73.183.161.134
==============
**Connection Banner:**
.. image:: /_static/banners/banner_3acae887b302.png
:alt: Auto-sensing... ! WELCOME! Pixelgrounds MMud (#39077057) Come join us on discord https://discord.gg/yZMHKZTUEC If you already have a User-ID on this system, type it in and press ENTER. Otherwise type "new": If you already have a User-ID on this system, type it in and press ENTER. Otherwise type "new": If you already have a User-ID on this system, type it in and press ENTER. Otherwise type "new":
:class: ansi-banner
:width: 299px
:loading: lazy
Server URLs
-----------
.. raw:: html
Server Info
-----------
- **Server Location**: 🇺🇸 United States (GeoIP)
- **Encoding**: cp437
This server uses a legacy encoding:
``telnetlib3-client --encoding cp437 --force-binary 73.183.161.134 8887``
Telnet Fingerprint
------------------
:ref:`e9e1390d6941c201 `
*This fingerprint is shared by 5 other servers.*
**Options offered by server**: ``BINARY``, ``ECHO``, ``SGA``
**Options requested from client**: ``BINARY``
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "e9e1390d6941c201",
"fingerprint-data": {
"offered-options": [
"BINARY",
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press ENTER.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": \r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press ENTER.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": ",
"banner_before_return": "Auto-sensing...\r\n \u001b[!\b\b\b\r\u0001\u0001\u0001\u0001\u0001\u0001\u0001\u0001\u0001\b\b\b\b\b\b\b\b\b\u001b[0m\r\n\r\n \u001b[1;5;35mWELCOME!\r\n\r\n\u001b[0;1;32mPixelgrounds MMud (#39077057)\r\n\r\n\r\n\r\nCome join us on discord\r\nhttps://discord.gg/yZMHKZTUEC\r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press ENTER.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "cp437",
"option_states": {
"server_offered": {
"AARDWOLF": false,
"ATCP": false,
"BINARY": true,
"ECHO": true,
"GMCP": false,
"MCCP2": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"SGA": true,
"ZMP": false
},
"server_requested": {
"AARDWOLF": false,
"ATCP": false,
"BINARY": true,
"GMCP": false,
"MCCP2": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"ZMP": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.15982365608215332,
"total": 17.341991901397705
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:10:06.267968+00:00",
"host": "73.183.161.134",
"ip": "73.183.161.134",
"port": 8887
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug 73.183.161.134 8887
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1200 Fingerprint client: host=73.183.161.134 port=8887
ERROR client.py:1318 73.183.161.134:8887: TCP connection to 73.183.161.134:8887 timed out after 30.0s
.. raw:: html