Reason i got a rule to block that kind of traffic is because it was actually allowed to pass through as i need SSH access to the server from the WAN then i noticed strange names trying to login as well so i blocked it.
What i have done now is remove the Rule altogether. I should not be seeing any SSH traffic from WAN on my network at all now if all is well. Now we wait

Oh, that's just automated programs doing a brute force attack. I see that all the time in my logs, always using lame names like "Administrator" or "root" for a SSH login when they are all usually disabled by default.
If you open up the WAN to your SSH, that's bound to happen. My FTP gets megabytes of junk logs from bot networks with zombies trying to login and guess the password. There are programs out there to ban logins after so many failed attempts if you are really that worried about your security.