98.50.23.19 (tdod.org) ====================== .. _ip_98_50_23_19_tdod_org_3000: tdod.org:3000 ------------- **Connection Banner:** .. image:: /_static/banners/banner_6abd4fc56e2a.png :alt: \* MajorTCP/IP by Vircom Inc. \* Connecting...Please Wait... Auto-sensing... ! WELCOME! tdod.org (#94675841) Running The Major BBS by GALACTICOMM ONLINE 38400 BAUD AT 10:11 14-FEB-26 If you already have a User-ID on this system, type it in and press RETURN. Otherwise type "new": If you already have a User-ID on this system, type it in and press RETURN. Otherwise type "new": If you already have a User-ID on this system, type it in and press RETURN. Otherwise type "new": :class: ansi-banner :width: 298px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`cfa317a91359cb0b ` *This fingerprint is shared by 1 other server.* **Options offered by server**: ``BINARY``, ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY``, ``SGA`` The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "cfa317a91359cb0b", "fingerprint-data": { "offered-options": [ "BINARY", "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY", "SGA" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press RETURN.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": \r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press RETURN.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": ", "banner_before_return": "* MajorTCP/IP by Vircom Inc. *\r\n\r\nConnecting...Please Wait...\r\n\r\nAuto-sensing...\r\n \u001b[!\b\b\b\r\u001b[0m\r\n\r\n \u001b[1;5;35mWELCOME!\r\n\r\n\u001b[0;1;32mtdod.org (#94675841)\r\nRunning The Major BBS by GALACTICOMM\r\nONLINE 38400 BAUD AT 10:11 14-FEB-26\r\n\u001b[0;1;32m\r\nIf you already have a User-ID on this\r\nsystem, type it in and press RETURN.\r\nOtherwise type \"\u001b[36mnew\u001b[32m\": ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": { "BINARY": true, "ECHO": true, "SGA": true }, "server_requested": { "BINARY": true, "ECHO": false, "SGA": true } }, "scan_type": "quick", "timing": { "probe": 0.5419721603393555, "total": 9.11581015586853 } } }, "sessions": [ { "connected": "2026-02-14T17:12:02.660911+00:00", "host": "tdod.org", "ip": "98.50.23.19", "port": 3000 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug tdod.org 3000 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=tdod.org port=3000 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:707 recv IAC DO SGA DEBUG stream_writer.py:1770 handle_do(SGA) DEBUG stream_writer.py:3174 pending_option[WILL + SGA] = True DEBUG stream_writer.py:950 send IAC WILL SGA DEBUG stream_writer.py:3174 local_option[SGA] = True DEBUG stream_writer.py:3174 pending_option[WILL + SGA] = False DEBUG stream_writer.py:707 recv IAC WILL SGA DEBUG stream_writer.py:723 WILL SGA unsolicited DEBUG stream_writer.py:1900 handle_will(SGA) DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 remote_option[SGA] = True DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False DEBUG stream_writer.py:707 recv IAC DONT ECHO DEBUG stream_writer.py:1863 handle_dont(ECHO) DEBUG stream_writer.py:3174 pending_option[WILL + ECHO] = False DEBUG stream_writer.py:3174 local_option[ECHO] = False DEBUG stream_writer.py:707 recv IAC WILL ECHO DEBUG stream_writer.py:723 WILL ECHO unsolicited DEBUG stream_writer.py:1900 handle_will(ECHO) DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 remote_option[ECHO] = True DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False DEBUG stream_writer.py:707 recv IAC DO BINARY DEBUG stream_writer.py:1770 handle_do(BINARY) DEBUG stream_writer.py:3174 pending_option[WILL + BINARY] = True DEBUG stream_writer.py:950 send IAC WILL BINARY DEBUG stream_writer.py:3174 local_option[BINARY] = True DEBUG stream_writer.py:3174 pending_option[WILL + BINARY] = False DEBUG stream_writer.py:707 recv IAC WILL BINARY DEBUG stream_writer.py:723 WILL BINARY unsolicited DEBUG stream_writer.py:1900 handle_will(BINARY) DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 remote_option[BINARY] = True DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = False DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP DEBUG stream_writer.py:707 recv IAC WONT STATUS DEBUG stream_writer.py:2025 handle_wont(STATUS) DEBUG stream_writer.py:3174 remote_option[STATUS] = False DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False DEBUG stream_writer.py:707 recv IAC WONT CHARSET DEBUG stream_writer.py:2025 handle_wont(CHARSET) DEBUG stream_writer.py:3174 remote_option[CHARSET] = False DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False DEBUG stream_writer.py:707 recv IAC WONT EOR DEBUG stream_writer.py:2025 handle_wont(EOR) DEBUG stream_writer.py:3174 remote_option[EOR] = False DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION) DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False DEBUG stream_writer.py:707 recv IAC WONT GMCP DEBUG stream_writer.py:2025 handle_wont(GMCP) DEBUG stream_writer.py:3174 remote_option[GMCP] = False DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False DEBUG stream_writer.py:707 recv IAC WONT MSDP DEBUG stream_writer.py:2025 handle_wont(MSDP) DEBUG stream_writer.py:3174 remote_option[MSDP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False DEBUG stream_writer.py:707 recv IAC WONT MSSP DEBUG stream_writer.py:2025 handle_wont(MSSP) DEBUG stream_writer.py:3174 remote_option[MSSP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False DEBUG stream_writer.py:707 recv IAC WONT MSP DEBUG stream_writer.py:2025 handle_wont(MSP) DEBUG stream_writer.py:3174 remote_option[MSP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False DEBUG stream_writer.py:707 recv IAC WONT MXP DEBUG stream_writer.py:2025 handle_wont(MXP) DEBUG stream_writer.py:3174 remote_option[MXP] = False DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False DEBUG stream_writer.py:707 recv IAC WONT ZMP DEBUG stream_writer.py:2025 handle_wont(ZMP) DEBUG stream_writer.py:3174 remote_option[ZMP] = False DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False INFO fingerprinting.py:737 new server fingerprint cfa317a91359cb0b INFO client_base.py:106 Connection closed to .. raw:: html
.. _ip_98_50_23_19_tdod_org_4000: tdod.org:4000 ------------- **Connection Banner:** .. image:: /_static/banners/banner_d5de45f55dc5.png :alt: -\| A .:::.:::. /.\\.. ...':::::::.:::. -\|.:[""M#:::.​... ..::::::::::::::::::::.​.... A \| # .:::.. s8888a /.\\ [""M# 888PPI::::...::.. [""M# \| # U"U#U .​...:::::::::PPP8888 \| # \| # \\ .:/ "Y8888P SMAUG 1.0 written by: \| # \| #​___\| # __ \\ _ \\ __ \\ Thoric, Altrag, Blodkai, \| "--' .-" \| \| ( \| \| \| Narn, Haus, Scryn, \|"​-"-"-"-"-#-#-## _​___/ \\___/ _​___/ Swordbearer, Rennard, \| # ## #​##### Tricops, and Gorog \\ .::::'/ Dawn of Demise... MERC 2.1 written by: \\ ::::'/ Hatchet, Furey, and Kahn :8a\| # # ## DikuMUD written by: ::88a ### Hans Staerfeldt, ::::888a 8a ##::. Katja Nyboe, ::::::::aSUNDOGa8a::::. .. ... .. Tom Madsen, :::::8:::8888:Y8888:::::::::... .:::::::::... Michael Seifert, :::::88::::888::8888a::::::::::::. .::::::::::::: Sebastian Hammer ::'::888::::888::Y88a_​_____________________________________________________ :: :::888a::::88a:Y88a _​_---__-- __ ' .: ::Y88a:::::8a:Y88a _​_----_-- -​------_-__ DoD is currently being written and developed by the DoD staff. For questions or concerns, contact : Implementor : Minex (rkinney -at- tdod.org) Head Coder : Gangien Enter your character's name or type NEW: :class: ansi-banner :width: 618px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html Server Info ~~~~~~~~~~~ - **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`c2dd7d4e76383b41 ` *This fingerprint is shared by 173 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\n\r -|\n\r A .:::.:::.\n\r /.\\.. ...':::::::.:::.\n\r -|.:[\"\"M#:::.... ..::::::::::::::::::::.....\n\r A | # .:::.. s8888a\n\r /.\\ [\"\"M# 888PPI::::...::..\n\r [\"\"M# | # U\"U#U ....:::::::::PPP8888\n\r | # | # \\ .:/ \"Y8888P SMAUG 1.0 written by:\n\r | # | #___| # __ \\ _ \\ __ \\ Thoric, Altrag, Blodkai,\n\r | \"--' .-\" | | ( | | | Narn, Haus, Scryn,\n\r |\"-\"-\"-\"-\"-#-#-## ____/ \\___/ ____/ Swordbearer, Rennard,\n\r | # ## ###### Tricops, and Gorog\n\r \\ .::::'/ Dawn of Demise... MERC 2.1 written by:\n\r \\ ::::'/ Hatchet, Furey, and Kahn\n\r :8a| # # ## DikuMUD written by:\n\r ::88a ### Hans Staerfeldt,\n\r ::::888a 8a ##::. Katja Nyboe,\n\r ::::::::aSUNDOGa8a::::. .. ... .. Tom Madsen,\n\r :::::8:::8888:Y8888:::::::::... .:::::::::... Michael Seifert,\n\r:::::88::::888::8888a::::::::::::. .::::::::::::: Sebastian Hammer\n\r::'::888::::888::Y88a______________________________________________________\n\r:: :::888a::::88a:Y88a __---__-- __\n\r' .: ::Y88a:::::8a:Y88a __----_-- -------_-__\n\rDoD is currently being written and developed by the DoD staff.\n\rFor questions or concerns, contact :\n\r Implementor : Minex (rkinney -at- tdod.org)\n\r Head Coder : Gangien\n\r\n\rEnter your character's name or type NEW: ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 2.8654253482818604 } } }, "sessions": [ { "connected": "2026-02-14T17:10:00.531412+00:00", "host": "tdod.org", "ip": "98.50.23.19", "port": 4000 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug tdod.org 4000 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=tdod.org port=4000 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG client_base.py:89 EOF from server, closing. INFO client_base.py:106 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 .. raw:: html