72.14.179.114 (dcastle.org)
===========================
.. _ip_72_14_179_114_dcastle_org_23:
dcastle.org:23
--------------
**Connection Banner:**
.. image:: /_static/banners/banner_a4874dd966fa.png
:alt: Based on DIKUMUD by M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe (o)=========================================================================(o) \|/\| ..... ..... ...................... ...... .. \|=\| \|=\| ..... .... ........ ... ........... .. .. . \|/\| \|/\|.... ..... ... d Y88888888888P b .... ... . \|=\| \|=\| .. .... d8888 Y888888888P 8888b .... \|/\| \|/\| ,-. d888888a888888888a888888b ... __ \\ \| \|=\| \|=\| (<@) )_ 88P' \`Y888888888P' \`Y88 .. \| \| _ \`\| __\| \| / \|/\| \|/\| \\ / ; ) ,,~~~. Y8888888P Y88 . \| \| ( \| \| < \|=\| \|=\| /\`\`-\*==' ,''8 '~~~ 8888888~~''\`\`. 888 .. ____/ \\__,_\|_\| _\|\\_\\ \|/\| \|/\| \`--'}\`~~' 888&aaaaaaa88P'8\`Y88aaaaaa\`.888 ... \|=\| \|=\| __ Y8888888888P 8 Y88888888;8P ___\| \| \| \|/\| \|/\| ;-.\\__ 888bod8bod888 ; ... \| _ \`\| __\| __\| \| _ \\ \|=\| \|=\| \|'@) ; \`, ,~~~~d8888888888888b ' ... \| ( \|\\__ \\ \| \| __/ \|/\| \|/\| ,\`/_.' \|==~''##a. 888 \`.888 888 ... \\____\\__,_\|____/\\__\|_\|\\___\| \|=\| \|=\| \`.__\\_/ \` \*#a. \`. .... ; ..... \|/\| (o)===========================\`.======,;====================================(o) \|=\| \`~~a~'' \|/\| \|/\| a# www.dcastle.org \|=\| \|=\| #\* \|/\| \|/\| dcastle.org telnet ports: 23, 6969 \|=\| \|=\| SSL/TSL port: 6970 \|/\| (o)=========================================================================(o) What name for the roster? Empty name. Disconnecting...
:class: ansi-banner
:width: 633px
:loading: lazy
Server URLs
~~~~~~~~~~~
.. raw:: html
Server Info
~~~~~~~~~~~
- **Server Location**: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
~~~~~~~~~~~~~~~~~~
:ref:`c2dd7d4e76383b41 `
*This fingerprint is shared by 111 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "Empty name. Disconnecting...",
"banner_before_return": "\r\n Based on DIKUMUD by M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r(o)=========================================================================(o)\n\r|/| ..... ..... ...................... ...... .. |=|\n\r|=| ..... .... ........ ... ........... .. .. . |/|\n\r|/|.... ..... ... d Y88888888888P b .... ... . |=|\n\r|=| .. .... d8888 Y888888888P 8888b .... |/|\n\r|/| ,-. d888888a888888888a888888b ... __ \\ | |=|\n\r|=| (<@) )_ 88P' `Y888888888P' `Y88 .. | | _ `| __| | / |/|\n\r|/| \\ / ; ) ,,~~~. Y8888888P Y88 . | | ( | | < |=|\n\r|=| /``-*==' ,''8 '~~~ 8888888~~''``. 888 .. ____/ \\__,_|_| _|\\_\\ |/|\n\r|/| `--'}`~~' 888&aaaaaaa88P'8`Y88aaaaaa`.888 ... |=|\n\r|=| __ Y8888888888P 8 Y88888888;8P ___| | | |/|\n\r|/| ;-.\\__ 888bod8bod888 ; ... | _ `| __| __| | _ \\ |=|\n\r|=| |'@) ; `, ,~~~~d8888888888888b ' ... | ( |\\__ \\ | | __/ |/|\n\r|/| ,`/_.' |==~''##a. 888 `.888 888 ... \\____\\__,_|____/\\__|_|\\___| |=|\n\r|=| `.__\\_/ ` *#a. `. .... ; ..... |/|\n\r(o)===========================`.======,;====================================(o)\n\r|=| `~~a~'' |/|\n\r|/| a# www.dcastle.org |=|\n\r|=| #* |/|\n\r|/| dcastle.org telnet ports: 23, 6969 |=|\n\r|=| SSL/TSL port: 6970 |/|\n\r(o)=========================================================================(o)\n\r\n\rWhat name for the roster? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.55775785446167
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:00:27.338046+00:00",
"host": "dcastle.org",
"ip": "72.14.179.114",
"port": 23
},
{
"connected": "2026-04-07T06:57:38.988472+00:00",
"host": "dcastle.org",
"ip": "72.14.179.114",
"port": 23
}
]
}
.. raw:: html
Connection Log
~~~~~~~~~~~~~~
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug dcastle.org 23
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1200 Fingerprint client: host=dcastle.org port=23
INFO client_base.py:190 Connected to
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:1451 IAC GA: Go-Ahead (unhandled).
