BrutusMUD
=========
.. raw:: html
__________
\______ \ _____ __ __ _______ __ __ _____
| | _/| _ \| | ||_ _|| | || ___|
| | \| /| | | | | | | ||___ |
/ ______ /|__|__\|_____| |__| |_____||_____|
\/ \/
BRUTUS MUD
Created by
Andy, Angela & Huan
(with help of many others)
Inspired by CircleMUD 3.0,
(created by Jeremy Elson)
CircleMUD is derivative of DikuMUD (GAMMA 0.0)
Created by
Hans Henrik Staerfeldt, Katja Nyboe,
Tom Madsen, Michael Seifert, and Sebastian Hammer
By what name do you wish to be known?
.. raw:: html
brutusmud.net:4444
⎘
Server Info
-----------
- **Codebase**: BrutusMud 0-20260111-brutusmud
- **Family**: MUD
- **Genre**: Fantasy
- **Gameplay**: Hack-n-Slash
- **Players online**: 3 [#scan]_
- **Uptime**: 1 days
- **Created**: 1997
- **Status**: Live
- **Website**: `https://brutusmud.net `_
- **Location**: Ireland
- **Language**: English
Protocol Support
----------------
MUD-specific protocols detected via MSSP flags or
Telnet negotiation.
- **MSSP**: :proto-yes:`Yes` (MSSP)
- **GMCP**: :proto-yes:`Yes` (MSSP)
- **MSDP**: :proto-no:`No`
- **MCCP**: :proto-yes:`Yes` (MSSP)
- **MCCP2**: :proto-no:`No`
- **MXP**: :proto-no:`No`
- **MSP**: :proto-no:`No`
- **MCP**: :proto-no:`No`
- **ZMP**: :proto-no:`No`
Telnet Fingerprint
------------------
:ref:`8d9ec9f191ea1be9... `
*This fingerprint is shared by 110 other servers.*
**Data source**: `8d9ec9f191ea1be9/633c599dab805d1d.json `_
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. code-block:: json
{
"server-probe": {
"fingerprint": "8d9ec9f191ea1be9",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"CHARSET",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": []
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\u001b[H\u001b[J\r\n\r\n __________ \r\n \\______ \\ _____ __ __ _______ __ __ _____ \r\n | | _/| _ \\| | ||_ _|| | || ___| \r\n | | \\| /| | | | | | | ||___ | \r\n / ______ /|__|__\\|_____| |__| |_____||_____| \r\n \\/ \\/ \r\n BRUTUS MUD\r\n\r\n Created by\r\n Andy, Angela & Huan\r\n (with help of many others)\r\n\r\n Inspired by CircleMUD 3.0,\r\n (created by Jeremy Elson)\r\n\r\n CircleMUD is derivative of DikuMUD (GAMMA 0.0)\r\n Created by\r\n Hans Henrik Staerfeldt, Katja Nyboe,\r\n Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n\r\n\r\n\r\n\r\nBy what name do you wish to be known? ",
"encoding": "ascii",
"mssp": {
"ANSI": "1",
"AREAS": "358",
"CLASSES": "12",
"CODEBASE": "BrutusMud 0-20260111-brutusmud",
"CONTACT": "andy@brutusmud.net",
"CREATED": "1997",
"FAMILY": "MUD",
"GAMEPLAY": "Hack-n-Slash",
"GAMESYSTEM": "Custom",
"GENRE": "Fantasy",
"GMCP": "1",
"HOSTNAME": "brutusmud.net",
"LANGUAGE": "English",
"LEVELS": "220",
"LOCATION": "Ireland",
"MCCP": "1",
"MCP": "0",
"MSDP": "0",
"MSP": "0",
"MXP": "0",
"NAME": "BrutusMUD",
"OBJECTS": "18003",
"PLAYERS": "3",
"PORT": "4444",
"PUEBLO": "0",
"RACES": "19",
"ROOMS": "39790",
"SKILLS": "4988",
"STATUS": "Live",
"UPTIME": "1770384585",
"UTF-8": "0",
"VT100": "0",
"WEBSITE": "https://brutusmud.net",
"XTERM COLORS": "1"
},
"option_states": {
"server_offered": {
"0x56": false,
"MSSP": true
},
"server_requested": {}
},
"timing": {
"probe": 0.5034880638122559,
"total": 1.1252615451812744
}
}
},
"sessions": [
{
"connected": "2026-02-08T04:45:34.361722+00:00",
"host": "brutusmud.net",
"ip": "93.107.43.213",
"port": 4444
}
]
}
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
.. code-block:: text
DEBUG client.py:770 Fingerprint client: host=brutusmud.net port=4444
INFO client_base.py:174 Connected to
DEBUG stream_writer.py:697 recv IAC WILL MSSP
DEBUG stream_writer.py:713 WILL MSSP unsolicited
DEBUG stream_writer.py:1869 handle_will(MSSP)
DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:938 send IAC DO MSSP
DEBUG stream_writer.py:3036 remote_option[MSSP] = True
DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:689 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:676 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2031 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1642 MSSP: {'NAME': 'BrutusMUD', 'UPTIME': '1770564637', 'PLAYERS': '3', 'CODEBASE': 'BrutusMud
0-20260111-brutusmud', 'CREATED': '1997', 'OBJECTS': '18003', 'ROOMS': '39790', 'SKILLS': '4988', 'HOSTNAME': 'brutusmud.net',
'PORT': '4444', 'CONTACT': 'andy@brutusmud.net', 'LANGUAGE': 'English', 'LOCATION': 'Ireland', 'WEBSITE':
'https://brutusmud.net', 'FAMILY': 'MUD', 'GENRE': 'Fantasy', 'GAMEPLAY': 'Hack-n-Slash', 'STATUS': 'Live', 'GAMESYSTEM':
