice.
† unless you're crazy enough to prefer DH to ECDH.
I believe it's possible. It's why I only use it in cascades. Yet, where's the practical attack where IDEA and Blowfish traffic are decrypted with ciphertext? If it's malpractice, then they're either fully decryptable or will be soon based on existing attacks on specific numbers of rounds or implementations.
I would appreciate you to cite evidence of people decrypting files protected by Blowfish or IDEA by breaking the cipher.
A 2015 recommendation for Blowfish is cryptographic malpractice.
† unless you're crazy enough to prefer DH to ECDH.