114.32.122.32
=============
**Connection Banner:**
.. image:: /_static/banners/banner_5f46e8c59eab.png
:alt: 萬 王 之 王 K I N G OF K I N G S - MudOS v22pre11 - <建立架構 Nov 15, 1996> 本 Mud 主機由華彩軟體公司與百餘位熱心玩家共同贊助,特此感謝 !! 本 Mud 承蒙清華大學資工系金仲達教授指導,特此感謝 !! 這場征戰已經持續了 11 小時 39 分 21 秒 目前線上共有 424 位英雄豪傑。 您的英文名字(新人物請輸入'new') :
:class: ansi-banner
:width: 545px
:loading: lazy
Server URLs
-----------
.. raw:: html
Server Info
-----------
- **Server Location**: 🇹🇼 Taiwan (GeoIP)
- **Encoding**: big5
This server uses a legacy encoding:
``telnetlib3-client --encoding big5 --force-binary 114.32.122.32 4002``
Telnet Fingerprint
------------------
:ref:`6e6641437dab4b1b `
*This fingerprint is shared by 20 other servers.*
**Options requested from client**: ``NAWS``, ``TTYPE``
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "6e6641437dab4b1b",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\n\r\n \u001b[1;33m\u842c \u738b \u4e4b \u738b\u001b[2;37;0m\r\n\r\n \u001b[1;33m\uff2b\u001b[2;37;0m I N G OF \u001b[1;33m\uff2b\u001b[2;37;0m I N G S\u001b[2;37;0m\r\n\u3000\r\n - MudOS v22pre11 -\r\n\r\n <\u5efa\u7acb\u67b6\u69cb Nov 15, 1996>\r\n\r\n \u001b[1;35m\u672c Mud \u4e3b\u6a5f\u7531\u83ef\u5f69\u8edf\u9ad4\u516c\u53f8\u8207\u767e\u9918\u4f4d\u71b1\u5fc3\u73a9\u5bb6\u5171\u540c\u8d0a\u52a9\uff0c\u7279\u6b64\u611f\u8b1d !!\u001b[2;37;0m\r\n\r\n\t \u001b[1;32m\u672c Mud \u627f\u8499\u6e05\u83ef\u5927\u5b78\u8cc7\u5de5\u7cfb\u91d1\u4ef2\u9054\u6559\u6388\u6307\u5c0e\uff0c\u7279\u6b64\u611f\u8b1d !!\u001b[2;37;0m\r\n\r\n\u9019\u5834\u5f81\u6230\u5df2\u7d93\u6301\u7e8c\u4e86 11 \u5c0f\u6642 39 \u5206 21 \u79d2\r\n\r\n\u76ee\u524d\u7dda\u4e0a\u5171\u6709 424 \u4f4d\u82f1\u96c4\u8c6a\u5091\u3002\r\n\r\n\u60a8\u7684\u82f1\u6587\u540d\u5b57(\u65b0\u4eba\u7269\u8acb\u8f38\u5165'new') : ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "big5",
"option_states": {
"server_offered": {},
"server_requested": {
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5184423923492432,
"total": 5.026452302932739
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:45.739348+00:00",
"host": "114.32.122.32",
"ip": "114.32.122.32",
"port": 4002
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug 114.32.122.32 4002
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=114.32.122.32 port=4002
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint 6e6641437dab4b1b
INFO client_base.py:106 Connection closed to
.. raw:: html