185.26.59.68
============
**Connection Banner:**
.. image:: /_static/banners/banner_30c4faf480b8.png
:alt: Welcome to the Pattern. After login, the following commands are available: - users see who is logged on - say, ', emote, : communication - quit leave the mud login: Access denied.
:class: ansi-banner
:width: 400px
:loading: lazy
Server URLs
-----------
.. raw:: html
Server Info
-----------
- **Server Location**: 🇳🇱 The Netherlands (GeoIP)
Telnet Fingerprint
------------------
:ref:`98ef96f171413a1c `
*This fingerprint is shared by 5 other servers.*
**Options requested from client**: ``LINEMODE``
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "98ef96f171413a1c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"LINEMODE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "Access denied.\r\n\r\n",
"banner_before_return": "\r\nWelcome to the Pattern.\r\n\r\nAfter login, the following commands are available:\r\n - users see who is logged on\r\n - say, ', emote, : communication\r\n - quit leave the mud\r\n\r\nlogin: ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": false
},
"server_requested": {
"LINEMODE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.5214216709136963
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:09.665696+00:00",
"host": "185.26.59.68",
"ip": "185.26.59.68",
"port": 6047
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug 185.26.59.68 6047
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=185.26.59.68 port=6047
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WONT ECHO
DEBUG stream_writer.py:2025 handle_wont(ECHO)
DEBUG stream_writer.py:3174 remote_option[ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC DO LINEMODE
DEBUG stream_writer.py:1770 handle_do(LINEMODE)
DEBUG stream_writer.py:3174 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:950 send IAC WILL LINEMODE
DEBUG stream_writer.py:3174 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3174 local_option[LINEMODE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:686 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + LINEMODE] = False
DEBUG stream_writer.py:2544 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE
DEBUG stream_writer.py:1277 set Linemode
DEBUG stream_writer.py:1280 send IAC SB LINEMODE LINEMODE-MODE IAC SE
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to
INFO fingerprinting.py:746 connection for server fingerprint 98ef96f171413a1c
.. raw:: html