Are you sure it’s not a spam ?
Looks like it is. See below.
Check if you have yunohost account with weak password
Deleted a few unused accounts.
Have you some login in /var/log/auth.log around this hour ?
Looks not good. Lots of random people trying to break in.
Nov 10 13:14:34 arkadi sshd[14461]: Connection from 149.56.44.47 port 51856 on 192.168.15.228 port 22
Nov 10 13:14:36 arkadi sshd[14461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47 user=root
Nov 10 13:14:38 arkadi sshd[14461]: Failed password for root from 149.56.44.47 port 51856 ssh2
Nov 10 13:14:42 arkadi sshd[14461]: Failed password for root from 149.56.44.47 port 51856 ssh2
Nov 10 13:14:46 arkadi sshd[14461]: Failed password for root from 149.56.44.47 port 51856 ssh2
Nov 10 13:14:49 arkadi sshd[14461]: Failed password for root from 149.56.44.47 port 51856 ssh2
Nov 10 13:14:51 arkadi sshd[14461]: Failed password for root from 149.56.44.47 port 51856 ssh2
Nov 10 13:14:54 arkadi sshd[14461]: Failed password for root from 149.56.44.47 port 51856 ssh2
Nov 10 13:14:54 arkadi sshd[14461]: error: maximum authentication attempts exceeded for root from 149.56.44.47 port 51856 ssh2 [preauth]
Nov 10 13:14:54 arkadi sshd[14461]: Disconnecting authenticating user root 149.56.44.47 port 51856: Too many authentication failures [preauth]
Nov 10 13:14:54 arkadi sshd[14461]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47 user=root
Nov 10 13:14:54 arkadi sshd[14461]: PAM service(sshd) ignoring max retries; 6 > 3
Nov 10 13:14:55 arkadi sshd[14479]: Connection from 198.251.89.99 port 50636 on 192.168.15.228 port 22
Nov 10 13:15:01 arkadi CRON[14482]: pam_unix(cron:session): session opened for user nextcloud by (uid=0)
Nov 10 13:15:04 arkadi sshd[14479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.251.89.99 user=root
Nov 10 13:15:06 arkadi sshd[14479]: Failed password for root from 198.251.89.99 port 50636 ssh2
Nov 10 13:15:08 arkadi CRON[14482]: pam_unix(cron:session): session closed for user nextcloud
Nov 10 13:15:09 arkadi sshd[14479]: Failed password for root from 198.251.89.99 port 50636 ssh2
Nov 10 13:15:13 arkadi sshd[14479]: Failed password for root from 198.251.89.99 port 50636 ssh2
Nov 10 13:15:18 arkadi sshd[14479]: Failed password for root from 198.251.89.99 port 50636 ssh2
Nov 10 13:15:22 arkadi sshd[14479]: Failed password for root from 198.251.89.99 port 50636 ssh2
Nov 10 13:15:27 arkadi sshd[14479]: Failed password for root from 198.251.89.99 port 50636 ssh2
Nov 10 13:15:29 arkadi sshd[14479]: error: maximum authentication attempts exceeded for root from 198.251.89.99 port 50636 ssh2 [preauth]
Nov 10 13:15:29 arkadi sshd[14479]: Disconnecting authenticating user root 198.251.89.99 port 50636: Too many authentication failures [preauth]
Nov 10 13:15:29 arkadi sshd[14479]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.251.89.99 user=root
Nov 10 13:15:29 arkadi sshd[14479]: PAM service(sshd) ignoring max retries; 6 > 3
Shoot. Looks like they got in.
Nov 10 13:37:38 arkadi sshd[14611]: Connection from 106.55.146.113 port 50364 on 192.168.15.228 port 22
Nov 10 13:37:39 arkadi sshd[14611]: Connection closed by 106.55.146.113 port 50364 [preauth]
Nov 10 13:39:01 arkadi CRON[14727]: pam_unix(cron:session): session opened for user root by (uid=0)
Nov 10 13:39:01 arkadi dbus-daemon[458]: [system] Rejected send message, 4 matched rules; type="method_call", sender=":1.6294" (uid=109 pid=14730 comm="worker_nscd 0 ") interface="org.freedesktop.systemd1.Manager" member="GetDynamicUsers" error name="(unset)" requested_reply="0" destination="org.freedesktop.systemd1" (uid=0 pid=1 comm="/sbin/init ")
Nov 10 13:39:01 arkadi CRON[14727]: pam_unix(cron:session): session closed for user root
Since this scare I have 100% moved to SSH key authentication.
