There are certainly legitimate reasons for this. Users only need to authenticate if you care about who they are. In the same way that some website or FTP servers require credentials to access and others are anonymously available, you can have the same thing for SSH servers (although it's rather less common).
And it could also be that the application running on the server performs some of its own authentication separate to the SSH protocol.
For instance, there are servers used to host games that allow anyone to SSH into them. The alt.org NetHack server allows anyone to SSH in with just the nethack username and no password (or even to connect over Telnet):
To play NetHack on this server, just telnet alt.org (on normal port 23 or port 14321) or ssh [email protected].
And then once you're connected, you're prompted to login to the game itself:
## nethack.alt.org - http://nethack.alt.org/ ## ## Games on this server are recorded for in-progress viewing and playback! Not logged in. l) Login r) Register new user w) Watch games in progress
The other common instance where you'd see SSH servers accepting any (or empty) credentials would be a honeypot - which can be used both to find out what credentials attackers are trying, and what they do if they manage to successfully authenticate.