73.183.161.134 ============== **Connection Banner:** .. image:: /_static/banners/banner_3acae887b302.png :alt: Auto-sensing... !  WELCOME! Pixelgrounds MMud (#39077057) Come join us on discord https://discord.gg/yZMHKZTUEC If you already have a User-ID on this system, type it in and press ENTER. Otherwise type "new": If you already have a User-ID on this system, type it in and press ENTER. Otherwise type "new": If you already have a User-ID on this system, type it in and press ENTER. Otherwise type "new": :class: ansi-banner :width: 299px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Server Location**: 🇺🇸 United States (GeoIP) - **Encoding**: cp437 This server uses a legacy encoding: ``telnetlib3-client --encoding cp437 --force-binary 73.183.161.134 8887`` Telnet Fingerprint ------------------ :ref:`e9e1390d6941c201 ` *This fingerprint is shared by 5 other servers.* **Options offered by server**: ``BINARY``, ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY`` The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "e9e1390d6941c201", "fingerprint-data": { "offered-options": [ "BINARY", "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "CHARSET", "COM_PORT", "EOR", "GMCP", "MCCP2", "MCCP3", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press ENTER.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": \r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press ENTER.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": ", "banner_before_return": "Auto-sensing...\r\n \u001b[!\b\b\b\r\u0001\u0001\u0001\u0001\u0001\u0001\u0001\u0001\u0001\b\b\b\b\b\b\b\b\b\u001b[0m\r\n\r\n \u001b[1;5;35mWELCOME!\r\n\r\n\u001b[0;1;32mPixelgrounds MMud (#39077057)\r\n\r\n\r\n\r\nCome join us on discord\r\nhttps://discord.gg/yZMHKZTUEC\r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press ENTER.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "cp437", "option_states": { "server_offered": { "AARDWOLF": false, "ATCP": false, "BINARY": true, "ECHO": true, "GMCP": false, "MCCP2": false, "MCCP3": false, "MSDP": false, "MSP": false, "MSSP": false, "MXP": false, "SGA": true, "ZMP": false }, "server_requested": { "AARDWOLF": false, "ATCP": false, "BINARY": true, "GMCP": false, "MCCP2": false, "MCCP3": false, "MSDP": false, "MSP": false, "MSSP": false, "MXP": false, "ZMP": false } }, "scan_type": "quick", "timing": { "probe": 0.15982365608215332, "total": 17.341991901397705 } } }, "sessions": [ { "connected": "2026-03-07T04:10:06.267968+00:00", "host": "73.183.161.134", "ip": "73.183.161.134", "port": 8887 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 73.183.161.134 8887 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1200 Fingerprint client: host=73.183.161.134 port=8887 ERROR client.py:1318 73.183.161.134:8887: TCP connection to 73.183.161.134:8887 timed out after 30.0s .. raw:: html