acidvegas

The Mystery of ASJO.ORG

2026-03-01

46 million DNS ANY queries for a Danish man's personal domain, from DoD address space, residential ISPs, and cloud providers across 12 countries. A two-year mystery nobody can explain.

I have an obsession with internet anomalies. Weird traffic patterns, unexplained phenomena in protocol-level data, the kind of stuff that makes you open 40 browser tabs at 2 AM. I run a DNS honeypot cluster — multiple geographically distributed nameservers designed to study internet background noise, scanner behavior, and threat intelligence. Every query that hits these servers is logged — source IP, ASN, query name, record type, protocol, flags, all of it.

DNS honeypot cluster map showing global query sources hitting nameservers

These servers have never been advertised publicly. No zone files reference them. No domain points to them. They exist solely to observe what the internet sends to an open resolver when nobody knows it's there.

I was bored one day and started digging through the honeypot logs. What I found sent me down a rabbit hole that I figured, when all was said and done, was worth writing up.

The Expected Noise

Within 24 hours of spinning up the cluster, traffic began arriving. This was expected. People scan the entire IPv4 address space (0.0.0.0/0) for port 53 constantly. Botnets probe for open resolvers. Researchers enumerate. Scanners scan. This is the background radiation of the internet and exactly what the honeypot was built to capture.

Then something caught my eye. Here are the top 5 queried domains on my honeypot over a 24-hour period:

Top Queries (24h)
─────────────────────────────────────────────
1  asjo.org                          462,894
2  pizzaseo.com                        3,615
3  subscribe.insight.synology.com      1,266
4  stingbox.twocyber.com               1,096
5  checkipv6.quickconnect.to           1,047

Read that again. The #1 domain has 128x more queries than #2. It's not even close. Everything else on the list is explainable — Synology NAS devices phoning home, security research probes, SEO garbage. And then there's asjo.org, towering above everything else by two orders of magnitude. I brushed it off as "LOL DDOS, MY HONEYPOT IS WORKING!" and simply dropped the IP address using iptables.

46 Million Queries

I woke up one morning to find 46 million DNS queries logged against my nameservers. All of them identical:

Query: asjo.org
Type:  ANY
Class: IN
Proto: UDP

Every single one — a DNS ANY request for asjo.org. The source was a DigitalOcean IP address. My first thought was obvious: this is a DNS amplification attack. Someone was using my open resolver to reflect amplified responses at a victim. Classic DDoS playbook. I dropped the IP with iptables and went about my day.

Hours later, it happened again.

The Department of Defense

The next wave came from 33.44.22.33 — an IP address belonging to ASN 749, United States Department of Defense. The 33.0.0.0/8 block has been allocated to the DoD since January 1970.

DNS honeypot logs showing DoD IP 33.44.22.33 flooding ANY queries for asjo.org

Same query. Same record type. Same domain. ANY for asjo.org, over and over, from a Pentagon IP block.

I dropped that one too. Hours later, the flood resumed from a Comcast residential IP. Then Cox. Then it just kept going.

It's Not Even a Large Response

DNS amplification attacks work because a small query produces a large response. The attacker sends a tiny packet, the resolver replies with something much bigger, and the victim gets hammered with the amplified traffic. The ANY record type is the classic choice because it returns everything — A, AAAA, MX, TXT, NS, SOA, DNSKEY, RRSIG, all of it.

So I ran dig asjo.org ANY myself:

Output of dig asjo.org ANY showing a 1518 byte response

The total response is 1,518 bytes. That's it. For context, domains commonly abused in amplification attacks return responses of 4,000+ bytes. The amplification factor here is mediocre at best. If you were building a DDoS cannon, you would pick almost any other domain.

As the domain owner himself put it on his blog:

"For looking up asjo.org, for crying out loud: the zone is 36 lines long"

36 lines. The entire zone file. This is a personal domain with a handful of records, not a juicy amplification target.

Not a Normal DDoS

At first glance this looks like a textbook DNS reflection attack. But the more I looked at it, the less it made sense:

If this were a reflection attack, the attacker would be DDoSing... the Pentagon? For two years? With DNS ANY queries for a Danish man's personal domain that returns 1.5 KB? It doesn't add up.

The Domain Owner Knows

asjo.org belongs to Adam Sjøgren, a Danish developer who runs his own infrastructure. A WHOIS lookup shows the domain was created on May 17, 2002 — he's owned it for over two decades. The domain hosts a personal site with some photographs, a music collection, a few links, and pictures of bread. That's it. A 23-year-old personal domain. This is what's at the center of all of this:

WHOIS lookup for asjo.org showing creation date of 2002-05-17 asjo.org - a personal website with sculptures, bread photos, and links

He has been documenting this exact phenomenon on his blog since March 2024 — four separate posts chronicling the same pattern I was seeing on my honeypots, two years before I ever set them up.

