Sanity's Edge ============= .. raw:: html .. raw:: html

sanitysedge.com:2020

Server Info ----------- - **Codebase**: CD - **Family**: LPMud - **Genre**: Science Fiction - **Gameplay**: Hack and Slash - **Players online**: 5 [#scan]_ - **Uptime**: 17 days - **Created**: 1995 - **Location**: United States of America - **Language**: English Protocol Support ---------------- MUD-specific protocols detected via MSSP flags or Telnet negotiation. - **MSSP**: :proto-yes:`Yes` (MSSP) - **GMCP**: :proto-yes:`Yes` (MSSP) - **MSDP**: :proto-no:`No` - **MCCP**: :proto-no:`No` - **MCCP2**: :proto-no:`No` - **MXP**: :proto-no:`No` - **MSP**: :proto-no:`No` - **MCP**: :proto-no:`No` - **ZMP**: :proto-no:`No` Telnet Fingerprint ------------------ :ref:`b4e9c93ab4bb4b35... ` *This fingerprint is shared by 1 other server.* **Options offered by server**: ``CHARSET``, ``ECHO``, ``SGA`` **Data source**: `b4e9c93ab4bb4b35/c3913a32d832937f.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "b4e9c93ab4bb4b35", "fingerprint-data": { "offered-options": [ "CHARSET", "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AUTHENTICATION", "BINARY", "BM", "COM_PORT", "DET", "ENCRYPT", "EOR", "FORWARD_X", "KERMIT", "NAMS", "NAOCRD", "NAOFFD", "NAOHTD", "NAOHTS", "NAOL", "NAOLFD", "NAOP", "NAOVTD", "NAOVTS", "PRAGMA_HEARTBEAT", "PRAGMA_LOGON", "RCP", "RCTE", "RSP", "SEND_URL", "SSPI_LOGON", "STATUS", "SUPDUP", "SUPDUPOUTPUT", "SUPPRESS_LOCAL_ECHO", "TLS", "TN3270E", "TTYLOC", "VT3270REGIME", "X3PAD", "XAUTH" ], "requested-options": [] }, "session_data": { "banner_after_return": "06.06 Sep 13 2020 23:03:50\r\nMudlib version:\t\tCD.00.30-h4xed by CMD\r\n\r\nPlease enter your name: ", "banner_before_return": "IP name: mud.sanitysedge.com 2020 (4040 TLS)\r\n\r\n\t Y O U H A V E R E A C H E D T H E E D G E \r\n\r\n \r\n |\\\\\\\\\\\\\\\\\\ |\\\\\\\\\\\\ |\\\\ |\\\\|\\\\\\\\\\\\ |\\\\\\\\\\\\ |\\\\ |\\\\ |\\\\ \\\\\\\\\\\\\\\\\\\r\n \\\\ | \\\\ \\\\ \\\\\\\\ \\\\ |\\\\ |\\\\ \\\\ \\\\ || \\\\\r\n \\\\\\\\\\\\\\\\\\\\\\ |\\\\\\\\\\\\ \\\\ \\\\ \\\\ \\\\ \\\\ \\\\\\\\\\\\ \\\\\\\\\\\\\\\\\\\r\n | |\\\\ \\\\ \\\\ \\\\ \\\\\\\\ \\\\ \\\\ | |\\\\ | |\\\\\r\n \\\\\\\\\\\\\\\\\\\\ \\\\ \\\\ \\\\ \\\\\\ \\\\\\\\\\\\\\ \\\\ \\\\ \\\\\\\\\\\\\\\\\\\r\n | | || || || | | | | || || | |\r\n\r\n //////////| //////| /////| /////////|\r\n //| //| //| //| //| |\r\n ///////| // // // /////| //////| \r\n //| // // // //| //| |\r\n ////////// /////// | /////// //////////|\r\n | | | | | | | |\r\n\r\n\t\t\tS A N I T Y ' S E D G E\r\n\r\n\r\nGamedriver version:\tCD.", "encoding": "ascii", "mssp": { "ANSI": "1", "CLASSES": "0", "CODEBASE": "CD", "CRAWL DELAY": "-1", "CREATED": "1995", "FAMILY": "LPMud", "GAMEPLAY": "Hack and Slash", "GAMESYSTEM": "None", "GENRE": "Science Fiction", "GMCP": "1", "HIRING BUILDERS": "0", "HIRING CODERS": "0", "HOSTNAME": "sanitysedge.com", "LANGUAGE": "English", "LEVELS": "0", "LOCATION": "United States of America", "MCCP": "0", "MCP": "0", "MINIMUM AGE": "18", "MSDP": "0", "MSP": "0", "MXP": "0", "NAME": "Sanity's Edge", "PAY FOR PERKS": "0", "PAY TO PLAY": "0", "PLAYERS": "5", "PORT": "2020", "PUEBLO": "0", "RACES": "1", "SKILLS": "34", "SUBGENRE": "Cyberpunk", "UPTIME": "1769014608", "UTF-8": "0", "XTERM 