104.131.109.59 (muck.narniamuck.org)
====================================
.. _ip_104_131_109_59_muck_narniamuck_org_2050:
muck.narniamuck.org:2050
------------------------
**Connection Banner:**
.. image:: /_static/banners/banner_5da59ab31383.png
:alt: -\*-\*-\*-\*-\*-\*-\*- ,MMMMMMMMA. ,M;' \`YV' WELCOME TO AM' ,OMA, AM\| \`~VMM,. .,ama,____,amma,.. N A R N I A MML )MMMD .AMMMMMMMMMMMMMMMMMMD. M U C K VMMM .AMMY' ,AMMMMMMMMMMMMMMMMMMMMD \`VMM, AMMMV' ,AMMMMMMMMMMMMMMMMMMMMMMM, , -\*-\*-\*-\*-\*-\*-\*- VMMMmMMV' ,AMY~~'' 'MMMMMMMMMMMM' '~~ ,aMM \`YMMMM' AMM' \`VMMMMMMMMP'_ A,aMMMM To connect, type: AMMM' VMMA. YVmmmMMMMMMMMMMML MmmmY MMMMMMM ,AMMA _,HMMMMmdMMMMMMMMMMMMMMMML\`VMV' ,MMMMMMM 'conn guest guest' AMMMA _'MMMMMMMMMMMMMMMMMMMMMMMMMMA \`' MMMMMMMM to connect as ,AMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMa ,,, \`MMMMMMM a guest character. AMMMMMMMMM'~\`YMMMMMMMMMMMMMMMMMMMMMMA ,AMMV MMMMMMM VMV MMMMMV \`YMMMMMMMMMMMMMMMMMMMMMY \`VMMY' adMMMMMMM 'conn name password' \`V MMMM' \`YMMMMMMMV.~~~~~~~~~,aado,\`V'' MMMMMMMMM to connect to an aMMMMmv \`YMMMMMMMm, ,/AMMMMMA, YMMMMMMMM existing character. VMMMMM,,v YMMMMMMMMMo oMMMMMMMMM' a, YMMMMMMM \`YMMMMMY' \`YMMMMMMMY' \`YMMMMMMMY MMmMMMMMMMM You can also type AMMMMM , ~~~~~,aooooa,~~~~~~ MMMMMMMMMMM 'HELP' for more YMMMb,d' dMMMMMMMMMMMMMD, a,, AMMMMMMMMMM information. YMMMMM, A YMMMMMMMMMMMMMY ,MMMMMMMMMMMMMMM AMMMMMMMMM \`~~~~' \`~~~~' AMMMMMMMMMMMMMMM -\*-\*-\*-\*-\*-\*-\*-\*-\*- \`VMMMMMM' ,A, ,,AMMMMMMMMMMMMMMMM Find us on the Web at: MMMMMMMMMMA, ,aAMMMMMMMMMMMMMMMMMMMMMMMMM http://www.narniamuck.org MMMMMMMMMMMA, AMMMMMMMMMMMMMMMMMMMMMMMM-GGN
:class: ansi-banner
:width: 626px
:loading: lazy
Server URLs
~~~~~~~~~~~
.. raw:: html
Server Info
~~~~~~~~~~~
- **Server Location**: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
~~~~~~~~~~~~~~~~~~
:ref:`a8a260cc4662430c `
*This fingerprint is shared by 219 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-\u001b[0;37m ,\u001b[1;33mMMMMMMMMA\u001b[0;37m.\u001b[0m\r\n\u001b[0;37m \u001b[1;33m,M;' `YV'\u001b[0m\r\n\u001b[0;37m \u001b[0;36mWELCOME TO\u001b[0;37m \u001b[1;33mAM' ,OMA,\u001b[0m\r\n\u001b[0;37m \u001b[1;33mAM| `~VMM,. .,ama,____,amma,..\u001b[0m\r\n\u001b[0;37m \u001b[0;36mN A R N I A\u001b[0;37m \u001b[1;33mMML )MMMD .AMMMMMMMMMMMMMMMMMMD.\u001b[0m\r\n\u001b[0;37m \u001b[0;36mM U C K\u001b[0;37m \u001b[1;33mVMMM .AMMY' ,AMMMMMMMMMMMMMMMMMMMMD\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`VMM, AMMMV' ,AMMMMMMMMMMMMMMMMMMMMMMM, ,\u001b[0m\r\n\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-\u001b[0;37m \u001b[1;33mVMMMmMMV' ,AMY~~'' 'MMMMMMMMMMMM' '~~ ,aMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`YMMMM' AMM' `VMMMMMMMMP'_ A,aMMMM\u001b[0m\r\n\u001b[0;36mTo connect, type:\u001b[0;37m \u001b[1;33mAMMM' VMMA. YVmmmMMMMMMMMMMML MmmmY MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m,AMMA _,HMMMMmdMMMMMMMMMMMMMMMML`VMV' ,MMMMMMM\u001b[0m\r\n\u001b[0;36m'\u001b[1;32mconn guest guest\u001b[0;36m' \u001b[1;33mAMMMA _'MMMMMMMMMMMMMMMMMMMMMMMMMMA `' MMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mto connect as \u001b[0;37m \u001b[1;33m,AMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMa ,,, `MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36ma guest character.\u001b[0;37m \u001b[1;33mAMMMMMMMMM'~`YMMMMMMMMMMMMMMMMMMMMMMA ,AMMV MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33mVMV MMMMMV `YMMMMMMMMMMMMMMMMMMMMMY `VMMY' adMMMMMMM\u001b[0m\r\n\u001b[0;36m'\u001b[1;32mconn name password\u001b[0;36m' \u001b[1;33m`V MMMM' `YMMMMMMMV.~~~~~~~~~,aado,`V'' MMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mto connect to an\u001b[0;37m \u001b[1;33maMMMMmv `YMMMMMMMm, ,/AMMMMMA, YMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mexisting character.\u001b[0;37m \u001b[1;33mVMMMMM,,v YMMMMMMMMMo oMMMMMMMMM' a, YMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`YMMMMMY' `YMMMMMMMY' `YMMMMMMMY MMmMMMMMMMM\u001b[0m\r\n\u001b[0;36mYou can also type\u001b[0;37m \u001b[1;33mAMMMMM , ~~~~~,aooooa,~~~~~~ MMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36m'HELP' for more\u001b[0;37m \u001b[1;33mYMMMb,d' dMMMMMMMMMMMMMD, a,, AMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36minformation.