SSH Analysis and Weak Keys Activity