256 COLORS": "1", "XTERM TRUE COLORS": "0" }, "option_states": { "server_offered": { "CHARSET": true, "GMCP": true, "MSSP": true }, "server_requested": {} }, "timing": { "probe": 0.053464412689208984, "total": 0.554868221282959 } } }, "sessions": [ { "connected": "2026-02-08T06:42:31.576266+00:00", "host": "sanitysedge.com", "ip": "35.171.219.224", "port": 2020 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=sanitysedge.com port=2020 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC WILL GMCP DEBUG stream_writer.py:713 WILL GMCP unsolicited DEBUG stream_writer.py:1869 handle_will(GMCP) DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 remote_option[GMCP] = True DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = False DEBUG stream_writer.py:697 recv IAC WILL MSSP DEBUG stream_writer.py:713 WILL MSSP unsolicited DEBUG stream_writer.py:1869 handle_will(MSSP) DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 remote_option[MSSP] = True DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = False DEBUG stream_writer.py:697 recv IAC WILL CHARSET DEBUG stream_writer.py:715 WILL CHARSET (bi-directional capability exchange) DEBUG stream_writer.py:1869 handle_will(CHARSET) DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 remote_option[CHARSET] = True DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = False DEBUG stream_writer.py:1292 IAC GA: Go-Ahead (unhandled). DEBUG stream_writer.py:689 begin sub-negotiation SB MSSP DEBUG stream_writer.py:676 sub-negotiation cmd MSSP SE completion byte DEBUG stream_writer.py:2031 [SB + MSSP] unsolicited DEBUG stream_writer.py:1642 MSSP: {'XTERM TRUE COLORS': '0', 'MSDP': '0', 'CODEBASE': 'CD', 'UTF-8': '0', 'UPTIME': '1769014608', 'PAY FOR PERKS': '0', 'PUEBLO': '0', 'HIRING BUILDERS': '0', 'MCCP': '0', 'NAME': "Sanity's Edge", 'GAMESYSTEM': 'None', 'PORT': '2020', 'PLAYERS': '4', 'CLASSES': '0', 'GAMEPLAY': 'Hack and Slash', 'MSP': '0', 'MCP': '0', 'CREATED': '1995', 'PAY TO PLAY': '0', 'FAMILY': 'LPMud', 'SUBGENRE': 'Cyberpunk', 'SKILLS': '34', 'ANSI': '1', 'GENRE': 'Science Fiction', 'HIRING CODERS': '0', 'XTERM 256 COLORS': '1', 'LOCATION': 'United States of America', 'LEVELS': '0', 'LANGUAGE': 'English', 'GMCP': '1', 'MXP': '0', 'HOSTNAME': 'sanitysedge.com', 'CRAWL DELAY': '-1', 'RACES': '1', 'MINIMUM AGE': '18'} DEBUG stream_writer.py:689 begin sub-negotiation SB CHARSET DEBUG stream_writer.py:676 sub-negotiation cmd CHARSET SE completion byte DEBUG stream_writer.py:2031 [SB + CHARSET] unsolicited WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/client_base.py", line 399, in _process_chunk WARNING client_base.py:495 recv_inband = writer.feed_byte(_ONE_BYTE[b]) WARNING client_base.py:495 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 680, in feed_byte WARNING client_base.py:495 self.handle_subnegotiation(self._sb_buffer) WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 2057, in handle_subnegotiation WARNING client_base.py:495 fn_call(buf) WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 2126, in _handle_sb_charset WARNING client_base.py:495 raise ValueError(f"Illegal option follows IAC SB CHARSET: {opt!r}.") WARNING