173.160.76.205 (muds.toccobrator.com) ===================================== .. _ip_173_160_76_205_muds_toccobrator_com_4201: muds.toccobrator.com:4201 ------------------------- **Connection Banner:** .. image:: /_static/banners/banner_3d480758cb59.png :alt: Welcome to TinyMUD To connect to your existing character, enter "connect name password" To create a new character, enter "create name password" Use the news command to get up-to-date news on program changes. You can disconnect using the QUIT command, which must be capitalized as shown. Use the WHO command to find out who is currently active. :class: ansi-banner :width: 624px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "Welcome to TinyMUD\nTo connect to your existing character, enter \"connect name password\"\nTo create a new character, enter \"create name password\"\nUse the news command to get up-to-date news on program changes.\n\nYou can disconnect using the QUIT command, which must be capitalized as shown.\n\nUse the WHO command to find out who is currently active.\n\n", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5079789161682129, "total": 5.013283014297485 } } }, "sessions": [ { "connected": "2026-02-14T17:13:42.938350+00:00", "host": "muds.toccobrator.com", "ip": "173.160.76.205", "port": 4201 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug muds.toccobrator.com 4201 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=muds.toccobrator.com port=4201 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html
.. _ip_173_160_76_205_muds_toccobrator_com_9901: muds.toccobrator.com:9901 ------------------------- **Connection Banner:** .. image:: /_static/banners/banner_b11f13bbd006.png :alt: Welcome to the... _​___________ \| \|wilight \|_​___ _​___\|_​_________ For a new character: create (player) (password) \| \| \| For an old character: connect (player) (password) \| \| \| To just look around: connect guest guest \| \|_​_______ \| \| \| / / Once connected: WHO to see who's on \| \| / / QUIT to leave \|__\| / / help or +help to get help / / / / / / _​_________ ___ _​____ _​____ / / / \\ / \\ / _ \\ / /_​_____\| __ \| __ \\ / /_\\ \| \| \| \|__\| \| / \\ \| ___/ \| \| \| \| \| \|\\ \|_​___ \|_​_____________\|\\_​________/___\| \|__\| \\_​_____\| A RhostsMUSH :class: ansi-banner :width: 617px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\r\nWelcome to the...\r\n ____________ \t \t \t \t \t \t \r\n|\t |wilight\t\t\t\t\t \r\n|____ \t ____|__________ For a new character: create (player) (password)\r\n | | \t \t| For an old character: connect (player) (password)\r\n | |\t\t| To just look around: connect guest guest \t \r\n | |________\t|\t\t\t\t \t \t\r\n | \t|\t/ \t/ Once connected: WHO to see who's on \t\r\n |\t| / / \t\t QUIT to leave \t\t\r\n |__| /\t /\t \t\t help or +help to get help \t\r\n\t / \t / \t \t\t\t\t \t\t\r\n\t / \t / \t \t\t\t\t \t\t\r\n\t / \t / \t __________ ___\t_____ \t _____\t \t\t\r\n \t / \t / \t/ \t \\ / \\ / _ \\ \t\t\r\n\t / \t /______| __ |\t __ \\ / /_\\ \t| \t\t\r\n\t |\t\t| |__| | / \\ | ___/ \t\t\r\n\t |\t\t|\t | | | |\\ |____ \t\t\r\n\t |______________|\\_________/___| |__| \\______| A RhostsMUSH\r\n\r\n", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5179731845855713, "total": 5.027010202407837 } } }, "sessions": [ { "connected": "2026-02-14T17:11:38.628862+00:00", "host": "muds.toccobrator.com", "ip": "173.160.76.205", "port": 9901 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug muds.toccobrator.com 9901 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=muds.toccobrator.com port=9901 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html