ifmud.port4000.com ================== **Connection Banner:** .. image:: /_static/banners/banner_99b1f3f36952.png :alt: \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* \*\* \*\* \*\* Welcome to ifMUD! \*\* \*\* \*\* \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* FAQ: http://www.allthingsjacq.com/ifMUDfaq/ IP: 66.114.68.227 MONKEY: Ook. If you... have an account Type "connect name password" to log in need an account Go to http://ifmud.port4000.com:4001/ and apply are just visiting Type "connect guest guest" to login as Guest want to see who's on Type "who" for a list of players online have problems Login as Guest, type "lounge", and ask for a wizard or type "wizards my problem is .​.." to leave a message (include your email address if you want a reply) TYPE connect, who, or quit: :class: ansi-banner :width: 626px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Telnet Fingerprint ------------------ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "************************************************************************\r\n** **\r\n** Welcome to ifMUD! **\r\n** **\r\n************************************************************************\r\n\r\n FAQ: http://www.allthingsjacq.com/ifMUDfaq/\r\n IP:\t\t66.114.68.227\r\n MONKEY: Ook.\r\n\r\nIf you...\r\n have an account Type \"connect name password\" to log in\r\n need an account Go to http://ifmud.port4000.com:4001/ and apply\r\n are just visiting Type \"connect guest guest\" to login as Guest\r\n want to see who's on Type \"who\" for a list of players online\r\n have problems Login as Guest, type \"lounge\", and ask for a wizard\r\n or type \"wizards my problem is ...\" to leave a message\r\n (include your email address if you want a reply)\r\n\r\nTYPE connect, who, or quit:\r\n", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5111849308013916, "total": 5.01856803894043 } } }, "sessions": [ { "connected": "2026-02-14T17:11:31.304057+00:00", "host": "ifmud.port4000.com", "ip": "173.255.227.103", "port": 4000 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug ifmud.port4000.com 4000 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=ifmud.port4000.com port=4000 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html