Depending on the RouterOS you run, your device might indeed be compromised. Especially since you have “Winbox” worldwide open…a bad, really bad idea…
RouterOS had some severe security issues in the past where one could gain access without even knowing your login/passwords…
I would perform a complete net-install and start over again. Update to the latest RouterOS before you connect it to the Internet and really review your access-policy.
It's ok i do it on purpose. This is my lab router, chr(6.48.3) on VPS. I just want to check how is it going without port change/knocking/cert login/etc. I'm logging all brute force(no one yet trying my ssh login name) so i don't think this router is compromised(thats why i ask about ssh outgoing connection), but maybe im wrong.
Not just "VPN," but PPTP, perhaps the least secure VPN protocol still in use. I don't know why anyone is still teaching how to set it up, nor why it's installed in the default build of RouterOS. It offers several better choices.
...and SSH (all on default ports!)
Yeah, that's bad, especially the default port choice. Although it may be "security through obscurity," moving SSH to a non-default port will cut the amount of attempts on that port by a huge amount, simply because script kiddies are lazy.
@Brans, I won't ask you your SSH password, but at least answer me this: does it meet MikroTIk's recommended security minimums? If they seem overly stringent, they're based on having no connection limiting, which greatly increases the amount of password guesses your attackers get. 8 random characters is enough if you have good limiting. 8 non-random characters is probably insecure even with connection rate limiting.
Even if it weren’t immoral to provide an insecure public IP redirecting gateway, being against the public good, it’s probably directly against your VPS provider’s ToS.
I’ll make a couple of observations about your original log:
First, those are mostly China Telecom and China Mobile destination addresses. This strongly supports the idea that your CHR is under active attack. Whether it’s compromised yet, I don’t think we can say yet, but you do need to be concerned.
Second, why is the source port 22? Those aren’t inbound connections to your CHR, they’re coming from your CHR on its SSH port. Why? You haven’t got SSH port forwarding enabled, have you?