Eldamar ======= **Connection Banner:** .. image:: /_static/banners/banner_bec311c7bb88.png :alt: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* E L D A M A R \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* Enter your character name: > :class: ansi-banner :width: 451px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Codebase**: EmpireMUD 2.0 beta 5.186 - **Genre**: Fantasy - **Gameplay**: Adventure, Hack and Slash, Player versus Player, Player versus Environment, Roleplaying, Simulation - **Players online**: 0 [#scan]_ - **Uptime**: 120 days - **Created**: 2015 - **Status**: Live - **Server Location**: 🇺🇸 United States (GeoIP) - **Language**: English Protocol Support ---------------- MUD-specific protocols detected via MSSP flags or Telnet negotiation. - **MSSP**: :proto-yes:`Yes` (MSSP) - **GMCP**: :proto-no:`No` - **MSDP**: :proto-yes:`Yes` (MSSP) - **MCCP**: :proto-no:`No` - **MCCP2**: :proto-no:`No` - **MXP**: :proto-yes:`Yes` (MSSP) - **MSP**: :proto-yes:`Yes` (MSSP) - **MCP**: :proto-no:`No` - **ZMP**: :proto-no:`No` Telnet Fingerprint ------------------ :ref:`2d1d3bcf28abae7b ` *This fingerprint is shared by 54 other servers.* **Options requested from client**: ``ATCP``, ``CHARSET``, ``MXP``, ``NAWS``, ``TTYPE`` The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "2d1d3bcf28abae7b", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [ "ATCP", "CHARSET", "MXP", "NAWS", "TTYPE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\r\n \u001b[0;33m***************************************\r\n \r\n\t E L D A M A R \r\n ***************************************\r\n \r\nEnter your character name:\r\n> \u001b[7z", "dsr_replies": 0, "dsr_requests": 0, "encoding": "UTF-8", "mssp": { "ADULT MATERIAL": "0", "ANSI": "1", "AREAS": "96", "ATCP": "1", "CLASSES": "1", "CODEBASE": "EmpireMUD 2.0 beta 5.186", "CONTACT": "", "CRAWL DELAY": "-1", "CREATED": "2015", "DBSIZE": "10310", "EQUIPMENT SYSTEM": "Level and Skill", "EXTRA DESCRIPTIONS": "5052", "FAMILY": "DikuMUD", "GAMEPLAY": "Adventure, Hack and Slash, Player versus Player, Player versus Environment, Roleplaying, Simulation", "GAMESYSTEM": "Custom", "GENRE": "Fantasy", "GMCP": "0", "HELPFILES": "1917", "HIRING BUILDERS": "0", "HIRING CODERS": "0", "HOSTNAME": "", "ICON": "", "INTERMUD": "", "IP": "", "LANGUAGE": "English", "LEVELS": "400", "LOCATION": "", "MCCP": "0", "MCP": "0", "MINIMUM AGE": "", "MOBILES": "1221", "MSDP": "1", "MSP": "1", "MUDPROGS": "0", "MUDTRIGS": "1509", "MULTICLASSING": "1", "MULTIPLAYING": "No", "MXP": "1", "NAME": "Eldamar", "NEWBIE FRIENDLY": "1", "OBJECTS": "2863", "PAY FOR PERKS": "0", "PAY TO PLAY": "0", "PLAYER CITIES": "1", "PLAYER CLANS": "1", "PLAYER CRAFTING": "1", "PLAYER GUILDS": "1", "PLAYERKILLING": "Restricted", "PLAYERS": "0", "PORT": "4242", "PUEBLO": "0", "QUEST SYSTEM": "Integrated", "RACES": "0", "RESETS": "0", "ROLEPLAYING": "Encouraged", "ROOMS": "6203", "SKILLS": "314", "SSL": "0", "STATUS": "Live", "SUBGENRE": "Medieval Fantasy", "TRAINING SYSTEM": "Skill", "UPTIME": "1760636785", "UTF-8": "1", "VT100": "0", "WEBSITE": "eldamar.online", "WORLD ORIGINALITY": "All Original", "XTERM 256 COLORS": "1", "ZMP": "0" }, "mxp": [ "activated" ], "option_states": { "server_offered": { "MSDP": true, "MSP": true, "MSSP": true }, "server_requested": { "ATCP": true, "CHARSET": true, "MXP": true, "NAWS": true, "TTYPE": true } }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 2.671679735183716 } } }, "sessions": [ { "connected": "2026-02-14T17:12:15.392893+00:00", "host": "165.227.179.255", "ip": "165.227.179.255", "port": 4242 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 165.227.179.255 4242 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=165.227.179.255 port=4242 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:707 recv IAC DO TTYPE DEBUG stream_writer.py:1770 handle_do(TTYPE) DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True DEBUG stream_writer.py:950 send IAC WILL TTYPE DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True DEBUG stream_writer.py:3174 local_option[TTYPE] = True DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False DEBUG stream_writer.py:1323 IAC GA: Go-Ahead (unhandled). DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False DEBUG stream_writer.py:2241 recv TTYPE SEND: