darklordmud.duckdns.org ======================= .. raw:: html .. raw:: html

darklordmud.duckdns.org:5000

Telnet Fingerprint ------------------ :ref:`8d9ec9f191ea1be9... ` *This fingerprint is shared by 110 other servers.* **Data source**: `8d9ec9f191ea1be9/bc655a7e12a17ebb.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8d9ec9f191ea1be9", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [] }, "session_data": { "banner_after_return": " ::::'/ ''''' \r\n :8a| # # ## \r\n ::88a ### \r\n ::::888a 8a ##::. \r\n ::::::888a88a[]:::: \r\n :::::::::SUNDOGa8a::::. .. ... .. \r\n :::::8::::888:Y8888:::::::::... .:::::::::.... \r\n::':::88::::888::Y88a______________________________________________________ \r\n:: ::::88a::::88a:Y88a __---__-- __ \r\n' .: ::Y88a:::::8a:Y88a __----_-- -------_-__ \r\n :' ::::8P::::::::::88aa. _ _- -- --_ --- __ --- _ _-- \r\n.:: :::::::::::::::::::Y88as88a...s88aa. \r\n\r\nDarklord build v10.11.23 \r\n\r\nBy what name do you wish to be known? ", "banner_before_return": "\r\n ~| \r\n A .:::.:::. \r\n /.\\.. ...':::::::.:::. \r\n ~|.:[\"\"M#:::.... ..::::::::::::::::::::..... \r\n A | # .:::.. s8888a \r\n /.\\ [\"\"M# 888PPI::::.. .::.. \r\n [\"\"M# | # U\"U#U ....:::::::::PPP8888 \r\n | # | # \\ .:/ ::Y8888P \r\n | # | #___| # \r\n | \"--' .-\" \r\n |\"-\"-\"-\"-\"-#-#-## Welcome to Darklord MUD \r\n | # ## ###### ...:::.. \r\n \\ .::::'/ (darklord.no 5000) ...... .. \r\n \\ ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "timing": { "probe": 0.5045309066772461, "total": 1.0055561065673828 } } }, "sessions": [ { "connected": "2026-02-08T06:15:47.322785+00:00", "host": "darklordmud.duckdns.org", "ip": "185.183.182.162", "port": 5000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=darklordmud.duckdns.org port=5000 INFO client_base.py:174 Connected to DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug darklordmud.duckdns.org 5000