groundzero2.duckdns.org ======================= .. raw:: html .. raw:: html

groundzero2.duckdns.org:4000

Telnet Fingerprint ------------------ :ref:`c5f425c36a52e5f9... ` *This fingerprint is unique to this server.* **Options requested from client**: ``LFLOW``, ``NAWS``, ``TTYPE`` **Data source**: `c5f425c36a52e5f9/5c20372b1a26465a.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "c5f425c36a52e5f9", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [ "LFLOW", "NAWS", "TTYPE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "Resolving hostname and negotiating connection options.\r\n\r\nScenario : GZ2 Default Scenario\r\nRound started : Sun Feb 8 16:55:23 2026\n\rSystem time : Sun Feb 8 17:14:24 2026\n\rTime Left in Round : 162 minutes\r\nMost players this boot: 0\r\n.\r\n\u001b[0;37m _______ _______ \r\n | _ | _ | \u001b[1;31mGround Zero Ii \u001b[30m-\u001b[31m The Second Coming\u001b[0;37m\r\n |. |___|___| | TELNET: \u001b[36mgroundzero2.duckdns.org 4000\u001b[0;37m\r\n |. | |/ ___/ WEB SITE: \u001b[36mNone!\u001b[0;37m\r\n |: 1 |: 1 \\ Administrative Staff:\r\n |::.. . |::.. . | https://www.facebook.com/groups/25285999988\r\n `-------`-------'\r\n\r\n Original DikuMUD by Hans Staerfeldt, Katja Nyboe\r\n Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n Based on MERC 2.1 code by Hatchet, Furey, and Kahn\r\n ROM 2.3 code written by Russ Taylor, copyright 1993-1994\r\n Ground ZERO base by Cory Hilke.\r\n\r\nWelcome soldier.\r\nPlease state your name, clearly : ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": { "LFLOW": true, "NAWS": true, "TTYPE": true } }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 2.6083784103393555 } } }, "sessions": [ { "connected": "2026-02-08T17:14:30.703977+00:00", "host": "groundzero2.duckdns.org", "ip": "35.212.169.241", "port": 4000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=groundzero2.duckdns.org port=4000 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC DO LFLOW DEBUG stream_writer.py:1739 handle_do(LFLOW) DEBUG stream_writer.py:3036 pending_option[WILL + LFLOW] = True DEBUG stream_writer.py:938 send IAC WILL LFLOW DEBUG stream_writer.py:3036 pending_option[SB + LFLOW] = True DEBUG stream_writer.py:3036 local_option[LFLOW] = True DEBUG stream_writer.py:3036 pending_option[WILL + LFLOW] = False DEBUG stream_writer.py:697 recv IAC DO TTYPE DEBUG stream_writer.py:1739 handle_do(TTYPE) DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = True DEBUG stream_writer.py:938 send IAC WILL TTYPE DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = True DEBUG stream_writer.py:3036 local_option[TTYPE] = True DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = False DEBUG stream_writer.py:697 recv IAC DO NAWS DEBUG stream_writer.py:1739 handle_do(NAWS) DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = True DEBUG stream_writer.py:938 send IAC WILL NAWS DEBUG stream_writer.py:2306 send IAC SB NAWS (rows=25, cols=80) IAC SE DEBUG stream_writer.py:3036 local_option[NAWS] = True DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:689 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:676 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = False DEBUG stream_writer.py:2203 recv TTYPE SEND: b'' DEBUG stream_writer.py:2214 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG stream_writer.py:689 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:676 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:2031 [SB + TTYPE] unsolicited DEBUG stream_writer.py:2203 recv TTYPE SEND: b'' DEBUG stream_writer.py:2214 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG client_base.py:463 negotiation failed after 4.00s. DEBUG client_base.py:470 failed-reply: 'SB LFLOW' DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:737 new server fingerprint c5f425c36a52e5f9 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug groundzero2.duckdns.org 4000