mud.nemesis.de ============== .. raw:: html .. raw:: html

mud.nemesis.de:2000

Telnet Fingerprint ------------------ :ref:`89d11e6aa6390ea0... ` *This fingerprint is shared by 5 other servers.* **Options requested from client**: ``TTYPE`` **Data source**: `89d11e6aa6390ea0/b753a038dfe47f48.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "89d11e6aa6390ea0", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [ "TTYPE" ] }, "session_data": { "banner_after_return": " ## XX ## \r\n # ## ## ## XXX X .## .## .## XX ## XX ##\r\n ## # ### XXXX # # # XXX ## XXX ##\r\n ## # ##\r\n Prepare to die. #\r\nPlease use \"guest\" if you're just being curious.\r\nNemesis at Munich, Germany, is currently running version 03.01.02.\r\nContact Data (Impressum): https://nemesis.de/contact/\r\nPlease tell us your name: ", "banner_before_return": " You have touched the world of ..........\r\n .... ||| __-- ....\r\n ... ' ||| --__-- ...\r\n .. '' | || __-- |||| ..\r\n .. '' ' | __ --____ ||||| ..\r\n . '' ' ' - __---- __ ||| `` .\r\n . ' ||| _-- --- __ || ``` .\r\n . '' -- || --- __ | `` .\r\n . ' ### || -_ ---- - `` `.\r\n ### . |.## ~ ||||| --_ | || ``` .\r\n ### . .## ||||||||| ~ - ||| ```` . XX \r\n ### ## . ## ~ ||||||||| ~~ ~ ` ``` . X\r\n ### ## .## ~ || ### ## . .\r\n ### ## ### XXXXX ## ## ### ## XXXX .#### XX ####<\r\n ### ## ###. XX X ## ## ## XX . ## XX ##\r\n # ### ## ### .XXX ## ## ## XXX ### XX ###\r\n # ### ## ### XX . . ## ## ## .XX ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "timing": { "probe": 0.5079796314239502, "total": 1.0088698863983154 } } }, "sessions": [ { "connected": "2026-02-08T06:01:27.518083+00:00", "host": "mud.nemesis.de", "ip": "81.92.172.208", "port": 2000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=mud.nemesis.de port=2000 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC DO TTYPE DEBUG stream_writer.py:1739 handle_do(TTYPE) DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = True DEBUG stream_writer.py:938 send IAC WILL TTYPE DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = True DEBUG stream_writer.py:3036 local_option[TTYPE] = True DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = False DEBUG client_base.py:463 negotiation failed after 4.00s. DEBUG client_base.py:470 failed-reply: 'SB TTYPE' DEBUG stream_writer.py:689 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:676 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = False DEBUG stream_writer.py:2203 recv TTYPE SEND: b'' DEBUG stream_writer.py:2214 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint 6f760814123baeb7 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug mud.nemesis.de 2000