blackfire.online ================ .. raw:: html .. raw:: html

blackfire.online:4000

Telnet Fingerprint ------------------ :ref:`8d9ec9f191ea1be9... ` *This fingerprint is shared by 110 other servers.* **Data source**: `8d9ec9f191ea1be9/f098776bc0f8400a.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8d9ec9f191ea1be9", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [] }, "session_data": { "banner_after_return": "\r\n\u001b[37m \u001b[31m`9XXXXXXXXXXXP'\u001b[37m \u001b[31m`9XX'\u001b[37m \u001b[1;33mshalt\u001b[0;37;0m \u001b[31m`98v89'\u001b[37m \u001b[1;33msuffer\u001b[0;31;3m `XXP'\u001b[37m \u001b[31m`9XXXXXXXXXXXP'\r\n\u001b[37m \u001b[31m~~~~~~~\u001b[37m \u001b[31m9X.\u001b[37m \u001b[31m.db|db.\u001b[37m \u001b[31m.XP\u001b[37m \u001b[31m~~~~~~~\r\n\u001b[37m \u001b[31m)b.\u001b[37m \u001b[31m.dbo.dP'`v'`9b.odb.\u001b[37m \u001b[31m.dX(\r\n\u001b[37m \u001b[31m,dXXXXXXXXXXXb\u001b[37m \u001b[31mdXXXXXXXXXXXb.\r\n\u001b[37m \u001b[31mdXXXXXXXXXXXP'\u001b[37m \u001b[31m.\u001b[37m \u001b[31m`9XXXXXXXXXXXb\r\n\u001b[37m \u001b[31mdXXXXXXXXXXXXb\u001b[37m \u001b[31md|b\u001b[37m \u001b[31mdXXXXXXXXXXXXb\r\n\u001b[37m \u001b[31mgXXb'\u001b[37m \u001b[31m`XXXXXb.dX|Xb.dXXXXX'\u001b[37m \u001b[31m`dXXP\r\n\u001b[37m \u001b[31m`'\u001b[37m \u001b[31m9XXXXXX(\u001b[37m \u001b[31m)XXXXXXP\u001b[37m \u001b[31m`'\r\n\u001b[37m \u001b[31mXXXX\u001b[37m \u001b[31mX.`v'.X\u001b[37m \u001b[31mXXXX\r\n\u001b[37m \u001b[31mXP^X'`b\u001b[37m \u001b[31md'`X^XX\r\n\u001b[37m \u001b[31mX.\u001b[37m \u001b[31m9\u001b[37m \u001b[31m`\u001b[37m ", "banner_before_return": "\r\n\r\n\u001b[36m\r\n\r\n\u001b[2J\u001b[H\u001b[0m\u001b[37m \u001b[31m .\u001b[37m \u001b[31m.\r\n\u001b[37m \u001b[31m.n\u001b[37m \u001b[31m.\u001b[37m \u001b[31m.\u001b[37m \u001b[31mn.\r\n\u001b[37m \u001b[31m.\u001b[37m \u001b[31m.dP\u001b[37m \u001b[31mdP\u001b[37m \u001b[31m9b\u001b[37m \u001b[31m9b.\u001b[37m \u001b[31m.\r\n\u001b[37m \u001b[31m4\u001b[37m \u001b[31mqXb\u001b[37m \u001b[31m.\u001b[37m \u001b[31mdX\u001b[37m \u001b[31mXb\u001b[37m \u001b[31m.\u001b[37m \u001b[31mdXp\u001b[37m \u001b[31mt\r\ndX.\u001b[37m \u001b[31mgXb\u001b[37m \u001b[31m.dXb\u001b[37m \u001b[31m__\u001b[37m \u001b[31m__\u001b[37m \u001b[31mdXb.\u001b[37m \u001b[31mdXp\u001b[37m \u001b[31m.Xb\r\ngXXb._\u001b[37m \u001b[31m_.dXXXXb\u001b[37m \u001b[31mdXXXXbo.\u001b[37m \u001b[1;33m thou\u001b[0;37;0m \u001b[31m.odXXXXb\u001b[37m \u001b[31mdXXXXb._\u001b[37m \u001b[31m_.dXXP\r\n\u001b[37m \u001b[31mgXXXXXXXXXXXXXXXXXXXXXXXXXXXXOo.\u001b[37m \u001b[31m.oOXXXXXXXXVXXXXXXXXXXXXXXXXXXXP\r\n\u001b[37m \u001b[31m`9XXXXXXXXXXXXXXXXXXXXX'~\u001b[37m \u001b[31m~`0008b\u001b[37m \u001b[31md8000'~\u001b[37m \u001b[31m~`XXXXXXXXXXXXXXXXXXXXXP'", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "timing": { "probe": 0.5036013126373291, "total": 1.004431962966919 } } }, "sessions": [ { "connected": "2026-02-08T05:56:20.906606+00:00", "host": "blackfire.online", "ip": "31.220.4.180", "port": 4000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=blackfire.online port=4000 INFO client_base.py:174 Connected to DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug blackfire.online 4000