March 2024"Under attack?!": His home router started dropping 40-80% of packets. named was pegged at 100% CPU. A single IP in China was sending thousands of ANY requests for his own domain. His VPS hoster warned him about the traffic spike. When he blocked the IP, another one immediately took its place.

koldfront.dk - Under attack?! blog post showing smokeping graphs and bandwidth spikes

May 2024"DNS DoS again": Same thing, different IP, again from China. His jukebox kept rebooting because it couldn't ping the router. 998 out of 1000 packets on his network were ANY queries for asjo.org. He had to reboot the router just to access the firewall interface.

koldfront.dk - DNS DoS again blog post showing network traffic graphs and iptables drops

June 2024"Another DoS": Hit again. Router latency spiked, CPU maxed, VPS transfer quotas blown. Same pattern. He still had no idea what it was about.

koldfront.dk - Another DoS blog post showing router and network impact graphs

October 2024"Stupid DNS DoS again": He gave up. After months of blocking /8 networks and still getting hit with thousands of packets per second, he moved DNS for asjo.org to his registrar domæne.shop. A man who believes in self-hosting, forced off his own nameservers by a mystery flood that nobody can explain.

koldfront.dk - Stupid DNS DoS again blog post, showing zone is only 36 lines

He wrote: "I really like hosting things myself. I think it healthy for me and the internet in general that people do so — instead of having megacorps silo everything." But the flood won.

I Emailed Him

I reached out to Adam directly. Here is his reply:

Hi, acidvegas writes: > I am currently running a dns honeypot network right now logging all > queries and your domain "asjo.org" has showed up 46 million times in > the last 24 hours for a "ANY" request. Yikes! > What's odd is I did the same as you, started dropping the IP's but > new ones showed up. Yes, I ended up not hosting DNS for asjo.org myself anymore, I moved handling of DNS for that domain to my registrar, who is better at handling this than I was. My tiny VPS's were running out of transfer per month(!) I wrote about it a couple of times on my blog: · https://koldfront.dk/under_attack_1870 · https://koldfront.dk/dns_dos_again_1877 · https://koldfront.dk/another_dos_1880 · https://koldfront.dk/stupid_dns_dos_again_1903 > What I found interesting is some of the IP addresses making 10,'s of > thousands of ANY requests for your domain, were from like Saudi > Telecom, the United States Department of Defense, etc. It is very odd indeed. > If you have any insight into why people seem to be (i can only assume > spoofing) your domain so much, I would love to chat with you. I have no idea what so ever, so if you find something out, I would love to hear about it! One thing I did notice lately is that my employer (by way of Microsoft, I assume) has blocked asjo.org: · https://koldfront.dk/blocked_by_it_1964 Best regards, Adam -- "This whole business of Santa rewarding good kids Adam Sjøgren and neglecting bad kids really bugs me." asjo@koldfront.dk

He has no idea either. But that last link he sent led me to something else.

Collateral Damage

In January 2026, Adam discovered that his employer's network — via Microsoft Defender SmartScreen — had blocked asjo.org entirely.

koldfront.dk - Blocked by IT blog post showing Microsoft Defender blocking asjo.org

His personal domain, which contains a photo collection, a music list, and a few links, is now flagged as dangerous by Microsoft's threat intelligence. He also noted that people in Asia have been using asjo.org as a spoofed From address when sending spam. The DNS flood, the spam spoofing, the reputation damage — this one man's personal domain has become collateral in something he has no control over and no understanding of.

As he put it: "But great for my bad boy reputation at work, I'm the one with the blocked domain!"

Ranked #646 in the World

Akamai publishes a ranking of the top 10,000 domains by DNS query volume. I pulled the CSV and searched for asjo.org.

Akamai top 10K domains CSV showing asjo.org ranked #646

asjo.org is ranked #652 globally. Let that sink in. To put this in perspective, here are some of the domains it outranks:

asjo.org            #652
x.com               #671
telegram.org        #689
ebay.com            #719
intel.com           #727
huawei.com          #742
hotmail.com         #760
discord.com         #778
uber.com            #836
dropbox.com         #838
amazon.co.uk        #893
python.org          #906
booking.com         #928
duckduckgo.com      #962
slack.com           #966
nvidia.com          #968
oracle.com          #973

A one-person Danish blog about bread and photographs is generating more DNS query volume than X (Twitter), Telegram, eBay, Discord, Uber, Dropbox, Slack, Nvidia, and Oracle. That is not organic traffic. The sheer volume required to outrank these platforms — some of the most visited sites on the internet — is staggering. Something is generating an astronomical number of DNS queries for this domain across the global internet.

