104.131.109.59 (muck.narniamuck.org) ==================================== .. _ip_104_131_109_59_muck_narniamuck_org_2050: muck.narniamuck.org:2050 ------------------------ **Connection Banner:** .. image:: /_static/banners/banner_5da59ab31383.png :alt: -\*-\*-\*-\*-\*-\*-\*- ,MMMMMMMMA. ,M;' \`YV' WELCOME TO AM' ,OMA, AM\| \`~VMM,. .,ama,_​___,amma,.. N A R N I A MML )MMMD .AMMMMMMMMMMMMMMMMMMD. M U C K VMMM .AMMY' ,AMMMMMMMMMMMMMMMMMMMMD \`VMM, AMMMV' ,AMMMMMMMMMMMMMMMMMMMMMMM, , -\*-\*-\*-\*-\*-\*-\*- VMMMmMMV' ,AMY~~'' 'MMMMMMMMMMMM' '~~ ,aMM \`YMMMM' AMM' \`VMMMMMMMMP'_ A,aMMMM To connect, type: AMMM' VMMA. YVmmmMMMMMMMMMMML MmmmY MMMMMMM ,AMMA _,HMMMMmdMMMMMMMMMMMMMMMML\`VMV' ,MMMMMMM 'conn guest guest' AMMMA _'MMMMMMMMMMMMMMMMMMMMMMMMMMA \`' MMMMMMMM to connect as ,AMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMa ,,, \`MMMMMMM a guest character. AMMMMMMMMM'~\`YMMMMMMMMMMMMMMMMMMMMMMA ,AMMV MMMMMMM VMV MMMMMV \`YMMMMMMMMMMMMMMMMMMMMMY \`VMMY' adMMMMMMM 'conn name password' \`V MMMM' \`YMMMMMMMV.​~~~~~~~~~,aado,\`V'' MMMMMMMMM to connect to an aMMMMmv \`YMMMMMMMm, ,/AMMMMMA, YMMMMMMMM existing character. VMMMMM,,v YMMMMMMMMMo oMMMMMMMMM' a, YMMMMMMM \`YMMMMMY' \`YMMMMMMMY' \`YMMMMMMMY MMmMMMMMMMM You can also type AMMMMM , ~​~~~~,aooooa,~​~~~~~ MMMMMMMMMMM 'HELP' for more YMMMb,d' dMMMMMMMMMMMMMD, a,, AMMMMMMMMMM information. YMMMMM, A YMMMMMMMMMMMMMY ,MMMMMMMMMMMMMMM AMMMMMMMMM \`~​~~~' \`~​~~~' AMMMMMMMMMMMMMMM -\*-\*-\*-\*-\*-\*-\*-\*-\*- \`VMMMMMM' ,A, ,,AMMMMMMMMMMMMMMMM Find us on the Web at: MMMMMMMMMMA, ,aAMMMMMMMMMMMMMMMMMMMMMMMMM http://www.narniamuck.org MMMMMMMMMMMA, AMMMMMMMMMMMMMMMMMMMMMMMM-GGN :class: ansi-banner :width: 626px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: 🇺🇸 United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-\u001b[0;37m ,\u001b[1;33mMMMMMMMMA\u001b[0;37m.\u001b[0m\r\n\u001b[0;37m \u001b[1;33m,M;' `YV'\u001b[0m\r\n\u001b[0;37m \u001b[0;36mWELCOME TO\u001b[0;37m \u001b[1;33mAM' ,OMA,\u001b[0m\r\n\u001b[0;37m \u001b[1;33mAM| `~VMM,. .,ama,____,amma,..\u001b[0m\r\n\u001b[0;37m \u001b[0;36mN A R N I A\u001b[0;37m \u001b[1;33mMML )MMMD .AMMMMMMMMMMMMMMMMMMD.\u001b[0m\r\n\u001b[0;37m \u001b[0;36mM U C K\u001b[0;37m \u001b[1;33mVMMM .AMMY' ,AMMMMMMMMMMMMMMMMMMMMD\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`VMM, AMMMV' ,AMMMMMMMMMMMMMMMMMMMMMMM, ,\u001b[0m\r\n\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-\u001b[0;37m \u001b[1;33mVMMMmMMV' ,AMY~~'' 'MMMMMMMMMMMM' '~~ ,aMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`YMMMM' AMM' `VMMMMMMMMP'_ A,aMMMM\u001b[0m\r\n\u001b[0;36mTo connect, type:\u001b[0;37m \u001b[1;33mAMMM' VMMA. YVmmmMMMMMMMMMMML MmmmY MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m,AMMA _,HMMMMmdMMMMMMMMMMMMMMMML`VMV' ,MMMMMMM\u001b[0m\r\n\u001b[0;36m'\u001b[1;32mconn guest guest\u001b[0;36m' \u001b[1;33mAMMMA _'MMMMMMMMMMMMMMMMMMMMMMMMMMA `' MMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mto connect as \u001b[0;37m \u001b[1;33m,AMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMa ,,, `MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36ma guest character.\u001b[0;37m \u001b[1;33mAMMMMMMMMM'~`YMMMMMMMMMMMMMMMMMMMMMMA ,AMMV MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33mVMV MMMMMV `YMMMMMMMMMMMMMMMMMMMMMY `VMMY' adMMMMMMM\u001b[0m\r\n\u001b[0;36m'\u001b[1;32mconn name password\u001b[0;36m' \u001b[1;33m`V MMMM' `YMMMMMMMV.~~~~~~~~~,aado,`V'' MMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mto connect to an\u001b[0;37m \u001b[1;33maMMMMmv `YMMMMMMMm, ,/AMMMMMA, YMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mexisting character.\u001b[0;37m \u001b[1;33mVMMMMM,,v YMMMMMMMMMo oMMMMMMMMM' a, YMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`YMMMMMY' `YMMMMMMMY' `YMMMMMMMY MMmMMMMMMMM\u001b[0m\r\n\u001b[0;36mYou can also type\u001b[0;37m \u001b[1;33mAMMMMM , ~~~~~,aooooa,~~~~~~ MMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36m'HELP' for more\u001b[0;37m \u001b[1;33mYMMMb,d' dMMMMMMMMMMMMMD, a,, AMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36minformation.