72.14.179.114 (dcastle.org) =========================== .. _ip_72_14_179_114_dcastle_org_23: dcastle.org:23 -------------- **Connection Banner:** .. image:: /_static/banners/banner_a4874dd966fa.png :alt: Based on DIKUMUD by M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe (o)=​========================================================================(o) \|/\| .​.... .​.... .​..................... .​..... .. \|=\| \|=\| .​.... .​... .​....... ... .​.......... .. .. . \|/\| \|/\|.​... .​.... ... d Y88888888888P b .​... ... . \|=\| \|=\| .. .​... d8888 Y888888888P 8888b .​... \|/\| \|/\| ,-. d888888a888888888a888888b ... __ \\ \| \|=\| \|=\| (<@) )_ 88P' \`Y888888888P' \`Y88 .. \| \| _ \`\| __\| \| / \|/\| \|/\| \\ / ; ) ,,~​~~. Y8888888P Y88 . \| \| ( \| \| < \|=\| \|=\| /\`\`-\*==' ,''8 '~~~ 8888888~~''\`\`. 888 .. _​___/ \\__,_\|_\| _\|\\_\\ \|/\| \|/\| \`--'}\`~~' 888&aaaaaaa88P'8\`Y88aaaaaa\`.888 ... \|=\| \|=\| __ Y8888888888P 8 Y88888888;8P ___\| \| \| \|/\| \|/\| ;-.\\__ 888bod8bod888 ; ... \| _ \`\| __\| __\| \| _ \\ \|=\| \|=\| \|'@) ; \`, ,~​~~~d8888888888888b ' ... \| ( \|\\__ \\ \| \| __/ \|/\| \|/\| ,\`/_.' \|==~''##a. 888 \`.888 888 ... \\_​___\\__,_\|_​___/\\__\|_\|\\___\| \|=\| \|=\| \`.__\\_/ \` \*#a. \`. .​... ; .​.... \|/\| (o)=​==========================\`.​======,;=​===================================(o) \|=\| \`~~a~'' \|/\| \|/\| a# www.dcastle.org \|=\| \|=\| #\* \|/\| \|/\| dcastle.org telnet ports: 23, 6969 \|=\| \|=\| SSL/TSL port: 6970 \|/\| (o)=​========================================================================(o) What name for the roster? Empty name. Disconnecting... :class: ansi-banner :width: 633px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: 🇺🇸 United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`c2dd7d4e76383b41 ` *This fingerprint is shared by 111 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "Empty name. Disconnecting...", "banner_before_return": "\r\n Based on DIKUMUD by M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r(o)=========================================================================(o)\n\r|/| ..... ..... ...................... ...... .. |=|\n\r|=| ..... .... ........ ... ........... .. .. . |/|\n\r|/|.... ..... ... d Y88888888888P b .... ... . |=|\n\r|=| .. .... d8888 Y888888888P 8888b .... |/|\n\r|/| ,-. d888888a888888888a888888b ... __ \\ | |=|\n\r|=| (<@) )_ 88P' `Y888888888P' `Y88 .. | | _ `| __| | / |/|\n\r|/| \\ / ; ) ,,~~~. Y8888888P Y88 . | | ( | | < |=|\n\r|=| /``-*==' ,''8 '~~~ 8888888~~''``. 888 .. ____/ \\__,_|_| _|\\_\\ |/|\n\r|/| `--'}`~~' 888&aaaaaaa88P'8`Y88aaaaaa`.888 ... |=|\n\r|=| __ Y8888888888P 8 Y88888888;8P ___| | | |/|\n\r|/| ;-.\\__ 888bod8bod888 ; ... | _ `| __| __| | _ \\ |=|\n\r|=| |'@) ; `, ,~~~~d8888888888888b ' ... | ( |\\__ \\ | | __/ |/|\n\r|/| ,`/_.' |==~''##a. 888 `.888 888 ... \\____\\__,_|____/\\__|_|\\___| |=|\n\r|=| `.__\\_/ ` *#a. `. .... ; ..... |/|\n\r(o)===========================`.======,;====================================(o)\n\r|=| `~~a~'' |/|\n\r|/| a# www.dcastle.org |=|\n\r|=| #* |/|\n\r|/| dcastle.org telnet ports: 23, 6969 |=|\n\r|=| SSL/TSL port: 6970 |/|\n\r(o)=========================================================================(o)\n\r\n\rWhat name for the roster? ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 5.55775785446167 } } }, "sessions": [ { "connected": "2026-03-07T04:00:27.338046+00:00", "host": "dcastle.org", "ip": "72.14.179.114", "port": 23 }, { "connected": "2026-04-07T06:57:38.988472+00:00", "host": "dcastle.org", "ip": "72.14.179.114", "port": 23 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug dcastle.org 23 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1200 Fingerprint client: host=dcastle.org port=23 INFO client_base.py:190 Connected to DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True DEBUG stream_writer.py:1024 send IAC WILL MXP DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True DEBUG stream_writer.py:1024 send IAC WILL ATCP DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True