Resource
Ghost Hunt: How to Find and Secure SSH Keys in Your Network