Check an IP Address, Domain Name, Subnet, or ASN
158.94.210.30 has a very high threat confidence level of 98%, originating from Amsterdam, The Netherlands, on the Omegatech LTD network (202412). It has been observed across 55 sessions targeting SMTP, with detected attack patterns including smtp open relay probe, First observed on January 29, 2026, most recently active February 27, 2026.
Automated SMTP interaction sequence consistent with open-relay validation or spam delivery testing. The client performs a full transaction flow (EHLO → RSET → MAIL FROM → RCPT TO → DATA → QUIT) and submits a minimal test message containing known probe markers such as t_Smtp.LocalIP. This pattern indicates scripted activity attempting to confirm whether the server allows unauthenticated message relaying or outbound mail submission. Such behavior is commonly observed from spam bot infrastructure validating targets before larger abuse campaigns.
| Date | Category | Protocol | Comment |
|---|---|---|---|
| Feb 26, 2026 | Brute Force | SMTP | SikkerGuard: 6 blocked packets |
| Feb 26, 2026 | Brute Force | SMTP | SikkerGuard: 6 blocked packets |