Check an IP Address, Domain Name, Subnet, or ASN
158.94.209.131 has a threat confidence score of 99%. This IP address from The Netherlands (AS202412, Omegatech LTD) has been observed in 105 honeypot sessions and reported 1 times targeting SSH, SMTP protocols. Detected attack patterns include smtp open relay probe. First observed on January 25, 2026, most recently active March 31, 2026.
Automated SMTP interaction sequence consistent with open-relay validation or spam delivery testing. The client performs a full transaction flow (EHLO → RSET → MAIL FROM → RCPT TO → DATA → QUIT) and submits a minimal test message containing known probe markers such as t_Smtp.LocalIP. This pattern indicates scripted activity attempting to confirm whether the server allows unauthenticated message relaying or outbound mail submission. Such behavior is commonly observed from spam bot infrastructure validating targets before larger abuse campaigns.
Identifies the use of SCP in quiet mode (-q) with “to” mode (-t), indicating the remote system is receiving a file. This pattern is commonly associated with post-authentication payload delivery, lateral movement staging, or tool transfer to a compromised host.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 16, 2026, 01:34 | Brute Force | SMTP | SikkerGuard: 6 blocked packets |