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MXP, WILL AARDWOLF, WILL MCCP3_COMPRESS, WILL ATCP, WILL GMCP, WILL MCCP2_COMPRESS,
WILL ZMP, WILL MSSP, WILL MSP, WILL MSDP, DO MXP, DO AARDWOLF, DO MCCP3_COMPRESS, DO ATCP, DO GMCP, DO MCCP2_COMPRESS, DO ZMP,
DO MSSP, DO MSP, DO MSDP'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
.. raw:: html
.. _ip_72_14_179_114_dcastle_org_6666:
dcastle.org:6666
----------------
**Connection Banner:**
.. image:: /_static/banners/banner_cd59004a564b.png
:alt: Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe (o)=========================================================================(o) \|/\| ..... ..... ...................... ...... ..A Shit-Kicking MUD from \|=\| \|=\| ..... .... ........ ... ........... .. .. .the legendary Dark Castle \|/\| \|/\|.... ..... ... d Y88888888888P b .... ... .Online Gaming code team. \|=\| \|=\| .. .... d8888 Y888888888P 8888b .... \|/\| \|/\| ,-. d888888a888888888a888888b ... __ \\ \| \|=\| \|=\| (<@) )_ 88P' \`Y888888888P' \`Y88 .. \| \| _ \`\| __\| \| / \|/\| \|/\| \\ / ; ) ,,~~~. Y8888888P Y88 . \| \| ( \| \| < \|=\| \|=\| /\`\`-\*==' ,''8 '~~~ 8888888~~''\`\`. 888 .. ____/ \\__,_\|_\| _\|\\_\\ \|/\| \|/\| \`--'}\`~~' 888&aaaaaaa88P'8\`Y88aaaaaa\`.888 ... \|=\| \|=\| __ Y8888888888P 8 Y88888888;8P ___\| \| \| \|/\| \|/\| ;-.\\__ 888bod8bod888 ; ... \| _ \`\| __\| __\| \| _ \\ \|=\| \|=\| \|'@) ; \`, ,~~~~d8888888888888b ' ... \| ( \|\\__ \\ \| \| __/ \|/\| \|/\| ,\`/_.' \|==~''##a. 888 \`.888 888 ... \\____\\__,_\|____/\\__\|_\|\\___\| \|=\| \|=\| \`.__\\_/ \` \*#a. \`. .... ; ..... \|/\| (o)===========================\`.======,;====================================(o) \|=\| \`~~a~'' \|/\| \|/\| a# www.dcastle.org \|=\| \|=\| #\* \|/\| \|/\| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS \|=\| \|=\| port at 6670. The new Dark Castle is on port 23, 6969, 6970. \|/\| (o)=========================================================================(o) What name for the roster? Empty name. Disconnecting...
:class: ansi-banner
:width: 633px
:loading: lazy
Server URLs
~~~~~~~~~~~
.. raw:: html
Server Info
~~~~~~~~~~~
- **Server Location**: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
~~~~~~~~~~~~~~~~~~
:ref:`c2dd7d4e76383b41 `
*This fingerprint is shared by 111 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "Empty name. Disconnecting...",
"banner_before_return": "\r\n Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r(o)=========================================================================(o)\n\r|/| ..... ..... ...................... ...... ..A Shit-Kicking MUD from |=|\n\r|=| ..... .... ........ ... ........... .. .. .the legendary Dark Castle |/|\n\r|/|.... ..... ... d Y88888888888P b .... ... .Online Gaming code team. |=|\n\r|=| .. .... d8888 Y888888888P 8888b .... |/|\n\r|/| ,-. d888888a888888888a888888b ... __ \\ | |=|\n\r|=| (<@) )_ 88P' `Y888888888P' `Y88 .. | | _ `| __| | / |/|\n\r|/| \\ / ; ) ,,~~~. Y8888888P Y88 . | | ( | | < |=|\n\r|=| /``-*==' ,''8 '~~~ 8888888~~''``. 888 .. ____/ \\__,_|_| _|\\_\\ |/|\n\r|/| `--'}`~~' 888&aaaaaaa88P'8`Y88aaaaaa`.888 ... |=|\n\r|=| __ Y8888888888P 8 Y88888888;8P ___| | | |/|\n\r|/| ;-.\\__ 888bod8bod888 ; ... | _ `| __| __| | _ \\ |=|\n\r|=| |'@) ; `, ,~~~~d8888888888888b ' ... | ( |\\__ \\ | | __/ |/|\n\r|/| ,`/_.' |==~''##a. 888 `.888 888 ... \\____\\__,_|____/\\__|_|\\___| |=|\n\r|=| `.__\\_/ ` *#a. `. .... ; ..... |/|\n\r(o)===========================`.======,;====================================(o)\n\r|=| `~~a~'' |/|\n\r|/| a# www.dcastle.org |=|\n\r|=| #* |/|\n\r|/| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS |=|\n\r|=| port at 6670. The new Dark Castle is on port 23, 6969, 6970. |/|\n\r(o)=========================================================================(o)\n\r\n\rWhat name for the roster? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.5598344802856445
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:19:45.581340+00:00",
"host": "dcastle.org",
"ip": "72.14.179.114",
"port": 6666
},
{
"connected": "2026-04-05T19:01:45.519554+00:00",
"host": "dcastle.org",
"ip": "72.14.179.114",
"port": 6666
},
{
"connected": "2026-04-07T07:21:22.132324+00:00",
"host": "dcastle.org",
"ip": "72.14.179.114",
"port": 6666
}
]
}
.. raw:: html
Connection Log
~~~~~~~~~~~~~~
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug dcastle.org 6666
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1200 Fingerprint client: host=dcastle.org port=6666
INFO client_base.py:190 Connected to
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:1451 IAC GA: Go-Ahead (unhandled).
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL AARDWOLF, WILL MCCP2_COMPRESS, WILL ATCP, WILL MSSP, WILL MSP, WILL MCCP3_COMPRESS,
WILL MXP, WILL GMCP, WILL MSDP, WILL ZMP, DO AARDWOLF, DO MCCP2_COMPRESS, DO ATCP, DO MSSP, DO MSP, DO MCCP3_COMPRESS, DO MXP,
DO GMCP, DO MSDP, DO ZMP'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
.. raw:: html