Probing attacks very likely already exist on the network. Quite probable even that one of the large ‘trustworthy’ nodes on the network is a honeypot. But still, the reality is that first hop / last hop of any tx can never be known by any intermediary node.