\u001b[0;37m \u001b[1;33mYMMMMM, A YMMMMMMMMMMMMMY ,MMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m AMMMMMMMMM `~~~~' `~~~~' AMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-*-*-\u001b[0;37m \u001b[1;33m`VMMMMMM' ,A, ,,AMMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;36mFind us on the Web at:\u001b[0;37m \u001b[1;33m MMMMMMMMMMA, ,aAMMMMMMMMMMMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[1;32mhttp://www.narniamuck.org\u001b[0;37m \u001b[1;33m MMMMMMMMMMMA, AMMMMMMMMMMMMMMMMMMMMMMMM-GGN\u001b[0m\r\n\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.506972074508667,
"total": 5.022329092025757
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:17.527051+00:00",
"host": "muck.narniamuck.org",
"ip": "104.131.109.59",
"port": 2050
}
]
}
.. raw:: html
Connection Log
~~~~~~~~~~~~~~
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug muck.narniamuck.org 2050
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=muck.narniamuck.org port=2050
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to
.. raw:: html
.. _ip_104_131_109_59_muck_universitymuck_org_2052:
muck.universitymuck.org:2052
----------------------------
**Connection Banner:**
.. image:: /_static/banners/banner_3eb59ff8f670.png
:alt: WELCOME TO THE HALLOWED HALLS OF ______________________________________________________________________ (______________________________________________________________________@ \| \| \| WWWWWW WWWWWW WWWWW WWWWW WWWWWW WWWWW WWWWW \| \| W::W W::W W:W W:W W::::::W W:W W:W \| \| W:::W W:::W W:W W:W W:WWWW:W W:W W:W \| \| W:W::W W::W:W W:W W:W W:W W:W W:W W:W \| \| W:WW::W::WW:W W:W W:W W:W WWW W:WW:W \| \| W:W W:::W W:W W:W W:W W:W W:::W \| \| W:W W:W W:W W:W W:W W:W WWW W:WW:W \| \| W:W W W:W W:W W:W W:W W:W W:W W:W \| \| W:W W:W W::WWWW::W W:WWWW:W W:W W:W \| \| W:W W:W W::::::W W::::::W W:W W:W \| \| WWWWW WWWWW WWWWWW WWWWWW WWWWW WWWWW \| \| \| \| U N I V E R S I T Y \| \|_____________________________________________________________________\| (______________________________________________________________________@ To connect to a guest character, type 'connect guest guest' To connect to an existing character, type 'connect Type 'WHO' to see who is logged in, and 'Help' for more information.
:class: ansi-banner
:width: 586px
:loading: lazy
Server URLs
~~~~~~~~~~~
.. raw:: html
Server Info
~~~~~~~~~~~
- **Server Location**: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
~~~~~~~~~~~~~~~~~~
:ref:`a8a260cc4662430c `
*This fingerprint is shared by 219 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": " WELCOME TO THE HALLOWED HALLS OF\r\n ______________________________________________________________________\r\n(______________________________________________________________________@\r\n | |\r\n | WWWWWW WWWWWW WWWWW WWWWW WWWWWW WWWWW WWWWW |\r\n | W::W W::W W:W W:W W::::::W W:W W:W |\r\n | W:::W W:::W W:W W:W W:WWWW:W W:W W:W |\r\n | W:W::W W::W:W W:W W:W W:W W:W W:W W:W |\r\n | W:WW::W::WW:W W:W W:W W:W WWW W:WW:W |\r\n | W:W W:::W W:W W:W W:W W:W W:::W |\r\n | W:W W:W W:W W:W W:W W:W WWW W:WW:W |\r\n | W:W W W:W W:W W:W W:W W:W W:W W:W |\r\n | W:W W:W W::WWWW::W W:WWWW:W W:W W:W |\r\n | W:W W:W W::::::W W::::::W W:W W:W |\r\n | WWWWW WWWWW WWWWWW WWWWWW WWWWW WWWWW |\r\n | |\r\n | U N I V E R S I T Y |\r\n |_____________________________________________________________________|\r\n (______________________________________________________________________@\r\n \r\n To connect to a guest character, type 'connect guest guest'\r\n To connect to an existing character, type 'connect \r\n Type 'WHO' to see who is logged in, and 'Help' for more information.\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5033807754516602,
"total": 5.010035991668701
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:25.566252+00:00",
"host": "muck.universitymuck.org",
"ip": "104.131.109.59",
"port": 2052
}
]
}
.. raw:: html
Connection Log
~~~~~~~~~~~~~~
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug muck.universitymuck.org 2052
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=muck.universitymuck.org port=2052
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to
.. raw:: html