104.196.148.77 (arkadiamud.com.br) ================================== .. _ip_104_196_148_77_arkadiamud_com_br_2442: arkadiamud.com.br:2442 ---------------------- **Connection Banner:** .. image:: /_static/banners/banner_30d3fbc4e20f.png :alt: Conectando... ::: ::::::::: ::: ::: ::: ::::::::: ::::::::::: ::: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +​#++:+​+#++: +​#++:++#: +​#++:++ +​#++:+​+#++: +#+ +:+ +#+ +​#++:+​+#++: +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# ### ### ### ### ### ### ### ### #​######## #​########## ### ### /\\ _/ ___/ \\/\\__ _/ _/ / \\ /\\_ \\ _/ _/ \\ \\ / \\_ \\ /\\ _/ \\ \\ \\ _ / \\ / \\ ]=I==II==I=[ _/ / \\ \\\\__\|\|__// _/ ]=I==II==I=[ / ]=I==II==I=[ \|.. ' \*\| / \\_ \\\\__\|\|__// \\\\__\|\|__// \|. /\\ #\| _ / /\\ \|-_ []#\| \| [] \| \| ## \*\| / \\_ \| \| \| ..\| \| . , #\| \\__ ]=I==II==I=[ ___ _​___ ___ \| .. \| __ \|.​.__.\*\| __ _/ \\ \\\\__\|\|__// ] I---I I--I [ \|.. \| \| \|\|_\| \|_\|\| \| / \| _\*\| ]_​____________[ \| .. []\| \\--\\-\|-\|--/-// _/ \| _ #\| \\_\\\| \|_\| \|/_/ \|_ _ \| _ _ _\| ' \*\| \|' \*\| \| . \|'-'-' '-' '-' '-' '-' \| [] #\|-\|--\|-​_-_-_-_ _ _ _\|_' #\| \| ' \|=​-=-=-=-=-=-=-=-=-=-=-\| []\*\|-​----________' ' ' ] \*\| \| ' ' []\| _​-_-_-_-_ ' \|- #\| , ' '''''''[' _#\| \| ' ' '\| [] \| \| \| \| \| []' \| [] \*\| ' . ' \|' I\*\| \| - \| ' \| \| \| \| \| ' \| ; ' #\| . \| ' \| #\| /_'_​-_-___-\\__,__\|_\|_\|_\|_\|_​______\| ' , \*\| _​______+___,__,-/.​_.._.\\ _,--' __,-' /,_,_v_Y_,_v\\\\-' - _​_____________________________________________________________________ -​------------------------------------------------------------------ Baseado no CircleMUD, Criado por Jeremy Elson Derivado do DikuMUD (GAMMA 0.0), criado por Hans-Henrik Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert, e Sebastian Hammer. Nosso endereco: arkadiamud.com.br porta: 2442 Digite "Novo" para criar um personagem. Por qual nome voce deseja ser conhecido? :class: ansi-banner :width: 642px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: 🇺🇸 United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`c2dd7d4e76383b41 ` *This fingerprint is shared by 173 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\r\nConectando...\r\n\r\n\u001b[1;37m ::: ::::::::: ::: ::: ::: ::::::::: ::::::::::: :::\r\n\u001b[1;37m :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+:\r\n\u001b[1;37m +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+\r\n\u001b[1;37m+#++:++#++: +#++:++#: +#++:++ +#++:++#++: +#+ +:+ +#+ +#++:++#++:\r\n\u001b[1;37m+#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+\r\n\u001b[1;37m#+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+#\r\n\u001b[1;37m### ### ### ### ### ### ### ### ######### ########### ### ###\r\n\u001b[1;37m /\\ _/\r\n\u001b[1;37m ___/ \\/\\__ _/\r\n\u001b[1;37m _/ / \\ /\\_\r\n\u001b[1;37m \\ _/ _/ \\\r\n\u001b[1;37m \\ / \\_ \\ /\\\r\n\u001b[1;37m _/ \\ \\ \\\r\n\u001b[1;37m _ / \\ / \\ \u001b[0m]=I==II==I=[ _\u001b[1;37m/\r\n\u001b[1;37m / \\ \u001b[0m \\\\__||__// \u001b[1;37m _/ \u001b[0m ]=I==II==I=[\r\n\u001b[1;37m / \u001b[0m]=I==II==I=[ |.. ' *| \u001b[1;37m / \\_ \u001b[0m \\\\__||__//\r\n\u001b[0m \\\\__||__// |. /\\ #| \u001b[1;37m _ / /\\ \u001b[0m |-_ \u001b[1;37m[]\u001b[0m#|\r\n\u001b[0m | \u001b[1;37m[]\u001b[0m | | ## *| \u001b[1;37m / \\_ \u001b[0m | |\r\n\u001b[0m | ..| | . , #| \u001b[1;37m \\__ \u001b[0m ]=I==II==I=[\r\n\u001b[0m ___ ____ ___ | .. | __ |..__.