b'' DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG stream_writer.py:707 recv IAC DO NAWS DEBUG stream_writer.py:1770 handle_do(NAWS) DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True DEBUG stream_writer.py:950 send IAC WILL NAWS DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE DEBUG stream_writer.py:3174 local_option[NAWS] = True DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:707 recv IAC DO CHARSET DEBUG stream_writer.py:1770 handle_do(CHARSET) DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True DEBUG stream_writer.py:950 send IAC WILL CHARSET DEBUG stream_writer.py:3174 local_option[CHARSET] = True DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False DEBUG stream_writer.py:707 recv IAC WILL MSDP DEBUG stream_writer.py:723 WILL MSDP unsolicited DEBUG stream_writer.py:1900 handle_will(MSDP) DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 remote_option[MSDP] = True DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False DEBUG stream_writer.py:707 recv IAC WILL MSSP DEBUG stream_writer.py:723 WILL MSSP unsolicited DEBUG stream_writer.py:1900 handle_will(MSSP) DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 remote_option[MSSP] = True DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False DEBUG stream_writer.py:707 recv IAC DO ATCP DEBUG stream_writer.py:1770 handle_do(ATCP) DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True DEBUG stream_writer.py:950 send IAC WILL ATCP DEBUG stream_writer.py:3174 local_option[ATCP] = True DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False DEBUG stream_writer.py:707 recv IAC WILL MSP DEBUG stream_writer.py:723 WILL MSP unsolicited DEBUG stream_writer.py:1900 handle_will(MSP) DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 remote_option[MSP] = True DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False DEBUG stream_writer.py:707 recv IAC DO MXP DEBUG stream_writer.py:1770 handle_do(MXP) DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True DEBUG stream_writer.py:950 send IAC WILL MXP DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True DEBUG stream_writer.py:3174 local_option[MXP] = True DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited DEBUG stream_writer.py:2241 recv TTYPE SEND: b'' DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited DEBUG client.py:304 encoding negotiated: UTF-8 DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'Eldamar'} DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited DEBUG stream_writer.py:1673 MSSP: {'NAME': 'Eldamar', 'PLAYERS': '0', 'UPTIME': '1760636785', 'CRAWL DELAY': '-1', 'HOSTNAME': '', 'PORT': '4242', 'CODEBASE': 'EmpireMUD 2.0 beta 5.186', 'CONTACT': '', 'CREATED': '2015', 'ICON': '', 'IP': '', 'LANGUAGE': 'English', 'LOCATION': '', 'MINIMUM AGE': '', 'WEBSITE': 'eldamar.online', 'FAMILY': 'DikuMUD', 'GENRE': 'Fantasy', 'GAMEPLAY': 'Adventure, Hack and Slash, Player versus Player, Player versus Environment, Roleplaying, Simulation', 'STATUS': 'Live', 'GAMESYSTEM': 'Custom', 'INTERMUD': '', 'SUBGENRE': 'Medieval Fantasy', 'AREAS': '96', 'HELPFILES': '1917', 'MOBILES': '1221', 'OBJECTS': '2863', 'ROOMS': '6203', 'CLASSES': '1', 'LEVELS': '400', 'RACES': '0', 'SKILLS': '314', 'ANSI': '1', 'GMCP': '0', 'MCCP': '0', 'MCP': '0', 'MSDP': '1', 'MSP': '1', 'MXP': '1', 'PUEBLO': '0', 'UTF-8': '1', 'VT100': '0', 'XTERM 256 COLORS': '1', 'PAY TO PLAY': '0', 'PAY FOR PERKS': '0', 'HIRING BUILDERS': '0', 'HIRING CODERS': '0', 'DBSIZE': '10310', 'EXTRA DESCRIPTIONS': '5052', 'MUDPROGS': '0', 'MUDTRIGS': '1509', 'RESETS': '0', 'ADULT MATERIAL': '0', 'MULTICLASSING': '1', 'NEWBIE FRIENDLY': '1', 'PLAYER CITIES': '1', 'PLAYER CLANS': '1', 'PLAYER CRAFTING': '1', 'PLAYER GUILDS': '1', 'EQUIPMENT SYSTEM': 'Level and Skill', 'MULTIPLAYING': 'No', 'PLAYERKILLING': 'Restricted', 'QUEST SYSTEM': 'Integrated', 'ROLEPLAYING': 'Encouraged', 'TRAINING SYSTEM': 'Skill', 'WORLD ORIGINALITY': 'All Original', 'ATCP': '1', 'SSL': '0', 'ZMP': '0'} DEBUG stream_writer.py:699 begin sub-negotiation SB MXP DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False DEBUG stream_writer.py:1682 MXP: b'' DEBUG client_base.py:89 EOF from server, closing. INFO client_base.py:106 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b .. raw:: html
.. [#scan] measured 2026-02-14 at 17:12 UTC