admud.com ========= .. raw:: html .. raw:: html

admud.com:1999

Telnet Fingerprint ------------------ :ref:`8230b57f2279de84... ` *This fingerprint is shared by 102 other servers.* **Data source**: `8230b57f2279de84/52a433a9f9c4b5a1.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8230b57f2279de84", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "SGA", "STATUS" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "\n\r\u001b[01;34m\n\r /]\n\r / ]\n\r / ]\n\r / [ ]\n\r / /[ ]\n\r[ / [ ] _]_]_] _]_]_] _]_]_] _]_]_] _]_]_}\n\r[ ]_[ ] _] _] _] _] _] _] _] _] _]\n\r[ _ ] _]_]_] _]_]_] _]_]_] _] _] _]\n\r[ ] [ ] _] _] _] _] _] _] _] _] _]\n\r[ ] [_] _] _] _] _] _] _] _] _] _]\n\r\\ ]\n\r \\]\u001b[01;37m D \u001b[01;30m-\u001b[01;37m E \u001b[01;30m-\u001b[01;37m S \u001b[01;30m-\u001b[01;37m T \u001b[01;30m-\u001b[01;37m I \u001b[01;30m-\u001b[01;37m N \u001b[01;30m-\u001b[01;37m Y\u001b[00;37m\n\r\n\r\u001b[00;36mBeta 1.0.0 - Andrew Baker/Alvin Johnson/Edward Bauler/Tyler Phegley\n\rBased on DikuMud by: Hans Henrik Staerfeldt, Katja Nyboe, Tom Madsen,\n\rMicheal Seifert and Sebastian Hammer. Also see 'help diku' and 'help envy'\n\r\n\r\u001b[01;36mBy what name will you seek your destiny? \u001b[00;37m", "banner_before_return": "Does your client support ANSI color? \n\r", "encoding": "ascii", "option_states": { "server_offered": { "0x66": false }, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5037133693695068, "total": 3.3380677700042725 } } }, "sessions": [ { "connected": "2026-02-08T16:13:53.706636+00:00", "host": "admud.com", "ip": "172.104.12.33", "port": 1999 }, { "connected": "2026-02-08T17:16:56.438237+00:00", "host": "admud.com", "ip": "172.104.12.33", "port": 1999 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=admud.com port=1999 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC WILL AARDWOLF DEBUG stream_writer.py:713 WILL AARDWOLF unsolicited DEBUG stream_writer.py:1869 handle_will(AARDWOLF) DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 remote_option[AARDWOLF] = True DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = False DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True DEBUG stream_writer.py:938 send IAC DO ECHO DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP INFO fingerprinting.py:737 new server fingerprint a3d6aaf3bf9a2101 INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug admud.com 1999