DEBUG stream_writer.py:1024 send IAC WILL GMCP DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True DEBUG stream_writer.py:1024 send IAC WILL ZMP DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True DEBUG stream_writer.py:1024 send IAC WILL MSSP DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True DEBUG stream_writer.py:1024 send IAC WILL MSP DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True DEBUG stream_writer.py:1024 send IAC WILL MSDP DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True DEBUG stream_writer.py:1024 send IAC DO MXP DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:1024 send IAC DO AARDWOLF DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True DEBUG stream_writer.py:1024 send IAC DO ATCP DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True DEBUG stream_writer.py:1024 send IAC DO GMCP DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True DEBUG stream_writer.py:1024 send IAC DO ZMP DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True DEBUG stream_writer.py:1024 send IAC DO MSSP DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True DEBUG stream_writer.py:1024 send IAC DO MSP DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True DEBUG stream_writer.py:1024 send IAC DO MSDP DEBUG stream_writer.py:1451 IAC GA: Go-Ahead (unhandled). DEBUG client_base.py:534 negotiation failed after 4.00s. DEBUG client_base.py:540 failed-reply: 'WILL MXP, WILL AARDWOLF, WILL MCCP3_COMPRESS, WILL ATCP, WILL GMCP, WILL MCCP2_COMPRESS, WILL ZMP, WILL MSSP, WILL MSP, WILL MSDP, DO MXP, DO AARDWOLF, DO MCCP3_COMPRESS, DO ATCP, DO GMCP, DO MCCP2_COMPRESS, DO ZMP, DO MSSP, DO MSP, DO MSDP' DEBUG client_base.py:93 EOF from server, closing. INFO client_base.py:122 Connection closed to DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41 .. raw:: html
.. _ip_72_14_179_114_dcastle_org_6666: dcastle.org:6666 ---------------- **Connection Banner:** .. image:: /_static/banners/banner_cd59004a564b.png :alt: Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe (o)=​========================================================================(o) \|/\| .​.... .​.... .​..................... .​..... ..A Shit-Kicking MUD from \|=\| \|=\| .​.... .​... .​....... ... .​.......... .. .. .the legendary Dark Castle \|/\| \|/\|.​... .​.... ... d Y88888888888P b .​... ... .Online Gaming code team. \|=\| \|=\| .. .​... d8888 Y888888888P 8888b .​... \|/\| \|/\| ,-. d888888a888888888a888888b ... __ \\ \| \|=\| \|=\| (<@) )_ 88P' \`Y888888888P' \`Y88 .. \| \| _ \`\| __\| \| / \|/\| \|/\| \\ / ; ) ,,~​~~. Y8888888P Y88 . \| \| ( \| \| < \|=\| \|=\| /\`\`-\*==' ,''8 '~~~ 8888888~~''\`\`. 888 .. _​___/ \\__,_\|_\| _\|\\_\\ \|/\| \|/\| \`--'}\`~~' 888&aaaaaaa88P'8\`Y88aaaaaa\`.888 ... \|=\| \|=\| __ Y8888888888P 8 Y88888888;8P ___\| \| \| \|/\| \|/\| ;-.\\__ 888bod8bod888 ; ... \| _ \`\| __\| __\| \| _ \\ \|=\| \|=\| \|'@) ; \`, ,~​~~~d8888888888888b ' ... \| ( \|\\__ \\ \| \| __/ \|/\| \|/\| ,\`/_.' \|==~''##a. 888 \`.888 888 ... \\_​___\\__,_\|_​___/\\__\|_\|\\___\| \|=\| \|=\| \`.__\\_/ \` \*#a. \`. .​... ; .​.... \|/\| (o)=​==========================\`.​======,;=​===================================(o) \|=\| \`~~a~'' \|/\| \|/\| a# www.dcastle.org \|=\| \|=\| #\* \|/\| \|/\| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS \|=\| \|=\| port at 6670. The new Dark Castle is on port 23, 6969, 6970. \|/\| (o)=​========================================================================(o) What name for the roster? Empty name. Disconnecting... :class: ansi-banner :width: 633px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: 🇺🇸 United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`c2dd7d4e76383b41 ` *This fingerprint is shared by 111 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "Empty name. Disconnecting...", "banner_before_return": "\r\n Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r(o)=========================================================================(o)\n\r|/| ..... ..... ...................... ...... ..A Shit-Kicking MUD from |=|\n\r|=| ..... .... ........ ... ........... .. .. .the legendary Dark Castle |/|\n\r|/|.... ..... ... d Y88888888888P b .... ... .Online Gaming code team. |=|\n\r|=| .. .... d8888 Y888888888P 8888b .... |/|\n\r|/| ,-. d888888a888888888a888888b ... __ \\ | |=|\n\r|=| (<@) )_ 88P' `Y888888888P' `Y88 .. | | _ `| __| | / |/|\n\r|/| \\ / ; ) ,,~~~. Y8888888P Y88 . | | ( | | < |=|\n\r|=| /``-*==' ,''8 '~~~ 8888888~~''``. 888 .. ____/ \\__,_|_| _|\\_\\ |/|\n\r|/| `--'}`~~' 888&aaaaaaa88P'8`Y88aaaaaa`.888 ... |=|\n\r|=| __ Y8888888888P 8 Y88888888;8P ___| | | |/|\n\r|/| ;-.\\__ 888bod8bod888 ; ... | _ `| __| __| | _ \\ |=|\n\r|=| |'@) ; `, ,~~~~d8888888888888b ' ... | ( |\\__ \\ | | __/ |/|\n\r|/| ,`/_.' |==~''##a. 888 `.888 888 ... \\____\\__,_|____/\\__|_|\\___| |=|\n\r|=| `.__\\_/ ` *#a. `. .... ; ..... |/|\n\r(o)===========================`.======,;====================================(o)\n\r|=| `~~a~'' |/|\n\r|/| a# www.dcastle.org |=|\n\r|=| #* |/|\n\r|/| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS |=|\n\r|=| port at 6670. The new Dark Castle is on port 23, 6969, 6970. |/|\n\r(o)=========================================================================(o)\n\r\n\rWhat name for the roster? ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 5.5598344802856445 } } }, "sessions": [ { "connected": "2026-03-07T04:19:45.581340+00:00", "host": "dcastle.org", "ip": "72.14.179.114", "port": 6666 }, { "connected": "2026-04-05T19:01:45.519554+00:00", "host": "dcastle.org", "ip": "72.14.179.114", "port": 6666 }, { "connected": "2026-04-07T07:21:22.132324+00:00", "host": "dcastle.org", "ip": "72.14.179.114", "port": 6666 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug dcastle.org 6666 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1200 Fingerprint client: host=dcastle.org port=6666 INFO client_base.py:190 Connected to DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True DEBUG stream_writer.py:1024 send IAC WILL ATCP DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True DEBUG stream_writer.py:1024 send IAC WILL MSSP DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True DEBUG stream_writer.py:1024 send IAC WILL MSP DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True DEBUG stream_writer.py:1024 send IAC WILL MXP DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True DEBUG stream_writer.py:1024 send IAC WILL GMCP DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True DEBUG stream_writer.py:1024 send IAC WILL MSDP DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True DEBUG stream_writer.py:1024 send IAC WILL ZMP DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:1024 send IAC DO AARDWOLF DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True DEBUG stream_writer.py:1024 send IAC DO ATCP DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True DEBUG stream_writer.py:1024 send IAC DO MSSP DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True DEBUG stream_writer.py:1024 send IAC DO MSP DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True DEBUG stream_writer.py:1024 send IAC DO MXP DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True DEBUG stream_writer.py:1024 send IAC DO GMCP DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True DEBUG stream_writer.py:1024 send IAC DO MSDP DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True DEBUG stream_writer.py:1024 send IAC DO ZMP DEBUG stream_writer.py:1451 IAC GA: Go-Ahead (unhandled). DEBUG client_base.py:534 negotiation failed after 4.00s. DEBUG client_base.py:540 failed-reply: 'WILL AARDWOLF, WILL MCCP2_COMPRESS, WILL ATCP, WILL MSSP, WILL MSP, WILL MCCP3_COMPRESS, WILL MXP, WILL GMCP, WILL MSDP, WILL ZMP, DO AARDWOLF, DO MCCP2_COMPRESS, DO ATCP, DO MSSP, DO MSP, DO MCCP3_COMPRESS, DO MXP, DO GMCP, DO MSDP, DO ZMP' DEBUG client_base.py:93 EOF from server, closing. INFO client_base.py:122 Connection closed to DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41 .. raw:: html