mud.morchronium.com =================== .. raw:: html .. raw:: html

mud.morchronium.com:8000

Telnet Fingerprint ------------------ :ref:`8d9ec9f191ea1be9... ` *This fingerprint is shared by 110 other servers.* **Data source**: `8d9ec9f191ea1be9/43ff1a21e68968a4.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8d9ec9f191ea1be9", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [] }, "session_data": { "banner_after_return": "\n\r\n\r\n\r\u001b[1;31m. \u001b[1;31m.\n \u001b[1;31m.\u001b[0;31mn \u001b[1;31m. \u001b[1;31m. \u001b[0;31mn\u001b[1;31m.\n \u001b[1;31m. .dP dP 9b 9b. .\n \u001b[1;30m4 qXb . dX Xb . dXp t\n\u001b[1;30mdX. 9Xb .dXb __ __ dXb. dXP .Xb\n\u001b[1;30m9XXb._ _.dXXXXb dXXXXbo. .odXXXXb dXXXXb._ _.dXXP\n \u001b[1;30m9XXXXXXXXXXXXXXXXXXXVXXXXXXXXOo. .oOXXXXXXXXVXXXXXXXXXXXXXXXXXXXP\n \u001b[1;30m`9XXXXXXXXXXXXXXXXXXXXX'x x`OOO8b d8OOO'x x`XXXXXXXXXXXXXXXXXXXXXP'\n \u001b[1;30m`9XXXXXXXXXXXP' `9XX' \u001b[1;31mD\u001b[0;31mI\u001b[1;31mE\u001b[0m \u001b[1;30m`98v8P' \u001b[1;31mH\u001b[0;31mU\u001b[1;31mM\u001b[0;31mA\u001b[1;31mN\u001b[1;30m `XXP' \u001b[1;30m`9XXXXXXXXXXXP'\n \u001b[1;30mXXXXXXX 9X. .db|db. .XP XXXXXXX\n \u001b[1;30m)b. .dbo.dP'`v'`9b.odb. .dX(\n \u001b[1;30m,d", "banner_before_return": "Welcome to The Eternal Battles: Chapter 2.\n135.129.91.121 do you want full ANSI color text? ", "encoding": "ascii", "option_states": { "server_offered": { "0x55": false, "0x5b": false }, "server_requested": {} }, "timing": { "probe": 0.5097148418426514, "total": 1.1685941219329834 } } }, "sessions": [ { "connected": "2026-02-08T05:36:08.425073+00:00", "host": "mud.morchronium.com", "ip": "143.109.10.156", "port": 8000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=mud.morchronium.com port=8000 ERROR client.py:849 mud.morchronium.com:8000: [Errno 111] Connect call failed ('143.109.10.156', 8000) *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug mud.morchronium.com 8000