alfandria.net ============= .. raw:: html .. raw:: html

alfandria.net:8888

Telnet Fingerprint ------------------ :ref:`8d9ec9f191ea1be9... ` *This fingerprint is shared by 110 other servers.* **Data source**: `8d9ec9f191ea1be9/fd16e11d4aade00e.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8d9ec9f191ea1be9", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [] }, "session_data": { "banner_after_return": "tem, please log in as a guest\r\nand page a wizard for assistance.\r\n\nWe support SSL! Use ports 8899-8902. 8888-8898 for regular connections.\r\n\nTo connect as a guest, `connect guest guest'\r\nTo connect with an existing character, type `connect name password'\r\n", "banner_before_return": "#$#mcp version: \"2.1\" to: \"2.1\"\r\n #### ## ##### #### ##### ##### ##### ## ####\r\n ## ## ## ## ## ## ## ## ## ## ## ## ## ## ##\r\n## ## ## ## ## ## ## ## ## ## ## ## ## ## ##\r\n## ## ## ## ## ## ## ## ## ## ## ## ## ## ##\r\n######## ## #### ######## ## ## ## ## ##### ## ########\r\n## ## ## ## ## ## ## ## ## ## ## ## ## ## ##\r\n## ## ##### ## ## ## ## ## ##### ## ## ## ## ##\r\n## ##\r\n## The official MUCK of Alt.fan.dragons ##\r\n# http://community.livejournal.com/alfandria/ #\r\n Follow @alfandriamuck for status updates\r\n\nAll users MUST read and follow Alfandria's AUP. Type \"news aup\" to\r\nread the AUP document. You may also read it at http://pastebin.com/Gf7EUVF5 By connecting, you agree to be bound to the Acceptable Use Policy.\r\n\nTo register a new character with the sys", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "timing": { "probe": 0.5046968460083008, "total": 1.005530834197998 } } }, "sessions": [ { "connected": "2026-02-08T06:10:32.911836+00:00", "host": "alfandria.net", "ip": "142.93.69.137", "port": 8888 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=alfandria.net port=8888 INFO client_base.py:174 Connected to DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True DEBUG stream_writer.py:938 send IAC DO ECHO DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP DEBUG stream_writer.py:697 recv IAC WONT BINARY DEBUG stream_writer.py:1991 handle_wont(BINARY) DEBUG stream_writer.py:3036 remote_option[BINARY] = False DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = False DEBUG stream_writer.py:697 recv IAC WONT SGA DEBUG stream_writer.py:1991 handle_wont(SGA) DEBUG stream_writer.py:3036 remote_option[SGA] = False DEBUG stream_writer.py:3036 pending_option[DO + SGA] = False DEBUG stream_writer.py:697 recv IAC WONT ECHO DEBUG stream_writer.py:1991 handle_wont(ECHO) DEBUG stream_writer.py:3036 remote_option[ECHO] = False DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = False DEBUG stream_writer.py:697 recv IAC WONT STATUS DEBUG stream_writer.py:1991 handle_wont(STATUS) DEBUG stream_writer.py:3036 remote_option[STATUS] = False DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = False DEBUG stream_writer.py:697 recv IAC WONT CHARSET DEBUG stream_writer.py:1991 handle_wont(CHARSET) DEBUG stream_writer.py:3036 remote_option[CHARSET] = False DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = False DEBUG stream_writer.py:697 recv IAC WONT EOR DEBUG stream_writer.py:1991 handle_wont(EOR) DEBUG stream_writer.py:3036 remote_option[EOR] = False DEBUG stream_writer.py:3036 pending_option[DO + EOR] = False DEBUG stream_writer.py:697 recv IAC WONT COM_PORT_OPTION DEBUG stream_writer.py:1991 handle_wont(COM_PORT_OPTION) DEBUG stream_writer.py:3036 remote_option[COM_PORT_OPTION] = False DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = False DEBUG stream_writer.py:697 recv IAC WONT GMCP DEBUG stream_writer.py:1991 handle_wont(GMCP) DEBUG stream_writer.py:3036 remote_option[GMCP] = False DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = False DEBUG stream_writer.py:697 recv IAC WONT MSDP DEBUG stream_writer.py:1991 handle_wont(MSDP) DEBUG stream_writer.py:3036 remote_option[MSDP] = False DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = False DEBUG stream_writer.py:697 recv IAC WONT MSSP DEBUG stream_writer.py:1991 handle_wont(MSSP) DEBUG stream_writer.py:3036 remote_option[MSSP] = False DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = False DEBUG stream_writer.py:697 recv IAC WONT MSP DEBUG stream_writer.py:1991 handle_wont(MSP) DEBUG stream_writer.py:3036 remote_option[MSP] = False DEBUG stream_writer.py:3036 pending_option[DO + MSP] = False DEBUG stream_writer.py:697 recv IAC WONT MXP DEBUG stream_writer.py:1991 handle_wont(MXP) DEBUG stream_writer.py:3036 remote_option[MXP] = False DEBUG stream_writer.py:3036 pending_option[DO + MXP] = False DEBUG stream_writer.py:697 recv IAC WONT ZMP DEBUG stream_writer.py:1991 handle_wont(ZMP) DEBUG stream_writer.py:3036 remote_option[ZMP] = False DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = False DEBUG stream_writer.py:697 recv IAC WONT AARDWOLF DEBUG stream_writer.py:1991 handle_wont(AARDWOLF) DEBUG stream_writer.py:3036 remote_option[AARDWOLF] = False DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = False DEBUG stream_writer.py:697 recv IAC WONT ATCP DEBUG stream_writer.py:1991 handle_wont(ATCP) DEBUG stream_writer.py:3036 remote_option[ATCP] = False DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = False INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug alfandria.net 8888