'Custom', 'AREAS': '358', 'CLASSES': '12', 'LEVELS': '220', 'RACES': '19', 'ANSI': '1', 'GMCP': '1', 'MCCP': '1', 'MCP': '0',
'MSDP': '0', 'MSP': '0', 'MXP': '0', 'PUEBLO': '0', 'UTF-8': '0', 'VT100': '0', 'XTERM COLORS': '1'}
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:697 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:713 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1869 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3036 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:938 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:1974 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:697 recv IAC WILL ECHO
DEBUG stream_writer.py:713 WILL ECHO unsolicited
DEBUG stream_writer.py:1869 handle_will(ECHO)
DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:938 send IAC DO ECHO
DEBUG stream_writer.py:3036 remote_option[ECHO] = True
DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:938 send IAC DO BINARY
DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True
DEBUG stream_writer.py:938 send IAC DO SGA
DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:938 send IAC DO STATUS
DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:938 send IAC DO CHARSET
DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True
DEBUG stream_writer.py:938 send IAC DO EOR
DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:938 send IAC DO GMCP
DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:938 send IAC DO MSDP
DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True
DEBUG stream_writer.py:938 send IAC DO MSP
DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True
DEBUG stream_writer.py:938 send IAC DO MXP
DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:938 send IAC DO ZMP
DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:938 send IAC DO AARDWOLF
DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:938 send IAC DO ATCP
DEBUG stream_writer.py:697 recv IAC WONT BINARY
DEBUG stream_writer.py:1991 handle_wont(BINARY)
DEBUG stream_writer.py:3036 remote_option[BINARY] = False
DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:697 recv IAC WONT SGA
DEBUG stream_writer.py:1991 handle_wont(SGA)
DEBUG stream_writer.py:3036 remote_option[SGA] = False
DEBUG stream_writer.py:3036 pending_option[DO + SGA] = False
DEBUG stream_writer.py:697 recv IAC WONT STATUS
DEBUG stream_writer.py:1991 handle_wont(STATUS)
DEBUG stream_writer.py:3036 remote_option[STATUS] = False
DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:697 recv IAC WONT CHARSET
DEBUG stream_writer.py:1991 handle_wont(CHARSET)
DEBUG stream_writer.py:3036 remote_option[CHARSET] = False
DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:697 recv IAC WONT EOR
DEBUG stream_writer.py:1991 handle_wont(EOR)
DEBUG stream_writer.py:3036 remote_option[EOR] = False
DEBUG stream_writer.py:3036 pending_option[DO + EOR] = False
DEBUG stream_writer.py:697 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:1991 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3036 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:697 recv IAC WONT MSDP
DEBUG stream_writer.py:1991 handle_wont(MSDP)
DEBUG stream_writer.py:3036 remote_option[MSDP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:697 recv IAC WONT MSP
DEBUG stream_writer.py:1991 handle_wont(MSP)
DEBUG stream_writer.py:3036 remote_option[MSP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MSP] = False
DEBUG stream_writer.py:697 recv IAC WONT MXP
DEBUG stream_writer.py:1991 handle_wont(MXP)
DEBUG stream_writer.py:3036 remote_option[MXP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MXP] = False
DEBUG stream_writer.py:697 recv IAC WONT ZMP
DEBUG stream_writer.py:1991 handle_wont(ZMP)
DEBUG stream_writer.py:3036 remote_option[ZMP] = False
DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:697 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:1991 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3036 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:697 recv IAC WONT ATCP
DEBUG stream_writer.py:1991 handle_wont(ATCP)
DEBUG stream_writer.py:3036 remote_option[ATCP] = False
DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = False
INFO fingerprinting.py:737 new server fingerprint 0d2fff943d410a72
INFO client_base.py:105 Connection closed to
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug brutusmud.net 4444
.. [#scan] measured 2026-02-08 at 04:45 UTC