cave.extricate.org ================== .. raw:: html .. raw:: html

cave.extricate.org:4000

Telnet Fingerprint ------------------ :ref:`64724f2edb219c51... ` *This fingerprint is shared by 6 other servers.* **Options offered by server**: ``EOR`` **Data source**: `64724f2edb219c51/72f14b7cc6a59eeb.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "64724f2edb219c51", "fingerprint-data": { "offered-options": [ "EOR" ], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [] }, "session_data": { "banner_after_return": "7m\u001b[1m\u001b[31mRuby\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m will increase your might.\r\nQUIT to save and you'll be alright!\r\n\r\n\r\n\u001b[0mAccount: ", "banner_before_return": "\r\nConnecting...\n\u001b[0m\u001b[37mRanvier MUD engine - Version 3.0.0 - https://ranviermud.com\r\nCave - Version 1.0.0 - https://github.com/tgreaves/ranviermud-cave\r\n\r\nYou are entering the noisome darknesses of...\r\n \r\n\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m\u001b[1m\u001b[32m ,adPPYba, ,adPPYYba, 8b d8 ,adPPYba,\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m \r\n\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m\u001b[1m\u001b[32ma8\" \"\" \"\" `Y8 `8b d8' a8P_____88\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m \r\n\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m\u001b[1m\u001b[32m8b ,adPPPPP88 `8b d8' 8PP\"\"\"\"\"\"\" \u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m \r\n\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m\u001b[1m\u001b[32m\"8a, ,aa 88, ,88 `8b,d8' \"8b, ,aa \u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m \r\n\u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m\u001b[1m\u001b[32m`\"Ybbd8\"' `\"8bbdP\"Y8 \"8\" `\"Ybbd8\"' \u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[37m \r\n\r\nOriginal BBC Econet edition: (C) Copyright XOB Software 1985\r\nRanvier implementation: (C) Copyright Tristan Greaves 2019 - 2021\r\n\r\nThough cave be deep and journey weary\r\nGET a weapon to make you cheery.\r\nSTAB with a dagger or HIT with a stick\r\nAnd a foes's demise will be very quick.\r\nThe \u001b[0m\u001b[37m\u001b[1m\u001b[0m\u001b[3", "encoding": "ascii", "option_states": { "server_offered": { "EOR": true }, "server_requested": {} }, "timing": { "probe": 0.5086936950683594, "total": 1.0101194381713867 } } }, "sessions": [ { "connected": "2026-02-08T07:19:16.771104+00:00", "host": "cave.extricate.org", "ip": "80.229.19.209", "port": 4000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=cave.extricate.org port=4000 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC WILL EOR DEBUG stream_writer.py:713 WILL EOR unsolicited DEBUG stream_writer.py:1869 handle_will(EOR) DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 remote_option[EOR] = True DEBUG stream_writer.py:3036 pending_option[DO + EOR] = False DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True DEBUG stream_writer.py:938 send IAC DO ECHO DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint 21cbe4a25a62243a INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug cave.extricate.org 4000