*| __\u001b[1;37m _/ \\ \u001b[0m \\\\__||__//\r\n\u001b[0m ] I---I I--I [ |.. | | ||_| |_|| |\u001b[1;37m / \u001b[0m | _*|\r\n\u001b[0m ]_____________[ | .. \u001b[1;37m[]\u001b[0m| \\--\\-|-|--/-//\u001b[1;37m _/ \u001b[0m | _ #|\r\n\u001b[0m \\_\\| |_| |/_/ |_ _ | _ _ _| ' *| |' *|\r\n\u001b[0m | . |'-'-' '-' '-' '-' '-' | \u001b[1;37m[]\u001b[0m #|-|--|-_-_-_-_ _ _ _|_' #|\r\n\u001b[0m | ' |=-=-=-=-=-=-=-=-=-=-=-| \u001b[1;37m[]\u001b[0m*|-----________' ' ' ] *|\r\n\u001b[0m | ' ' \u001b[1;37m[]\u001b[0m| _-_-_-_-_ ' |- #| , ' '''''''[' _#|\r\n\u001b[0m | ' ' '| \u001b[1;37m[]\u001b[0m | | | | | \u001b[1;37m[]\u001b[0m' | \u001b[1;37m[]\u001b[0m *| ' . ' |' I*|\r\n\u001b[0m | - | ' | | | | | ' | ; ' #| . | ' | #|\r\n\u001b[0m /_'_-_-___-\\__,__|_|_|_|_|_______| ' , *| _______+___,__,-/._.._.\\\r\n\u001b[0m _,--' __,-' /,_,_v_Y_,_v\\\\-' -\r\n\u001b[0m ______________________________________________________________________\r\n\u001b[0m -------------------------------------------------------------------\r\n\u001b[0m Baseado no CircleMUD,\r\n\u001b[0m Criado por Jeremy Elson\r\n\r\n Derivado do DikuMUD (GAMMA 0.0),\r\n criado por Hans-Henrik Staerfeldt, Katja Nyboe,\r\n Tom Madsen, Michael Seifert, e Sebastian Hammer.\r\n\r\n \u001b[1;37mNosso endereco: \u001b[0;36markadiamud.com.br \u001b[1;37mporta: \u001b[0;36m2442\u001b[0m\r\n\r\n Digite \"\u001b[1;37mNovo\u001b[0m\" para criar um personagem.\r\n\r\nPor qual nome voce deseja ser conhecido? ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 2.6880486011505127 } } }, "sessions": [ { "connected": "2026-02-14T17:09:58.400170+00:00", "host": "arkadiamud.com.br", "ip": "104.196.148.77", "port": 2442 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug arkadiamud.com.br 2442 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=arkadiamud.com.br port=2442 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG client_base.py:89 EOF from server, closing. INFO client_base.py:106 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 .. raw:: html
.. _ip_104_196_148_77_vitaliamud_com_br_8242: VitaliaMUD Reborn (vitaliamud.com.br:8242) ------------------------------------------ **Connection Banner:** .. image:: /_static/banners/banner_1337956eb01e.png :alt: Tentando identificar o cliente. Aguarde... [Cliente] xterm-256color \| [Cores] 256 \| [MXP] Sim \| [MSDP] Sim \| [ATCP] Não d888b 88b d88 88 88 d8' \`8b 888bd888 88 88 88 88 88\`88'88 88 88 88,d8b d88b88 d888b d88b88 d888b 88 88 88 88 88 88 88' 88 d8 88 d8' '8b d8 88 d8 ,d8' 88, .88 88 88 88, .88 88 88 88, ,88 88, ,88 88, ,88 88o8' \`888' 88 88 \`88'88 88 88 '888'8 '888' '888'8 '8888 .v~ .(W ';;' ';' ,, , ,;; ';; ,, /i)$$$$$$$$($( )#H>=​=====';, ,' ;; ;; '' ,;; ;; ;; '' ,;;=​==-----> /_p~​~~~~~~~~~\\$\|/-​--------';;; ;; ;; .,' ;; ;; ;; .,' ;;-​------' \\
  • Telnet: telnet://vitaliamud.com.br:8242
  • Play in Browser: LociTerm
  • Server Info ~~~~~~~~~~~ - **Codebase**: tbaMUD - **Genre**: Fantasy - **Gameplay**: Hack and Slash - **Players online**: 1 [#scan_vitaliamud.com.br_8242]_ - **Uptime**: 0 days - **Status**: Alpha - **Server Location**: 🇺🇸 United States (GeoIP) - **Language**: Portuguese Protocol Support ~~~~~~~~~~~~~~~~ MUD-specific protocols detected via MSSP flags or Telnet negotiation. - **MSSP**: :proto-yes:`Yes` (MSSP) - **GMCP**: :proto-yes:`Yes` (MSSP) - **MSDP**: :proto-yes:`Yes` (MSSP) - **MCCP**: :proto-yes:`Yes` (MSSP) - **MCCP2**: :proto-no:`No` - **MXP**: :proto-yes:`Yes` (MSSP) - **MSP**: :proto-yes:`Yes` (MSSP) - **MCP**: :proto-no:`No` - **ZMP**: :proto-no:`No` Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`2d1d3bcf28abae7b ` *This fingerprint is shared by 54 other servers.* **Options requested from client**: ``ATCP``, ``CHARSET``, ``MXP``, ``NAWS``, ``TTYPE`` The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
