selva.grogue.org ================ **Connection Banner:** .. image:: /_static/banners/banner_6b6ac396a521.png :alt: _​___ _ __ ___ _ _ / ___\| ___\| \|_ _​___ _ \\ \\ / (_)_ __\| \|_ _ _ __ _\| \| \\___ \\ / _ \\ \\ \\ / / _\` \| \\ \\ / /\| \| '__\| __\| \| \| \|/ _\` \| \| ___) \| __/ \|\\ V / (_\| \| \\ V / \| \| \| \| \|_\| \|_\| \| (_\| \| \| \|_​___/ \\___\|_\| \\_/ \\__,_\| \\_/ \|_\|_\| \\__\|\\__,_\|\\__,_\|_\| [ O primeiro e ainda existente Mundo Virtual Português... ] =​=============================================================== \| \| \| Formas de chegar 'a Selva Virtual: \| \| \| \| Web: https://selva.grogue.org/ \| \| \| \| Telnet: telnet selva.grogue.org 8888 \| \| telnet portugal-virtual.org 6969 \| \| \| \| SSL: telnet -z ssl selva.grogue.org 7777 \| \| telnet -z ssl portugal-virtual.org 6069 \| \| openssl s_client -host selva.grogue.org -port 7777 \| \| openssl s_client -host portugal-virtual.org -port 6069 \| \| gnutls-cli --insecure selva.grogue.org:7777 \| \| gnutls-cli --insecure portugal-virtual.org:6069 \| \| \| \| Telegram: http://t.me/SelvaVirtual_bot \| \| \| =​=============================================================== Give me a name: :class: ansi-banner :width: 529px :loading: lazy Server URLs ----------- .. raw:: html Server Info ----------- - **Server Location**: 🇵🇹 Portugal (GeoIP) Telnet Fingerprint ------------------ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 219 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "\u001b[0m\r\nGive me a name: \u001b[0m", "banner_before_return": " ____ _ __ ___ _ _ \r\n / ___| ___| |_ ____ _ \\ \\ / (_)_ __| |_ _ _ __ _| |\r\n \\___ \\ / _ \\ \\ \\ / / _` | \\ \\ / /| | '__| __| | | |/ _` | |\r\n ___) | __/ |\\ V / (_| | \\ V / | | | | |_| |_| | (_| | |\r\n |____/ \\___|_| \\_/ \\__,_| \\_/ |_|_| \\__|\\__,_|\\__,_|_|\r\n \r\n[ O primeiro e ainda existente Mundo Virtual Portugu\udcc3\udcaas... ]\r\n\r\n ================================================================\r\n| |\r\n| Formas de chegar 'a Selva Virtual: |\r\n| |\r\n| Web: https://selva.grogue.org/ |\r\n| |\r\n| Telnet: telnet selva.grogue.org 8888 |\r\n| telnet portugal-virtual.org 6969 |\r\n| |\r\n| SSL: telnet -z ssl selva.grogue.org 7777 |\r\n| telnet -z ssl portugal-virtual.org 6069 |\r\n| openssl s_client -host selva.grogue.org -port 7777 |\r\n| openssl s_client -host portugal-virtual.org -port 6069 |\r\n| gnutls-cli --insecure selva.grogue.org:7777 |\r\n| gnutls-cli --insecure portugal-virtual.org:6069 |\r\n| |\r\n| Telegram: http://t.me/SelvaVirtual_bot |\r\n| |\r\n ================================================================\r\n\r\n\u001b[0mGive me a name: \u001b[0m", "dsr_replies": 0, "dsr_requests": 0, "encoding": "ascii", "option_states": { "server_offered": { "ECHO": false }, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.506436824798584, "total": 5.104384422302246 } } }, "sessions": [ { "connected": "2026-02-14T17:11:10.800907+00:00", "host": "selva.grogue.org", "ip": "85.139.57.109", "port": 8888 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug selva.grogue.org 8888 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:965 Fingerprint client: host=selva.grogue.org port=8888 INFO client_base.py:175 Connected to DEBUG client_base.py:492 negotiation complete after 0.01s. DEBUG stream_writer.py:707 recv IAC WONT ECHO DEBUG stream_writer.py:2025 handle_wont(ECHO) DEBUG stream_writer.py:3174 remote_option[ECHO] = False DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True DEBUG stream_writer.py:950 send IAC DO BINARY DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True DEBUG stream_writer.py:950 send IAC DO SGA DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True DEBUG stream_writer.py:950 send IAC DO STATUS DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:950 send IAC DO CHARSET DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True DEBUG stream_writer.py:950 send IAC DO EOR DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True DEBUG stream_writer.py:950 send IAC DO GMCP DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True DEBUG stream_writer.py:950 send IAC DO MSDP DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True DEBUG stream_writer.py:950 send IAC DO MSSP DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True DEBUG stream_writer.py:950 send IAC DO MSP DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True DEBUG stream_writer.py:950 send IAC DO MXP DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True DEBUG stream_writer.py:950 send IAC DO ZMP DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:950 send IAC DO AARDWOLF DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True DEBUG stream_writer.py:950 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:106 Connection closed to .. raw:: html