I administer some Linux boxes in the EU and US.
This is a common issue on almost all servers. It is done automatically, especially when a TLD is connected to the box. Info is taken from the whois database to get to IP addresses.
Practically, I usually do 5 things:
1. Change the ssh port 22 to some other port you will never use, like a port a system may use, but your server does not. Look at the /etc/services file for some ports that may be used, otherwise use a high port.
2. Block root remote login with ssh. You have to use sudo on normal Linux servers, but the Asustor boxes are inbeded on one chip as firmware - sudo is not available. Create a new user with admin rights and make a very long and complicated code generated password for admin. Normally root is deactivated for direct usage. Not sure what is done on the Asustor systems. root is UID=0 and admin is UID=999. Normal switching to root with su is not possible. It seems group members of "administrators" have root access (I suspect restricted like sudo).
Look at the user and group lists with cat /etc/passwd & cat /etc/group.
3. Use keys to log in to servers with ssh. It allows password-less access form only single identified servers and clients with each other, and is the best secure access at the moment on a ssh level.
4. Use port-knocking techniques to add another security level. See:
http://www.portknocking.org/ for an explanation how it works. I still have to get to this on the Asustor. On CentOS it is installed with "sudo apt-get install knockd". I need to talk to the techis at Asustor or someone here to find a way to install on the Asustor.
5. Configure IP-Tables to block unwanted traffic. A rather complicated procedure, covered by the access lists of ADM Defender. Not sure how well it is configured. Checking can be done with tables list (iptables -L -- but it needs root to check and change it). A nice description at Ubuntu site:
https://help.ubuntu.com/community/IptablesHowTo. Still have to research this point.
The first 3 points will secure 95% of the attacks.
The first 2 points eliminates about 80 % of the script-kiddies and automatic log-in attempts.
HTH a little.

Pingumann