    Show JSON .. code-block:: json { "server-probe": { "fingerprint": "2d1d3bcf28abae7b", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [ "ATCP", "CHARSET", "MXP", "NAWS", "TTYPE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\r\nTentando identificar o cliente. Aguarde...\r\n\u001b[7z\r\n\u001b[H\u001b[J\u001b[38;5;214m[\u001b[38;5;208mCliente\u001b[38;5;214m] \u001b[38;5;145mxterm-256color\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mCores\u001b[38;5;214m] \u001b[38;5;145m256\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMXP\u001b[38;5;214m] \u001b[38;5;145mSim\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMSDP\u001b[38;5;214m] \u001b[38;5;145mSim\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mATCP\u001b[38;5;214m] \u001b[38;5;145mN\u00e3o\u001b[0;00m\r\n\r\n\u001b[38;5;028m d888b 88b d88 88 88\r\n\u001b[38;5;028m d8' `8b 888bd888 88 88\r\n\u001b[38;5;028m 88 88 88`88'88 88 88 88,d8b d88b88 d888b d88b88 d888b\r\n\u001b[38;5;028m 88 88 88 88 88 88 88' 88 d8 88 d8' '8b d8 88 d8 ,d8'\r\n\u001b[38;5;028m 88, .88 88 88 88, .88 88 88 88, ,88 88, ,88 88, ,88 88o8'\r\n\u001b[38;5;028m `888' 88 88 `88'88 88 88 '888'8 '888' '888'8 '8888\r\n\u001b[38;5;088m .v~\r\n\u001b[38;5;088m .(W \u001b[38;5;033m';;' ';' ,, , ,;; ';; ,,\r\n\u001b[38;5;088m /i\u001b[38;5;142m)$$$$$$$$(\u001b[38;5;088m$\u001b[38;5;231m( )\u001b[38;5;088m#H\u001b[38;5;231m>======\u001b[38;5;033m';, ,' ;; ;; '' ,;; ;; ;; '' ,;;\u001b[38;5;231m===----->\r\n\u001b[38;5;088m /_p~~~~~~~~~~\\$|/\u001b[38;5;145m---------\u001b[38;5;033m';;; ;; ;; .,' ;; ;; ;; .,' ;;\u001b[38;5;145m-------'\r\n\u001b[38;5;088m \\ Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug vitaliamud.com.br 8242 .. raw:: html
    Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=vitaliamud.com.br port=8242 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:707 recv IAC DO TTYPE DEBUG stream_writer.py:1770 handle_do(TTYPE) DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True DEBUG stream_writer.py:950 send IAC WILL TTYPE DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True DEBUG stream_writer.py:3174 local_option[TTYPE] = True DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False DEBUG stream_writer.py:2241 recv TTYPE SEND: b'' DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG stream_writer.py:707 recv IAC DO NAWS DEBUG stream_writer.py:1770 handle_do(NAWS) DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True DEBUG stream_writer.py:950 send IAC WILL NAWS DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE DEBUG stream_writer.py:3174 local_option[NAWS] = True DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:707 recv IAC DO CHARSET DEBUG stream_writer.py:1770 handle_do(CHARSET) DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True DEBUG stream_writer.py:950 send IAC WILL CHARSET DEBUG stream_writer.py:3174 local_option[CHARSET] = True DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False DEBUG stream_writer.py:707 recv IAC WILL MSDP DEBUG stream_writer.py:723 WILL MSDP unsolicited DEBUG stream_writer.py:1900 handle_will(MSDP) DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 remote_option[MSDP] = True DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False DEBUG stream_writer.py:707 recv IAC WILL GMCP DEBUG stream_writer.py:723 WILL GMCP unsolicited DEBUG stream_writer.py:1900 handle_will(GMCP) DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 remote_option[GMCP] = True DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False DEBUG stream_writer.py:707 recv