Also this log has lots of stuff like this:
Nov 8 15:49:09 arkadi dbus-daemon[458]: [system] Rejected send message, 4 matched rules; type="method_call", sender=":1.5851" (uid=109 pid=10983 comm="worker_nscd 0 ") interface="org.freedesktop.systemd1.Manager" member="GetDynamicUsers" error name="(unset)" requested_reply="0" destination="org.freedesktop.systemd1" (uid=0 pid=1 comm="/sbin/init ")
Check if you send spam through postfix /var/log/mail.log ?
Looks like my machine was being used as a spam server 
Nov 8 13:30:54 arkadi postfix/smtpd[9761]: disconnect from mone183.secundiarourous.com[141.98.10.183] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 13:34:14 arkadi postfix/anvil[9753]: statistics: max connection rate 1/60s for (smtp:45.125.65.105) at Nov 8 13:29:04
Nov 8 13:34:14 arkadi postfix/anvil[9753]: statistics: max connection count 1 for (smtp:45.125.65.105) at Nov 8 13:29:04
Nov 8 13:34:14 arkadi postfix/anvil[9753]: statistics: max cache size 1 at Nov 8 13:29:04
Nov 8 13:34:41 arkadi postfix/smtpd[9779]: connect from unknown[141.98.10.143]
Nov 8 13:34:42 arkadi postfix/smtpd[9779]: disconnect from unknown[141.98.10.143] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 13:35:52 arkadi postfix/smtpd[9779]: connect from unknown[103.253.42.54]
Nov 8 13:35:53 arkadi postfix/smtpd[9779]: disconnect from unknown[103.253.42.54] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 13:36:34 arkadi postfix/smtpd[9779]: connect from unknown[185.36.81.33]
Nov 8 13:36:35 arkadi postfix/smtpd[9779]: disconnect from unknown[185.36.81.33] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 13:39:39 arkadi postfix/smtpd[9917]: connect from unknown[141.98.10.136]
Nov 8 13:39:40 arkadi postfix/smtpd[9917]: disconnect from unknown[141.98.10.136] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 13:40:32 arkadi postfix/smtpd[9917]: connect from unknown[45.125.65.39]
Nov 8 13:40:32 arkadi postfix/smtpd[9917]: disconnect from unknown[45.125.65.39] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 13:43:53 arkadi postfix/anvil[9781]: statistics: max connection rate 1/60s for (smtp:141.98.10.143) at Nov 8 13:34:41
Nov 8 13:43:53 arkadi postfix/anvil[9781]: statistics: max connection count 1 for (smtp:141.98.10.143) at Nov 8 13:34:41
Nov 8 13:43:53 arkadi postfix/anvil[9781]: statistics: max cache size 2 at Nov 8 13:36:34
Nov 8 14:08:20 arkadi postfix/smtpd[10036]: connect from mone183.secundiarourous.com[141.98.10.183]
Nov 8 14:08:21 arkadi postfix/smtpd[10036]: disconnect from mone183.secundiarourous.com[141.98.10.183] ehlo=1 auth=0/1 quit=1 commands=2/3
Nov 8 14:11:41 arkadi postfix/anvil[10041]: statistics: max connection rate 1/60s for (smtp:141.98.10.183) at Nov 8 14:08:20
Nov 8 14:11:41 arkadi postfix/anvil[10041]: statistics: max connection count 1 for (smtp:141.98.10.183) at Nov 8 14:08:20
Nov 8 14:11:41 arkadi postfix/anvil[10041]: statistics: max cache size 1 at Nov 8 14:08:20
Nov 8 14:19:15 arkadi postfix/smtpd[10215]: connect from unknown[45.125.65.105]
Now it makes sense why my IP is blocked on some email spam things. It looks like the moral of the story is USE KEY BASED AUTHENTICATION!
- I changed SSH port to non-standard one
- Key authentication only
- No root login to SSH
Thank you for the suggestions! I learned a lot about logs and stuff hunting this down.