nomoreheroes.org ================ .. raw:: html .. raw:: html

nomoreheroes.org:4201

Telnet Fingerprint ------------------ :ref:`97bd59a2fbb54052... ` *This fingerprint is shared by 6 other servers.* **Options requested from client**: ``CHARSET``, ``NAWS`` **Data source**: `97bd59a2fbb54052/3880b87803a2f1b1.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "97bd59a2fbb54052", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "CHARSET", "COM_PORT", "DET", "ECHO", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SGA", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [ "CHARSET", "NAWS" ] }, "session_data": { "banner_after_return": "| |\n \\_____\\___/|_| |_| |_|_|\\___| |_| |_|\\____/|_____/|_| |_|\n\n LOG IN WITH NAME AND PASSWORD \n OR TYPE 'TOUR' TO LOG IN AS A GUEST\n_______________________________________________________________________\u001b[0m\r\n\u001b[36m%% Welcome to AresMUSH version 1.5.0! http://www.aresmush.com\n%% Type 'help' to learn how to play. Type 'tour' to connect to a guest character to explore.\u001b[0m\u001b[0m\r\n", "banner_before_return": " __ __ _ _ _ \n \\ \\ / / | | /\\ | | | | \n \\ \\_/ /__| |_ / \\ _ __ ___ | |_| |__ ___ _ __ \n \\ / _ \\ __| / /\\ \\ | '_ \\ / _ \\| __| '_ \\ / _ \\ '__| \n | | __/ |_ / ____ \\| | | | (_) | |_| | | | __/ | \n |_|\\___|\\__| /_/ \\_\\_| |_|\\___/ \\__|_| |_|\\___|_| \n ______ __ __ ______ __ __ __ __ __ ______ \n /\\ ___\\/\\ \\/\\ \\ /\\ ___\\ /\\ \\/ / /\\ \\ /\\ \"-.\\ \\ /\\ ___\\ \n \\ \\ __\\\\ \\ \\_\\ \\\\ \\ \\____\\ \\ _\"-.\\ \\ \\\\ \\ \\-. \\\\ \\ \\__ \\ \n \\ \\_\\ \\ \\_____\\\\ \\_____\\\\ \\_\\ \\_\\\\ \\_\\\\ \\_\\\\\"\\_\\\\ \\_____\\ \n \\/_/ \\/_____/ \\/_____/ \\/_/\\/_/ \\/_/ \\/_/ \\/_/ \\/_____/\n _____ _ __ __ _ _ _____ _ _ \n / ____| (_) | \\/ | | | |/ ____| | | |\n | | ___ _ __ ___ _ ___ | \\ / | | | | (___ | |__| |\n | | / _ \\| '_ ` _ \\| |/ __| | |\\/| | | | |\\___ \\| __ |\n | |___| (_) | | | | | | | (__ | | | | |__| |____) | | ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": { "CHARSET": true, "NAWS": true } }, "timing": { "probe": 0.5036439895629883, "total": 1.004539966583252 } } }, "sessions": [ { "connected": "2026-02-08T05:02:41.695515+00:00", "host": "nomoreheroes.org", "ip": "165.227.192.95", "port": 4201 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=nomoreheroes.org port=4201 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC DO NAWS DEBUG stream_writer.py:1739 handle_do(NAWS) DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = True DEBUG stream_writer.py:938 send IAC WILL NAWS DEBUG stream_writer.py:2306 send IAC SB NAWS (rows=25, cols=80) IAC SE DEBUG stream_writer.py:3036 local_option[NAWS] = True DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:697 recv IAC DO CHARSET DEBUG stream_writer.py:1739 handle_do(CHARSET) DEBUG stream_writer.py:3036 pending_option[WILL + CHARSET] = True DEBUG stream_writer.py:938 send IAC WILL CHARSET DEBUG stream_writer.py:3036 local_option[CHARSET] = True DEBUG stream_writer.py:3036 pending_option[WILL + CHARSET] = False DEBUG stream_writer.py:689 begin sub-negotiation SB CHARSET DEBUG stream_writer.py:676 sub-negotiation cmd CHARSET SE completion byte DEBUG stream_writer.py:2031 [SB + CHARSET] unsolicited DEBUG client.py:266 encoding negotiated: utf-8 DEBUG stream_writer.py:2111 send IAC SB CHARSET ACCEPTED utf-8 IAC SE DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True DEBUG stream_writer.py:938 send IAC DO ECHO DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint 4bf9c4a457402b1d INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug nomoreheroes.org 4201