groundzero2.duckdns.org
=======================
.. raw:: html
Resolving hostname and negotiating connection options.
Scenario : GZ2 Default Scenario
Round started : Sun Feb 8 16:55:23 2026
System time : Sun Feb 8 17:14:24 2026
Time Left in Round : 162 minutes
Most players this boot: 0
.
_______ _______
| _ | _ | Ground Zero Ii - The Second Coming
|. |___|___| | TELNET: groundzero2.duckdns.org 4000
|. | |/ ___/ WEB SITE: None!
|: 1 |: 1 \ Administrative Staff:
|::.. . |::.. . | https://www.facebook.com/groups/25285999988
`-------`-------'
Original DikuMUD by Hans Staerfeldt, Katja Nyboe
Tom Madsen, Michael Seifert, and Sebastian Hammer
Based on MERC 2.1 code by Hatchet, Furey, and Kahn
ROM 2.3 code written by Russ Taylor, copyright 1993-1994
Ground ZERO base by Cory Hilke.
Welcome soldier.
Please state your name, clearly :
.. raw:: html
groundzero2.duckdns.org:4000
⎘
Telnet Fingerprint
------------------
:ref:`c5f425c36a52e5f9... `
*This fingerprint is unique to this server.*
**Options requested from client**: ``LFLOW``, ``NAWS``, ``TTYPE``
**Data source**: `c5f425c36a52e5f9/5c20372b1a26465a.json `_
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. code-block:: json
{
"server-probe": {
"fingerprint": "c5f425c36a52e5f9",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"LFLOW",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "Resolving hostname and negotiating connection options.\r\n\r\nScenario : GZ2 Default Scenario\r\nRound started : Sun Feb 8 16:55:23 2026\n\rSystem time : Sun Feb 8 17:14:24 2026\n\rTime Left in Round : 162 minutes\r\nMost players this boot: 0\r\n.\r\n\u001b[0;37m _______ _______ \r\n | _ | _ | \u001b[1;31mGround Zero Ii \u001b[30m-\u001b[31m The Second Coming\u001b[0;37m\r\n |. |___|___| | TELNET: \u001b[36mgroundzero2.duckdns.org 4000\u001b[0;37m\r\n |. | |/ ___/ WEB SITE: \u001b[36mNone!\u001b[0;37m\r\n |: 1 |: 1 \\ Administrative Staff:\r\n |::.. . |::.. . | https://www.facebook.com/groups/25285999988\r\n `-------`-------'\r\n\r\n Original DikuMUD by Hans Staerfeldt, Katja Nyboe\r\n Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n Based on MERC 2.1 code by Hatchet, Furey, and Kahn\r\n ROM 2.3 code written by Russ Taylor, copyright 1993-1994\r\n Ground ZERO base by Cory Hilke.\r\n\r\nWelcome soldier.\r\nPlease state your name, clearly : ",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {
"LFLOW": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.6083784103393555
}
}
},
"sessions": [
{
"connected": "2026-02-08T17:14:30.703977+00:00",
"host": "groundzero2.duckdns.org",
"ip": "35.212.169.241",
"port": 4000
}
]
}
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
.. code-block:: text
DEBUG client.py:770 Fingerprint client: host=groundzero2.duckdns.org port=4000
INFO client_base.py:174 Connected to
DEBUG stream_writer.py:697 recv IAC DO LFLOW
DEBUG stream_writer.py:1739 handle_do(LFLOW)
DEBUG stream_writer.py:3036 pending_option[WILL + LFLOW] = True
DEBUG stream_writer.py:938 send IAC WILL LFLOW
DEBUG stream_writer.py:3036 pending_option[SB + LFLOW] = True
DEBUG stream_writer.py:3036 local_option[LFLOW] = True
DEBUG stream_writer.py:3036 pending_option[WILL + LFLOW] = False
DEBUG stream_writer.py:697 recv IAC DO TTYPE
DEBUG stream_writer.py:1739 handle_do(TTYPE)
DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:938 send IAC WILL TTYPE
DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3036 local_option[TTYPE] = True
DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:697 recv IAC DO NAWS
DEBUG stream_writer.py:1739 handle_do(NAWS)
DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:938 send IAC WILL NAWS
DEBUG stream_writer.py:2306 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3036 local_option[NAWS] = True
DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:689 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:676 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2203 recv TTYPE SEND: b''
DEBUG stream_writer.py:2214 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:689 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:676 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2031 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2203 recv TTYPE SEND: b''
DEBUG stream_writer.py:2214 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB LFLOW'
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to
INFO fingerprinting.py:737 new server fingerprint c5f425c36a52e5f9
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug groundzero2.duckdns.org 4000