Users are not logging in from SMTP2GO, SendGrid, or other provider IPs - those only send mail in (or out if you use their services, like we do for a couple domains).
The brute force login attempts come from either residential IPs, data-centers hosting VPNs or script-kiddies sitting on a server launching attacks. Either way, those IPs have no business talking to our servers, so they get an insta-ban. In the case of a VPN we don't worry about client connectivity because we know how our clients connect. If one decides to use a VPN and has connectivity problems because that VPN has been "attacking" then we go the static IP route with that provider/client.
We filter against sender(1) for many obvious spam/phishing attacks and ban known bad stuff. Those are rarely ever sent through "providers" other than Microsoft's own server farms. In addition, all the providers use bounce tracking on messages - which leaves sender(2) as the actual "email" sending the mail. Sender(2) is filtered at SM level. We filter sender(1) at the log level and that's what's used in any insta-banning.
We filter EHLO, sender(1), and bad login attempts with log scanning that kills the majority of offending IPs.
With greylisting enabled, many offenders never even get a chance to send the mail in because it's caught in the first attempt and banned before the second.
In all cases, any traffic presented by IPs that fall into the insta-ban category gets blocked - and if it causes problems for a client (which we haven't had yet) - then we have a sit-down with that client to find out why they are using the same infrastructure as those attacking or spamming the server. We also go after the provider.
In the end, we dealt with the hassles of DNSBLs, spam lists and the likes early on in the game years ago - and we got the same treatment if our server acted up. It's no different in my opinion to be one blocking and holding other hosts accountable as we have been in the past.
Currently, we have 1300 entries in the EHLO/SMTP Blocking lists on our server. Any entry in that list that gets caught up in the logs gets insta-banned. We haven't lost any legitimate traffic this way. The one exception is we safe-listed Google's GMAIL servers via their SPF record because they are the one host that we see that doesn't use bounce-tracking on their outgoing if it's a hosted domain.