IAC WILL MSSP DEBUG stream_writer.py:723 WILL MSSP unsolicited DEBUG stream_writer.py:1900 handle_will(MSSP) DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 remote_option[MSSP] = True DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False DEBUG stream_writer.py:707 recv IAC DO ATCP DEBUG stream_writer.py:1770 handle_do(ATCP) DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True DEBUG stream_writer.py:950 send IAC WILL ATCP DEBUG stream_writer.py:3174 local_option[ATCP] = True DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False DEBUG stream_writer.py:707 recv IAC WILL MSP DEBUG stream_writer.py:723 WILL MSP unsolicited DEBUG stream_writer.py:1900 handle_will(MSP) DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 remote_option[MSP] = True DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False DEBUG stream_writer.py:707 recv IAC DO MXP DEBUG stream_writer.py:1770 handle_do(MXP) DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True DEBUG stream_writer.py:950 send IAC WILL MXP DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True DEBUG stream_writer.py:3174 local_option[MXP] = True DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False DEBUG stream_writer.py:707 recv IAC WILL MCCP2_COMPRESS DEBUG stream_writer.py:723 WILL MCCP2_COMPRESS unsolicited DEBUG stream_writer.py:1900 handle_will(MCCP2_COMPRESS) DEBUG stream_writer.py:3174 remote_option[MCCP2_COMPRESS] = False DEBUG stream_writer.py:950 send IAC DONT MCCP2_COMPRESS WARNING stream_writer.py:2008 Unhandled: WILL MCCP2_COMPRESS. DEBUG stream_writer.py:707 recv IAC WILL b'W' DEBUG stream_writer.py:723 WILL b'W' unsolicited DEBUG stream_writer.py:1900 handle_will(b'W') DEBUG stream_writer.py:3174 remote_option[b'W'] = False DEBUG stream_writer.py:950 send IAC DONT b'W' WARNING stream_writer.py:2008 Unhandled: WILL b'W'. DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited DEBUG stream_writer.py:2241 recv TTYPE SEND: b'' DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited DEBUG client.py:304 encoding negotiated: UTF-8 DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'VitaliaMUD Reborn'} DEBUG stream_writer.py:699 begin sub-negotiation SB GMCP DEBUG stream_writer.py:686 sub-negotiation cmd GMCP SE completion byte DEBUG stream_writer.py:2065 [SB + GMCP] unsolicited DEBUG stream_writer.py:1659 GMCP: Core.Hello {'client': 'VitaliaMUD Reborn', 'version': '1.0'} DEBUG stream_writer.py:699 begin sub-negotiation SB GMCP DEBUG stream_writer.py:686 sub-negotiation cmd GMCP SE completion byte DEBUG stream_writer.py:2065 [SB + GMCP] unsolicited DEBUG stream_writer.py:1659 GMCP: Core.Supports.Set ['Char 1', 'Char.Items 1', 'Char.Skills 1', 'Room 1', 'Comm.Channel 1'] DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited DEBUG stream_writer.py:1673 MSSP: {'NAME': 'VitaliaMUD Reborn', 'PLAYERS': '1', 'UPTIME': '1771048026', 'CRAWL DELAY': '-1', 'CODEBASE': 'tbaMUD', 'LANGUAGE': 'Portuguese', 'FAMILY': 'CircleMUD', 'GENRE': 'Fantasy', 'GAMEPLAY': 'Hack and Slash', 'STATUS': 'Alpha', 'GAMESYSTEM': 'Custom', 'ANSI': '1', 'GMCP': '1', 'MCCP': '1', 'MCP': '0', 'MSDP': '1', 'MSP': '1', 'MXP': '1', 'PUEBLO': '0', 'UTF-8': '1', 'VT100': '0', 'XTERM 256 COLORS': '1', 'ATCP': '1', 'SSL': '0'} DEBUG stream_writer.py:699 begin sub-negotiation SB MXP DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False DEBUG stream_writer.py:1682 MXP: b'' DEBUG client_base.py:89 EOF from server, closing. INFO client_base.py:106 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b .. raw:: html
    .. [#scan_vitaliamud.com.br_8242] measured 2026-02-14 at 17:12 UTC