ifmud.port4000.com
==================
**Connection Banner:**
.. image:: /_static/banners/banner_99b1f3f36952.png
:alt: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* \*\* \*\* \*\* Welcome to ifMUD! \*\* \*\* \*\* \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* FAQ: http://www.allthingsjacq.com/ifMUDfaq/ IP: 66.114.68.227 MONKEY: Ook. If you... have an account Type "connect name password" to log in need an account Go to http://ifmud.port4000.com:4001/ and apply are just visiting Type "connect guest guest" to login as Guest want to see who's on Type "who" for a list of players online have problems Login as Guest, type "lounge", and ask for a wizard or type "wizards my problem is .β.." to leave a message (include your email address if you want a reply) TYPE connect, who, or quit:
:class: ansi-banner
:width: 626px
:loading: lazy
Server URLs
-----------
.. raw:: html
Server Info
-----------
- **Server Location**: πΊπΈ United States (GeoIP)
Telnet Fingerprint
------------------
:ref:`a8a260cc4662430c `
*This fingerprint is shared by 219 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "************************************************************************\r\n** **\r\n** Welcome to ifMUD! **\r\n** **\r\n************************************************************************\r\n\r\n FAQ: http://www.allthingsjacq.com/ifMUDfaq/\r\n IP:\t\t66.114.68.227\r\n MONKEY: Ook.\r\n\r\nIf you...\r\n have an account Type \"connect name password\" to log in\r\n need an account Go to http://ifmud.port4000.com:4001/ and apply\r\n are just visiting Type \"connect guest guest\" to login as Guest\r\n want to see who's on Type \"who\" for a list of players online\r\n have problems Login as Guest, type \"lounge\", and ask for a wizard\r\n or type \"wizards my problem is ...\" to leave a message\r\n (include your email address if you want a reply)\r\n\r\nTYPE connect, who, or quit:\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5111849308013916,
"total": 5.01856803894043
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:31.304057+00:00",
"host": "ifmud.port4000.com",
"ip": "173.255.227.103",
"port": 4000
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug ifmud.port4000.com 4000
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=ifmud.port4000.com port=4000
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to
.. raw:: html