tzone.nxly.org ============== .. raw:: html .. raw:: html

tzone.nxly.org:5000

Telnet Fingerprint ------------------ :ref:`8230b57f2279de84... ` *This fingerprint is shared by 102 other servers.* **Data source**: `8230b57f2279de84/ee4572d7298084fc.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "8230b57f2279de84", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "SGA", "STATUS" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\u001b[0mEnter login name: ", "banner_before_return": "This world is Pueblo 1.10 enhanced.\n\r\n\r\u001b[0mYou are now entering... \u001b[0m\u001b[5mThe Twilight Zone\u001b[0m\n\r\u001b[0m\n\r Welcome to the: , =\n\r _________________ \n\r|\u001b[0m\u001b[31m&&&&&&&&&&&&&&&&&\u001b[0m| System Operator: tz@tzone.nxly.org *\n\r |\u001b[0m\u001b[31m&&&\u001b[0m| __ __ _ _ _ ____ _ _ _______\n\r |\u001b[0m\u001b[31m&&&\u001b[0m| \\ \\ /\\/ |@| |=| \" |*| /????\\ |$| |$| |///////|\n\r # |\u001b[0m\u001b[31m&&&\u001b[0m| \\ \\ _ . /\\/ |@| |=| |*| |?/____ |$|_|$| |/|\n\r |\u001b[0m\u001b[31m&&&\u001b[0m| \\ \\ / \\ /\\/ |@| |=| |*| |??????| |$$$$$| . |/| .\n\r |\u001b[0m\u001b[31m&&&\u001b[0m| \\ \\/ \\ \\/\\/ |@| |=|__ |*| |?|__|?| |$| |$| |/|\n\r |\u001b[0m\u001b[31m&&&\u001b[0m| \\_\\/ \\_\\/ \" |@| |====| |*| \\????/ |$| |$| |/|\n\r |\u001b[0m\u001b[31m&&&\u001b[0m| _________________ |/| )\n\r |\u001b[0m\u001b[36m#################\u001b[0m| _____ . __ _ _____ |/|\n\r \\/ /\u001b[0m\u001b[36m####\u001b[0m/ / _ \\ |::\\ |:| |%%%%%| |/|\n\r /\\ * /\u001b[0m\u001b[36m####\u001b[0m/ | / \\ | |:::\\ |:| |%|__ |/|\n\r . /\u001b[0m\u001b[36m####\u001b[0m/ | | | | |:|\\:\\ |:| |%%%%| # |/|\n\r /\u001b[0m\u001b[36m####\u001b[0m/ | \\_/ | |:| \\:\\|:| |%|___ |/| \\/\n\r . /\u001b[0m\u001b[36m####\u001b[0m/ \\_____/ |:| \\:::| |%%%%%| |/| /\\\n\r \" /\u001b[0m\u001b[36m####\u001b[0m/_____________________________________________\n\r |\u001b[0m\u001b[36m###################################################\u001b[0m\\\n\r |\u001b[0m\u001b[36m####################################################\u001b[0m\\\n\r : *\n\r \u001b[0m\u001b[5mT H E \u001b[0m\u001b[5m\u001b[1mF I N A L\u001b[0m\u001b[5m Z O N E R A T I O N\u001b[0m\n\r\n\r\t\t \u001b[0m\u001b[32m\u001b[1mWeb Site: https://tzone.nxly.org\u001b[0m\n\r\n\rType \"who\" to see who is logged on, \"quit\" to quit, or \"help\" if you need some.\n\rMake up a login and password and have fun!\u001b[0m\n\r\n\r\u001b[0m\r\u001b[0mEnter login name: ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5024960041046143, "total": 3.091386556625366 } } }, "sessions": [ { "connected": "2026-02-08T17:00:29.640566+00:00", "host": "tzone.nxly.org", "ip": "172.88.204.228", "port": 5000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=tzone.nxly.org port=5000 INFO client_base.py:174 Connected to DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:697 recv IAC WONT ECHO DEBUG stream_writer.py:1991 handle_wont(ECHO) DEBUG stream_writer.py:3036 remote_option[ECHO] = False DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = False DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True DEBUG stream_writer.py:938 send IAC DO BINARY DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True DEBUG stream_writer.py:938 send IAC DO SGA DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True DEBUG stream_writer.py:938 send IAC DO STATUS DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:938 send IAC DO CHARSET DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True DEBUG stream_writer.py:938 send IAC DO GMCP DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True DEBUG stream_writer.py:938 send IAC DO MSDP DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True DEBUG stream_writer.py:938 send IAC DO MSSP DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True DEBUG stream_writer.py:938 send IAC DO MSP DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True DEBUG stream_writer.py:938 send IAC DO MXP DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True DEBUG stream_writer.py:938 send IAC DO ZMP DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:938 send IAC DO AARDWOLF DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True DEBUG stream_writer.py:938 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug tzone.nxly.org 5000