realm.majicrealm.com ==================== **Connection Banner:** .. image:: /_static/banners/banner_da789ed1a767.png :alt: Lemon Drop Games LLC Presents _​____ _​_.__ _​_________ .__ / \\ _​____ \|__\|__\| _​___ \\_​_____ \\ _​___ _​____ \| \| _​____ / \\ / \\\\__ \\ \| \| \|/ ___\\ \| _// __ \\\\__ \\ \| \| / \\ / Y \\/ __ \\_ \| \| \\ \\___ \| \| \\ ___/ / __ \\\| \|_\| Y Y \\ \\_​___\|__ (_​___ /\\__\| \|__\|\\___ > \|_​___\|_ /\\___ >_​___ /_​___/__\|_\| / \\/ \\/\\_​_____\| \\/ \\/ \\/ \\/ \\/ Welcome to the Magic Realm! All rights reserved. Copyright 1992-2023. -​---------------------//-​----------------------- For support contact support@majicrealm.com Billing comes from Lemon Drop Games LLC. Thank you for your support! =​====================//=​=========================  Login id: Password: :class: ansi-banner :width: 594px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Server Location**: 🇺🇸 United States (GeoIP) Telnet Fingerprint ------------------ :ref:`6ce5a5802c4805f5 ` *This fingerprint is unique to this server.* **Options offered by server**: ``ECHO``, ``SGA`` **Options requested from client**: ``SGA`` The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "6ce5a5802c4805f5", "fingerprint-data": { "offered-options": [ "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "SGA" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\u0000\u001b[0K\rPassword: \u0000", "banner_before_return": "Lemon Drop Games LLC Presents\n\r\n\r _____ __.__ __________ .__ \n\r / \\ _____ |__|__| ____ \\______ \\ ____ _____ | | _____ \n\r / \\ / \\\\__ \\ | | |/ ___\\ | _// __ \\\\__ \\ | | / \\ \n\r/ Y \\/ __ \\_ | | \\ \\___ | | \\ ___/ / __ \\| |_| Y Y \\\n\r\\____|__ (____ /\\__| |__|\\___ > |____|_ /\\___ >____ /____/__|_| /\n\r \\/ \\/\\______| \\/ \\/ \\/ \\/ \\/ \n\r\n\rWelcome to the Magic Realm!\n\r\n\rAll rights reserved. Copyright 1992-2023.\n\r\n\r----------------------//------------------------\n\r\n\rFor support contact support@majicrealm.com\n\rBilling comes from Lemon Drop Games LLC.\n\r\n\rThank you for your support!\n\r=====================//==========================\n\r\n\r \u0005\u0000\u001b[0K\r\r\nLogin id: ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": { "ECHO": true, "SGA": true }, "server_requested": { "ECHO": false, "SGA": true } }, "scan_type": "quick", "timing": { "probe": 0.5085892677307129, "total": 5.717209339141846 } } }, "sessions": [ { "connected": "2026-02-14T17:12:50.351429+00:00", "host": "realm.majicrealm.com", "ip": "35.88.197.177", "port": 28375 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug realm.majicrealm.com 28375 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=realm.majicrealm.com port=28375 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.00s. DEBUG stream_writer.py:707 recv IAC WILL ECHO DEBUG stream_writer.py:723 WILL ECHO unsolicited DEBUG stream_writer.py:1900 handle_will(ECHO) DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True DEBUG stream_writer.py:950 send IAC DO ECHO DEBUG stream_writer.py:3174 remote_option[ECHO] = True DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False DEBUG stream_writer.py:707 recv IAC DONT ECHO DEBUG stream_writer.py:1863 handle_dont(ECHO) DEBUG stream_writer.py:3174 pending_option[WILL + ECHO] = False DEBUG stream_writer.py:3174 local_option[ECHO] = False DEBUG stream_writer.py:707 recv IAC WILL SGA DEBUG stream_writer.py:723 WILL SGA unsolicited DEBUG stream_writer.py:1900 handle_will(SGA) DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 remote_option[SGA] = True DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False DEBUG stream_writer.py:707 recv IAC DO SGA DEBUG stream_writer.py:1770 handle_do(SGA) DEBUG stream_writer.py:3174 pending_option[WILL + SGA] = True DEBUG stream_writer.py:950 send IAC WILL SGA DEBUG stream_writer.py:3174 local_option[SGA] = True DEBUG stream_writer.py:3174 pending_option[WILL + SGA] = False DEBUG stream_writer.py:707 recv IAC WILL ECHO DEBUG stream_writer.py:723 WILL ECHO unsolicited DEBUG stream_writer.py:1900 handle_will(ECHO) DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:737 new server fingerprint 6ce5a5802c4805f5 INFO client_base.py:106 Connection closed to .. raw:: html