Loading threats
Automated SMTP interaction sequence consistent with open-relay validation or spam delivery testing. The client performs a full transaction flow (EHLO → RSET → MAIL FROM → RCPT TO → DATA → QUIT) and submits a minimal test message containing known probe markers such as t_Smtp.LocalIP. This pattern indicates scripted activity attempting to confirm whether the server allows unauthenticated message relaying or outbound mail submission. Such behavior is commonly observed from spam bot infrastructure validating targets before larger abuse campaigns.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 158.94.211.108 | 97% | 819 | 89 | 🇺🇸 US | AS202412 | 2026-02-24 |
| 158.94.211.67 | 98% | 751 | 111 | 🇺🇸 US | AS202412 | 2026-03-03 |
| 158.94.209.145 | 99% | 572 | 98 | 🇳🇱 NL | AS202412 | 2026-03-05 |
| 178.16.52.2 | 98% | 530 | 83 | 🇩🇪 DE | AS202412 | 2026-03-02 |
| 41.193.154.189 | 96% | 501 | 81 | 🇿🇦 ZA | AS11845 | 2026-03-05 |
| 158.94.211.69 | 93% | 420 | 36 | 🇺🇸 US | AS202412 | 2026-02-18 |
| 45.144.212.19 | 75% | 405 | 44 | 🇺🇦 UA | AS214940 | 2026-02-06 |
| 158.94.211.35 | 95% | 396 | 75 | 🇺🇸 US | AS202412 | 2026-03-04 |
| 158.94.209.116 | 97% | 388 | 40 | 🇳🇱 NL | AS202412 | 2026-02-28 |
| 91.92.241.115 | 95% | 387 | 74 | 🇳🇱 NL | AS202412 | 2026-02-22 |
| 185.169.4.178 | 95% | 377 | 43 | 🇬🇧 GB | AS209605 | 2026-02-15 |
| 158.94.211.202 | 93% | 369 | 52 | 🇺🇸 US | AS202412 | 2026-03-04 |
| 45.92.33.82 | 97% | 358 | 47 | 🇬🇷 GR | AS9009 | 2026-03-02 |
| 146.70.146.50 | 97% | 352 | 125 | 🇦🇹 AT | AS9009 | 2026-03-05 |
| 158.94.211.56 | 93% | 327 | 46 | 🇺🇸 US | AS202412 | 2026-03-05 |
| 141.98.10.37 | 98% | 325 | 55 | 🇱🇹 LT | AS209605 | 2026-03-03 |
| 158.94.210.30 | 98% | 316 | 55 | 🇳🇱 NL | AS202412 | 2026-02-27 |
| 158.94.210.111 | 89% | 315 | 23 | 🇳🇱 NL | AS202412 | 2026-03-05 |
| 193.31.6.58 | 78% | 308 | 22 | 🇱🇹 LT | AS209605 | 2026-02-04 |
| 185.169.4.231 | 93% | 301 | 62 | 🇬🇧 GB | AS209605 | 2026-03-04 |