You can scan SSH server by using this tool.
Reports the number of algorithms (for encryption, compression, etc.) that the target SSH2 server offers. If verbosity is set, the offered algorithms are each listed by type.
If the "client to server" and "server to client" algorithm lists are identical (order specifies preference) then the list is shown only once under a combined type.
Only use components that do not have known vulnerabilities, only use components that, when combined, do not introduce a security vulnerability, and ensure that a misconfiguration does not cause any vulnerabilities.