\u001b[0;37m \u001b[1;33mYMMMMM, A YMMMMMMMMMMMMMY ,MMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m AMMMMMMMMM `~~~~' `~~~~' AMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-*-*-\u001b[0;37m \u001b[1;33m`VMMMMMM' ,A, ,,AMMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;36mFind us on the Web at:\u001b[0;37m \u001b[1;33m MMMMMMMMMMA, ,aAMMMMMMMMMMMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[1;32mhttp://www.narniamuck.org\u001b[0;37m \u001b[1;33m MMMMMMMMMMMA, AMMMMMMMMMMMMMMMMMMMMMMMM-GGN\u001b[0m\r\n\r\n", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.506972074508667, "total": 5.022329092025757 } } }, "sessions": [ { "connected": "2026-02-14T17:12:17.527051+00:00", "host": "muck.narniamuck.org", "ip": "104.131.109.59", "port": 2050 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug muck.narniamuck.org 2050 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=muck.narniamuck.org port=2050 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html
.. _ip_104_131_109_59_muck_universitymuck_org_2052: muck.universitymuck.org:2052 ---------------------------- **Connection Banner:** .. image:: /_static/banners/banner_3eb59ff8f670.png :alt: WELCOME TO THE HALLOWED HALLS OF _​_____________________________________________________________________ (_​_____________________________________________________________________@ \| \| \| WWWWWW WWWWWW WWWWW WWWWW WWWWWW WWWWW WWWWW \| \| W::W W::W W:W W:W W::::::W W:W W:W \| \| W:::W W:::W W:W W:W W:WWWW:W W:W W:W \| \| W:W::W W::W:W W:W W:W W:W W:W W:W W:W \| \| W:WW::W::WW:W W:W W:W W:W WWW W:WW:W \| \| W:W W:::W W:W W:W W:W W:W W:::W \| \| W:W W:W W:W W:W W:W W:W WWW W:WW:W \| \| W:W W W:W W:W W:W W:W W:W W:W W:W \| \| W:W W:W W::WWWW::W W:WWWW:W W:W W:W \| \| W:W W:W W::::::W W::::::W W:W W:W \| \| WWWWW WWWWW WWWWWW WWWWWW WWWWW WWWWW \| \| \| \| U N I V E R S I T Y \| \|_​____________________________________________________________________\| (_​_____________________________________________________________________@ To connect to a guest character, type 'connect guest guest' To connect to an existing character, type 'connect Type 'WHO' to see who is logged in, and 'Help' for more information. :class: ansi-banner :width: 586px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: 🇺🇸 United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": " WELCOME TO THE HALLOWED HALLS OF\r\n ______________________________________________________________________\r\n(______________________________________________________________________@\r\n | |\r\n | WWWWWW WWWWWW WWWWW WWWWW WWWWWW WWWWW WWWWW |\r\n | W::W W::W W:W W:W W::::::W W:W W:W |\r\n | W:::W W:::W W:W W:W W:WWWW:W W:W W:W |\r\n | W:W::W W::W:W W:W W:W W:W W:W W:W W:W |\r\n | W:WW::W::WW:W W:W W:W W:W WWW W:WW:W |\r\n | W:W W:::W W:W W:W W:W W:W W:::W |\r\n | W:W W:W W:W W:W W:W W:W WWW W:WW:W |\r\n | W:W W W:W W:W W:W W:W W:W W:W W:W |\r\n | W:W W:W W::WWWW::W W:WWWW:W W:W W:W |\r\n | W:W W:W W::::::W W::::::W W:W W:W |\r\n | WWWWW WWWWW WWWWWW WWWWWW WWWWW WWWWW |\r\n | |\r\n | U N I V E R S I T Y |\r\n |_____________________________________________________________________|\r\n (______________________________________________________________________@\r\n \r\n To connect to a guest character, type 'connect guest guest'\r\n To connect to an existing character, type 'connect \r\n Type 'WHO' to see who is logged in, and 'Help' for more information.\r\n", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5033807754516602, "total": 5.010035991668701 } } }, "sessions": [ { "connected": "2026-02-14T17:12:25.566252+00:00", "host": "muck.universitymuck.org", "ip": "104.131.109.59", "port": 2052 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug muck.universitymuck.org 2052 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=muck.universitymuck.org port=2052 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html