Debug logs:
DEBUG [SshPrivateKeyFile] 16 Jan 2020 11:33:30.815 : Parsing private key file
DEBUG [SshPrivateKeyFormatFactory] 16 Jan 2020 11:33:30.817 : Loading private key formats
DEBUG [SshPrivateKeyFormatFactory] 16 Jan 2020 11:33:30.820 : Installing OpenSSH-PrivateKey private key format
DEBUG [SshPrivateKeyFormatFactory] 16 Jan 2020 11:33:30.822 : Installing SSH.COM-PrivateKey-Base64Encoded private key format
DEBUG [SshPrivateKeyFormatFactory] 16 Jan 2020 11:33:30.823 : Installing PuTTY-User-Key-File-2 private key format
DEBUG [SshPrivateKeyFormatFactory] 16 Jan 2020 11:33:30.824 : Installing SSHTools-PrivateKey-Base64Encoded private key format
DEBUG [SshPrivateKeyFile] 16 Jan 2020 11:33:30.826 : Private key is not in the default format, attempting parse with other supported formats
DEBUG [SshPrivateKeyFile] 16 Jan 2020 11:33:30.826 : Attempting OpenSSH-PrivateKey
DEBUG [SshPrivateKeyFile] 16 Jan 2020 11:33:30.826 : Attempting SSH.COM-PrivateKey-Base64Encoded
DEBUG [SshPrivateKeyFile] 16 Jan 2020 11:33:30.826 : Attempting PuTTY-User-Key-File-2
INFO [PuTTYPrivateKeyFormat] 16 Jan 2020 11:33:30.831 : Unpacking puTTY formatted private key
INFO [SCPClient] 16 Jan 2020 11:33:30.843 : SCPClient settings validated.
DEBUG [SCPClient] 16 Jan 2020 11:33:30.843 : Connecting to sftp-us-e01.everbridge.net:22
DEBUG [SCPClient] 16 Jan 2020 11:33:30.843 : Version: 5.2.3
DEBUG [StreamSocketFactory] 16 Jan 2020 11:33:30.847 : Connecting to sftp-us-e01.everbridge.net:22 via standard socket
DEBUG [StreamSocketFactory] 16 Jan 2020 11:33:31.338 : setSoTimeout(50000)
INFO [TransportProtocolCommon] 16 Jan 2020 11:33:31.352 : Timeout=50000
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.352 : Starting transport protocol
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.381 : Wait for state update timeout=50000
DEBUG [State] 16 Jan 2020 11:33:31.381 : Updated state to 2
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.381 : Registering transport protocol messages with inputstream
INFO [cryptix] 16 Jan 2020 11:33:31.391 : GLOBAL_TRACE=false
INFO [cryptix] 16 Jan 2020 11:33:31.391 : GLOBAL_DEBUG=false
INFO [cryptix] 16 Jan 2020 11:33:31.391 : GLOBAL_DEBUG_SLOW=false
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.391 : Negotiating protocol version
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.391 : Local identification: SSH-2.0-edtFTPjPRO_5.2.3
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : Read: 'SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.fips.2.8.1
'
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : EOL is guessed at CR+LF
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : Remote identification: 'SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.fips.2.8.1'
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : Protocol negotiation complete
DEBUG [State] 16 Jan 2020 11:33:31.570 : Updated state to 3
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : Wait for state update timeout=50000
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : Name=SSH_MSG_KEX_INIT,MessageId=20
Supported Kex diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256
Supported Public Keys ssh-dss,ssh-rsa
Supported Encryption Client->Server aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr,blowfish-cbc,arcfour
Supported Encryption Server->Client aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr,blowfish-cbc,arcfour
Supported Mac Client->Server hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-sha2-256,hmac-sha2-512
Supported Mac Server->Client hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-sha2-256,hmac-sha2-512
Supported Compression Client->Server none,zlib,zlib@openssh.com
Supported Compression Server->Client none,zlib,zlib@openssh.com
Supported Languages Client->Server
Supported Languages Server->Client
First Kex Packet Follows [FALSE]
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.570 : Sending SSH_MSG_KEX_INIT
DEBUG [SshMsgKexInit] 16 Jan 2020 11:33:31.780 : Packetlength=508, Paddinglength=7
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.780 : Received registered message: SSH_MSG_KEX_INIT
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.781 : Received Name=SSH_MSG_KEX_INIT,MessageId=20
Supported Kex ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
Supported Public Keys ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
Supported Encryption Client->Server aes256-ctr,aes192-ctr,aes128-ctr
Supported Encryption Server->Client aes256-ctr,aes192-ctr,aes128-ctr
Supported Mac Client->Server hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256
Supported Mac Server->Client hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256
Supported Compression Client->Server none,zlib@openssh.com
Supported Compression Server->Client none,zlib@openssh.com
Supported Languages Client->Server
Supported Languages Server->Client
First Kex Packet Follows [FALSE]
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.781 : Starting key exchange
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.781 : Determine Algorithm
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.781 : Client Algorithms: [diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group-exchange-sha256]
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.781 : Server Algorithms: [ecdh-sha2-nistp521, ecdh-sha2-nistp384, ecdh-sha2-nistp256, diffie-hellman-group-exchange-sha256]
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.782 : Returning diffie-hellman-group-exchange-sha256
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.782 : Key exchange algorithm: diffie-hellman-group-exchange-sha256
INFO [DhGroupExchangeSha256] 16 Jan 2020 11:33:31.782 : Starting client side key exchange.
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.788 : Sending SSH_MSG_KEX_DH_GEX_REQUEST_OLD
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.997 : Received registered message: SSH_MSG_UNIMPLEMENTED
DEBUG [TransportProtocolCommon] 16 Jan 2020 11:33:31.998 : The message with sequence no 1 was reported as unimplemented by the remote end.