necromium.com ============= .. raw:: html .. raw:: html

necromium.com:4000

Telnet Fingerprint ------------------ :ref:`8230b57f2279de84... ` *This fingerprint is shared by 102 other servers.* **Data source**: `8230b57f2279de84/e601446e6c773c1b.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8230b57f2279de84", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "SGA", "STATUS" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\r\nWelcome to...\r\n_ _ __________________________________________________________________________\r\n_ _____ |: ____|: _ |: _ |: _ |: _ _ |: |: | |: _ _ |\r\n /| | |. |___|. |___|. |___|. | |. | | |. |. | |. | | |\r\n| | | | ____| |__/| |__/| | | | | | | | | | | |\r\n| | | | |___| |___| | | | | | | | | | | | | | |\r\n| | | | | | | | | | | | | | | | | | | | | |\r\n| | | | | | | | | | | | | | | | | | | | | |\r\n| | | | | | | | | | | | | | | | | | | | | |\r\n| | | |_______|_______|___| | |_______|___|___|___|___|_______| | | |\r\n| |___|___|______/_______/___/ |/_______/___________/___/_______/|___|___|___|\r\n|/_______/ .: N E C R O M I U M :. |/___________/\r\n --\r\n\r\nSpecial thanks to BoneZ, Demigo,", "banner_before_return": "\r\n\u001b[2K\rDo you wish to use ANSI colors? (Y/n): ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5030488967895508, "total": 3.1136581897735596 } } }, "sessions": [ { "connected": "2026-02-08T16:14:13.666894+00:00", "host": "necromium.com", "ip": "70.39.102.104", "port": 4000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=necromium.com port=4000 INFO client_base.py:174 Connected to DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True DEBUG stream_writer.py:938 send IAC DO ECHO DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug necromium.com 4000