This raises an interesting thought experiment: can you spoof your way into the top 1 million domains? Cloudflare, Akamai, and others publish these popularity rankings based on DNS query volume. If sheer volume of spoofed queries is enough to land a personal blog at #646 globally, what stops anyone from artificially inflating any domain into these lists? These rankings are used by security tools, threat feeds, and allowlists everywhere. We may have to put this to the test. 😈

Dataplane.org Sees It Too

Dataplane.org operates a network of sensors that observe unsolicited DNS queries — essentially the same thing my honeypot does, but at larger scale and run by operators for operators. They publish a report of type/name pairs observed from unsolicited DNS query attempts.

asjo.org appears in their current report:

dnstypename  |  ANY               |  asjo.org

This is independent, third-party confirmation. Dataplane's sensors, my honeypot cluster, my colleague's nameserver, and Adam's own infrastructure — all observing the same phenomenon, completely independently.

Corroboration

A colleague who operates his own independent nameserver grepped his logs after I mentioned this. He found 17 unique source IPs responsible for 1.4 million queries for ANY asjo.org on his server alone. These are the IPs, resolved via bgp.tools:

ASNIPPrefixCCOrganization
14061134.199.134.80134.199.132.0/22USDigitalOcean LLC
152194143.92.63.185143.92.63.0/24HKCTG Server Limited
7018162.237.225.67162.224.0.0/12USAT&T Enterprises, LLC
1650916.24.10.16016.24.0.0/16USAmazon.com, Inc.
35819178.73.75.196178.73.72.0/22SAEtihad Etisalat
22773184.187.48.149184.187.48.0/20USCox Communications Inc.
4760220.246.52.55220.246.32.0/19HKHKT Limited
74933.44.22.3333.0.0.0/8USUS Department of Defense
21537045.154.34.9545.154.34.0/24NLWasabi Hosting
565047.158.35.947.158.0.0/16USVerizon (fka. Frontier)
128495.29.14.105.29.14.0/24ILHot-Net internet services
2143205.83.140.2095.83.140.0/24NLSergei Saliukov
346260.251.162.11760.251.162.0/24TWHiNet (Chunghwa Telecom)
772568.62.141.17468.62.128.0/19USComcast Cable
3328776.124.213.3676.124.212.0/22USComcast Cable
2048583.234.173.5883.234.0.0/16RUTransTeleCom JSC
560790.205.213.24190.192.0.0/11GBSky UK
321590.76.50.17290.76.0.0/16FROrange S.A.
21353792.242.165.24292.242.165.0/24TRInception Game & Media Services
2277398.164.156.11198.164.152.0/21USCox Communications Inc.

Look at the diversity. US military. European residential ISPs. Asian telecom carriers. Middle Eastern mobile operators. Russian transit providers. Israeli broadband. Turkish gaming companies. Cloud providers. Small Dutch hosting shops. This is not a single botnet. This is not a single attacker. This is something distributed across the global internet at a scale that is difficult to explain.

What We Know

I don't have a clean answer for what is happening here. Nobody does — not me, not Adam, not my colleague, not the Dataplane.org operators. But here is what the evidence shows:

Some possibilities:

If you run a nameserver, grep your logs for asjo.org. I'd bet money you'll find it.

As of this writing, the queries are still coming in. We are actively monitoring this across our honeypot cluster and the flood has not stopped:

Live honeypot monitoring showing continued ANY queries for asjo.org from ReliableSite.Net

Every few seconds, another ANY query for asjo.org. Still going. Still unexplained.

- - -

Sources & References:

If you run a nameserver and have logs showing queries for asjo.org, I would love to compare notes. Any intel on this mystery is welcome — reach out at acid.vegas@acid.vegas or join us on IRC at irc.supernets.org in #war, our recon, hacking, and threat intelligence channel.

- - -

Update — 2026-03-03: Since publishing this article, a network operator responsible for one of the source IP ASNs listed in the corroboration table reached out to confirm that the traffic is not legitimate. The queries for asjo.org originating from their address space are not coming from their infrastructure — the source IPs are being spoofed. We suspected this from the beginning given the source diversity and the presence of DoD legacy space, but this is the first direct confirmation from an operator on the other end. The IPs sending these queries are forged.

#dns #spoofing #ddos #scanning