client_base.py:495 ValueError: Illegal option follows IAC SB CHARSET: b';'. DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:1292 IAC GA: Go-Ahead (unhandled). DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True DEBUG stream_writer.py:938 send IAC DO ECHO DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP DEBUG stream_writer.py:697 recv IAC WONT BINARY DEBUG stream_writer.py:1991 handle_wont(BINARY) DEBUG stream_writer.py:3036 remote_option[BINARY] = False DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = False DEBUG stream_writer.py:697 recv IAC WILL SGA DEBUG stream_writer.py:1869 handle_will(SGA) DEBUG stream_writer.py:912 skip DO SGA; pending_option = True DEBUG stream_writer.py:3036 remote_option[SGA] = True DEBUG stream_writer.py:3036 pending_option[DO + SGA] = False DEBUG stream_writer.py:697 recv IAC WILL ECHO DEBUG stream_writer.py:1869 handle_will(ECHO) DEBUG stream_writer.py:912 skip DO ECHO; pending_option = True DEBUG stream_writer.py:3036 remote_option[ECHO] = True DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = False DEBUG stream_writer.py:697 recv IAC WONT STATUS DEBUG stream_writer.py:1991 handle_wont(STATUS) DEBUG stream_writer.py:3036 remote_option[STATUS] = False DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = False DEBUG stream_writer.py:697 recv IAC WONT EOR DEBUG stream_writer.py:1991 handle_wont(EOR) DEBUG stream_writer.py:3036 remote_option[EOR] = False DEBUG stream_writer.py:3036 pending_option[DO + EOR] = False DEBUG stream_writer.py:697 recv IAC WONT COM_PORT_OPTION DEBUG stream_writer.py:1991 handle_wont(COM_PORT_OPTION) DEBUG stream_writer.py:3036 remote_option[COM_PORT_OPTION] = False DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = False DEBUG stream_writer.py:697 recv IAC WONT MSDP DEBUG stream_writer.py:1991 handle_wont(MSDP) DEBUG stream_writer.py:3036 remote_option[MSDP] = False DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = False DEBUG stream_writer.py:697 recv IAC WONT MSP DEBUG stream_writer.py:1991 handle_wont(MSP) DEBUG stream_writer.py:3036 remote_option[MSP] = False DEBUG stream_writer.py:3036 pending_option[DO + MSP] = False DEBUG stream_writer.py:697 recv IAC WONT MXP DEBUG stream_writer.py:1991 handle_wont(MXP) DEBUG stream_writer.py:3036 remote_option[MXP] = False DEBUG stream_writer.py:3036 pending_option[DO + MXP] = False DEBUG stream_writer.py:697 recv IAC WONT ZMP DEBUG stream_writer.py:1991 handle_wont(ZMP) DEBUG stream_writer.py:3036 remote_option[ZMP] = False DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = False DEBUG stream_writer.py:697 recv IAC WONT AARDWOLF DEBUG stream_writer.py:1991 handle_wont(AARDWOLF) DEBUG stream_writer.py:3036 remote_option[AARDWOLF] = False DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = False DEBUG stream_writer.py:697 recv IAC WONT ATCP DEBUG stream_writer.py:1991 handle_wont(ATCP) DEBUG stream_writer.py:3036 remote_option[ATCP] = False DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = False INFO fingerprinting.py:746 connection for server fingerprint 8fc1730a768daf6a INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug sanitysedge.com 2020 .. [#scan] measured 2026-02-08 at 06:42 UTC