173.160.76.205 (muds.toccobrator.com)
=====================================
.. _ip_173_160_76_205_muds_toccobrator_com_4201:
muds.toccobrator.com:4201
-------------------------
**Connection Banner:**
.. image:: /_static/banners/banner_3d480758cb59.png
:alt: Welcome to TinyMUD To connect to your existing character, enter "connect name password" To create a new character, enter "create name password" Use the news command to get up-to-date news on program changes. You can disconnect using the QUIT command, which must be capitalized as shown. Use the WHO command to find out who is currently active.
:class: ansi-banner
:width: 624px
:loading: lazy
Server URLs
~~~~~~~~~~~
.. raw:: html
Server Info
~~~~~~~~~~~
- **Server Location**: πΊπΈ United States (GeoIP)
Telnet Fingerprint
~~~~~~~~~~~~~~~~~~
:ref:`a8a260cc4662430c `
*This fingerprint is shared by 219 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "Welcome to TinyMUD\nTo connect to your existing character, enter \"connect name password\"\nTo create a new character, enter \"create name password\"\nUse the news command to get up-to-date news on program changes.\n\nYou can disconnect using the QUIT command, which must be capitalized as shown.\n\nUse the WHO command to find out who is currently active.\n\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5079789161682129,
"total": 5.013283014297485
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:13:42.938350+00:00",
"host": "muds.toccobrator.com",
"ip": "173.160.76.205",
"port": 4201
}
]
}
.. raw:: html
Connection Log
~~~~~~~~~~~~~~
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug muds.toccobrator.com 4201
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=muds.toccobrator.com port=4201
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to
.. raw:: html
.. _ip_173_160_76_205_muds_toccobrator_com_9901:
muds.toccobrator.com:9901
-------------------------
**Connection Banner:**
.. image:: /_static/banners/banner_b11f13bbd006.png
:alt: Welcome to the... _β___________ \| \|wilight \|_β___ _β___\|_β_________ For a new character: create (player) (password) \| \| \| For an old character: connect (player) (password) \| \| \| To just look around: connect guest guest \| \|_β_______ \| \| \| / / Once connected: WHO to see who's on \| \| / / QUIT to leave \|__\| / / help or +help to get help / / / / / / _β_________ ___ _β____ _β____ / / / \\ / \\ / _ \\ / /_β_____\| __ \| __ \\ / /_\\ \| \| \| \|__\| \| / \\ \| ___/ \| \| \| \| \| \|\\ \|_β___ \|_β_____________\|\\_β________/___\| \|__\| \\_β_____\| A RhostsMUSH
:class: ansi-banner
:width: 617px
:loading: lazy
Server URLs
~~~~~~~~~~~
.. raw:: html
Server Info
~~~~~~~~~~~
- **Server Location**: πΊπΈ United States (GeoIP)
Telnet Fingerprint
~~~~~~~~~~~~~~~~~~
:ref:`a8a260cc4662430c `
*This fingerprint is shared by 219 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nWelcome to the...\r\n ____________ \t \t \t \t \t \t \r\n|\t |wilight\t\t\t\t\t \r\n|____ \t ____|__________ For a new character: create (player) (password)\r\n | | \t \t| For an old character: connect (player) (password)\r\n | |\t\t| To just look around: connect guest guest \t \r\n | |________\t|\t\t\t\t \t \t\r\n | \t|\t/ \t/ Once connected: WHO to see who's on \t\r\n |\t| / / \t\t QUIT to leave \t\t\r\n |__| /\t /\t \t\t help or +help to get help \t\r\n\t / \t / \t \t\t\t\t \t\t\r\n\t / \t / \t \t\t\t\t \t\t\r\n\t / \t / \t __________ ___\t_____ \t _____\t \t\t\r\n \t / \t / \t/ \t \\ / \\ / _ \\ \t\t\r\n\t / \t /______| __ |\t __ \\ / /_\\ \t| \t\t\r\n\t |\t\t| |__| | / \\ | ___/ \t\t\r\n\t |\t\t|\t | | | |\\ |____ \t\t\r\n\t |______________|\\_________/___| |__| \\______| A RhostsMUSH\r\n\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5179731845855713,
"total": 5.027010202407837
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:38.628862+00:00",
"host": "muds.toccobrator.com",
"ip": "173.160.76.205",
"port": 9901
}
]
}
.. raw:: html
Connection Log
~~~~~~~~~~~~~~
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug muds.toccobrator.com 9901
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:965 Fingerprint client: host=muds.toccobrator.com port=9901
INFO client_base.py:175 Connected to
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to
.. raw:: html