muck.wintersoasis.com ===================== **Connection Banner:** .. image:: /_static/banners/banner_2fc1844b4300.png :alt: __ ___ _ _ _​___ _ \\ \\ / (_) \| \| ( ) / __ \\ (_) \\ \\ /\\ / / _ _ __ \| \|_ ___ _ __\|/ ___ \| \| \| \| __ _ ___ _ ___ \\ \\/ \\/ / \| \| '_ \\\| __\|/ _ \\ '__\| / __\| \| \| \| \|/ _\` / __\| / __\| \\ /\\ / \| \| \| \| \| \|_\| __/ \| \\__ \\ \| \|__\| \| (_\| \\__ \\ \\__ \\ \\/ \\/ \|_\|_\| \|_\|\\__\|\\___\|_\| \|___/ \\_​___/ \\__,_\|___/_\|___/ Registered characters, connect with: connect name password [!] New here? Type: connect guest guest Login failed. To login as your character, type: connect charactername password ...where 'charactername' is your character's name, and 'password' is your password. If you do not yet have a character, type: connect guest guest :class: ansi-banner :width: 664px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Telnet Fingerprint ------------------ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "Login failed. To login as your character, type:\n\nconnect charactername password\n\n...where 'charactername' is your character's name, and 'password' is your password.\n\nIf you do not yet have a character, type:\n\nconnect guest guest\n\n", "banner_before_return": " __ ___ _ _ ____ _ \r\n \\ \\ / (_) | | ( ) / __ \\ (_) \r\n \\ \\ /\\ / / _ _ __ | |_ ___ _ __|/ ___ | | | | __ _ ___ _ ___ \r\n \\ \\/ \\/ / | | '_ \\| __|/ _ \\ '__| / __| | | | |/ _` / __| / __|\r\n \\ /\\ / | | | | | |_| __/ | \\__ \\ | |__| | (_| \\__ \\ \\__ \\\r\n \\/ \\/ |_|_| |_|\\__|\\___|_| |___/ \\____/ \\__,_|___/_|___/\r\n\r\nRegistered characters, connect with: connect name password\r\n[!] New here? Type: connect guest guest\r\n", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.35645127296447754, "total": 5.103126049041748 } } }, "sessions": [ { "connected": "2026-02-14T17:09:17.666403+00:00", "host": "muck.wintersoasis.com", "ip": "173.255.192.183", "port": 8888 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug muck.wintersoasis.com 8888 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=muck.wintersoasis.com port=8888 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.02s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP DEBUG stream_writer.py:707 recv IAC WONT BINARY DEBUG stream_writer.py:2025 handle_wont(BINARY) DEBUG stream_writer.py:3174 remote_option[BINARY] = False DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = False DEBUG stream_writer.py:707 recv IAC WONT SGA DEBUG stream_writer.py:2025 handle_wont(SGA) DEBUG stream_writer.py:3174 remote_option[SGA] = False DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False DEBUG stream_writer.py:707 recv IAC WONT ECHO DEBUG stream_writer.py:2025 handle_wont(ECHO) DEBUG stream_writer.py:3174 remote_option[ECHO] = False DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False DEBUG stream_writer.py:707 recv IAC WONT STATUS DEBUG stream_writer.py:2025 handle_wont(STATUS) DEBUG stream_writer.py:3174 remote_option[STATUS] = False DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False DEBUG stream_writer.py:707 recv IAC WONT CHARSET DEBUG stream_writer.py:2025 handle_wont(CHARSET) DEBUG stream_writer.py:3174 remote_option[CHARSET] = False DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False DEBUG stream_writer.py:707 recv IAC WONT EOR DEBUG stream_writer.py:2025 handle_wont(EOR) DEBUG stream_writer.py:3174 remote_option[EOR] = False DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION) DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False DEBUG stream_writer.py:707 recv IAC WONT GMCP DEBUG stream_writer.py:2025 handle_wont(GMCP) DEBUG stream_writer.py:3174 remote_option[GMCP] = False DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False DEBUG stream_writer.py:707 recv IAC WONT MSDP DEBUG stream_writer.py:2025 handle_wont(MSDP) DEBUG stream_writer.py:3174 remote_option[MSDP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False DEBUG stream_writer.py:707 recv IAC WONT MSSP DEBUG stream_writer.py:2025 handle_wont(MSSP) DEBUG stream_writer.py:3174 remote_option[MSSP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False DEBUG stream_writer.py:707 recv IAC WONT MSP DEBUG stream_writer.py:2025 handle_wont(MSP) DEBUG stream_writer.py:3174 remote_option[MSP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False DEBUG stream_writer.py:707 recv IAC WONT MXP DEBUG stream_writer.py:2025 handle_wont(MXP) DEBUG stream_writer.py:3174 remote_option[MXP] = False DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False DEBUG stream_writer.py:707 recv IAC WONT ZMP DEBUG stream_writer.py:2025 handle_wont(ZMP) DEBUG stream_writer.py:3174 remote_option[ZMP] = False DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF DEBUG stream_writer.py:2025 handle_wont(AARDWOLF) DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False DEBUG stream_writer.py:707 recv IAC WONT ATCP DEBUG stream_writer.py:2025 handle_wont(ATCP) DEBUG stream_writer.py:3174 remote_option[ATCP] = False DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False INFO fingerprinting.py:737 new server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html