pixiemud.com ============ **Connection Banner:** .. image:: /_static/banners/banner_f06d54f990fb.png :alt: @@@@ @@@@ @@@@ /~~~/~~~/~~~/~~~/ @@@@ / / / / / @@@@@ / / / / / @@@@@@@@@=​====================================/ / / / / @@@@@@@@@@ PixieMud: Adventure Awaits You -​--------------- @@@@@@@@@=​====================================\\ \\ \\ \\ \\ @@@@@ \\ \\ \\ \\ \\ @@@@ \\ \\ \\ \\ \\ @@@@ ~~~ ~~~ ~~~ ~~~ @@@@ @@@@ PixieMud is currently running : 3.3.720. You have arrived at the borders of the sovereign realm of PixieMud, a realm of fantasy and magic. A pair of hulking guards are here checking everyone's credentials. One of the guards says: Please give us your name or ask to see the list. [list, or quit] : The guard says: Sorry, I didn't catch that. The guard says: What is your character name? [list, or quit] : :class: ansi-banner :width: 562px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Server Location**: 🇨🇦 Canada (GeoIP) Telnet Fingerprint ------------------ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "The guard says: Sorry, I didn't catch that.\r\nThe guard says: What is your character name?\r\n\r\n[list, or quit] : ", "banner_before_return": "\r\n \r\n @@@@ \r\n @@@@ \r\n @@@@ /~~~/~~~/~~~/~~~/\r\n @@@@ / / / / /\r\n @@@@@ / / / / /\r\n @@@@@@@@@=====================================/ / / / /\r\n @@@@@@@@@@ PixieMud: Adventure Awaits You ----------------\r\n @@@@@@@@@=====================================\\ \\ \\ \\ \\ \r\n @@@@@ \\ \\ \\ \\ \\ \r\n @@@@ \\ \\ \\ \\ \\ \r\n @@@@ ~~~ ~~~ ~~~ ~~~\r\n @@@@ \r\n @@@@\r\n\r\n\r\n\r\nPixieMud is currently running : 3.3.720.\r\n\r\nYou have arrived at the borders of the sovereign realm of PixieMud, a\r\nrealm of fantasy and magic. A pair of hulking guards are here\r\nchecking everyone's credentials.\r\n\r\nOne of the guards says: Please give us your name or ask to see the\r\nlist.\r\n\r\n[list, or quit] : ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.2708251476287842, "total": 4.925286531448364 } } }, "sessions": [ { "connected": "2026-02-14T17:10:08.527902+00:00", "host": "pixiemud.com", "ip": "76.11.28.176", "port": 6789 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug pixiemud.com 6789 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=pixiemud.com port=6789 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.01s. DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP DEBUG stream_writer.py:707 recv IAC WONT BINARY DEBUG stream_writer.py:2025 handle_wont(BINARY) DEBUG stream_writer.py:3174 remote_option[BINARY] = False DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = False DEBUG stream_writer.py:707 recv IAC WONT SGA DEBUG stream_writer.py:2025 handle_wont(SGA) DEBUG stream_writer.py:3174 remote_option[SGA] = False DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False DEBUG stream_writer.py:707 recv IAC WONT ECHO DEBUG stream_writer.py:2025 handle_wont(ECHO) DEBUG stream_writer.py:3174 remote_option[ECHO] = False DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False DEBUG stream_writer.py:707 recv IAC WONT STATUS DEBUG stream_writer.py:2025 handle_wont(STATUS) DEBUG stream_writer.py:3174 remote_option[STATUS] = False DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False DEBUG stream_writer.py:707 recv IAC WONT CHARSET DEBUG stream_writer.py:2025 handle_wont(CHARSET) DEBUG stream_writer.py:3174 remote_option[CHARSET] = False DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False DEBUG stream_writer.py:707 recv IAC WONT EOR DEBUG stream_writer.py:2025 handle_wont(EOR) DEBUG stream_writer.py:3174 remote_option[EOR] = False DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION) DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False DEBUG stream_writer.py:707 recv IAC WONT GMCP DEBUG stream_writer.py:2025 handle_wont(GMCP) DEBUG stream_writer.py:3174 remote_option[GMCP] = False DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False DEBUG stream_writer.py:707 recv IAC WONT MSDP DEBUG stream_writer.py:2025 handle_wont(MSDP) DEBUG stream_writer.py:3174 remote_option[MSDP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False DEBUG stream_writer.py:707 recv IAC WONT MSSP DEBUG stream_writer.py:2025 handle_wont(MSSP) DEBUG stream_writer.py:3174 remote_option[MSSP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False DEBUG stream_writer.py:707 recv IAC WONT MSP DEBUG stream_writer.py:2025 handle_wont(MSP) DEBUG stream_writer.py:3174 remote_option[MSP] = False DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False DEBUG stream_writer.py:707 recv IAC WONT MXP DEBUG stream_writer.py:2025 handle_wont(MXP) DEBUG stream_writer.py:3174 remote_option[MXP] = False DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False DEBUG stream_writer.py:707 recv IAC WONT ZMP DEBUG stream_writer.py:2025 handle_wont(ZMP) DEBUG stream_writer.py:3174 remote_option[ZMP] = False DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF DEBUG stream_writer.py:2025 handle_wont(AARDWOLF) DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False DEBUG stream_writer.py:707 recv IAC WONT ATCP DEBUG stream_writer.py:2025 handle_wont(ATCP) DEBUG stream_writer.py:3174 remote_option[ATCP] = False DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html