weehours.net
============
.. raw:: html
* + ( )
( ()
* ( ()
* (() () )
+ () ()
* (() () )
* ( () ()
( () () )
( ()
+ EEEEEEEEEEE \ ( O )
EE EE \ +
E E \
+ E E \ +
EE here E |
EE E/
EE lies E \ +
+ E EE |
EE M U D E |
EE EE | .
. E # E | .
E ##### E | .
EE # EE |
. E # E | .
. EE # EE |
EE EE | .
EE E |
,,,,,,,,,,,,,,,,,,,,,,E,, , , ,,,,E,|,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
//////////////////////E/ ,///,///,/,///////E///////////////////////////////////
//////////////////////E,///////////////////E///////////////////////////////////
///////////////////////////////////////////////////////////////////////////////
+ + + WEEHOURS LPMUD + + LOGIN AS guest TO VISIT + + HTTP://WEEHOURS.NET + + +
What is your name:
You have entered an invalid name.
Please think of a one-word name. No special characters, no spaces, no dashes, no numerals, just
letters.
Enter that name here:
.. raw:: html
weehours.net:2000
⎘
Telnet Fingerprint
------------------
:ref:`8230b57f2279de84... `
*This fingerprint is shared by 102 other servers.*
**Data source**: `8230b57f2279de84/4bffb9cad26e0ad5.json `_
The complete JSON record collected during the scan,
including Telnet negotiation results and any
MSSP metadata.
.. code-block:: json
{
"server-probe": {
"fingerprint": "8230b57f2279de84",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"SGA",
"STATUS"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nYou have entered an invalid name.\r\nPlease think of a one-word name. No special characters, no spaces, no dashes, no numerals, just letters.\r\nEnter that name here: ",
"banner_before_return": " * + ( )\r\n ( () \r\n * ( () \r\n * (() () )\r\n + () () \r\n * (() () ) \r\n * ( () () \r\n ( () () )\r\n ( () \r\n + EEEEEEEEEEE \\ ( O )\r\n EE EE \\ +\r\n E E \\\r\n + E E \\ +\r\n EE here E |\r\n EE E/ \r\n EE lies E \\ +\r\n + E EE |\r\n EE M U D E |\r\n EE EE | .\r\n . E # E | .\r\n E ##### E | .\r\n EE # EE |\r\n . E # E | .\r\n . EE # EE |\r\n EE EE | .\r\n EE E | \r\n,,,,,,,,,,,,,,,,,,,,,,E,, , , ,,,,E,|,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\r\n//////////////////////E/ ,///,///,/,///////E///////////////////////////////////\r\n//////////////////////E,///////////////////E///////////////////////////////////\r\n///////////////////////////////////////////////////////////////////////////////\r\n+ + + WEEHOURS LPMUD + + LOGIN AS guest TO VISIT + + HTTP://WEEHOURS.NET + + +\r\n\r\nWhat is your name: ",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5046443939208984,
"total": 3.0656607151031494
}
}
},
"sessions": [
{
"connected": "2026-02-08T16:59:25.948992+00:00",
"host": "weehours.net",
"ip": "45.33.22.191",
"port": 2000
}
]
}
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
.. code-block:: text
DEBUG client.py:770 Fingerprint client: host=weehours.net port=2000
INFO client_base.py:174 Connected to
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3036 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:938 send IAC DO BINARY
DEBUG stream_writer.py:3036 pending_option[DO + SGA] = True
DEBUG stream_writer.py:938 send IAC DO SGA
DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:938 send IAC DO ECHO
DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:938 send IAC DO STATUS
DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:938 send IAC DO CHARSET
DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True
DEBUG stream_writer.py:938 send IAC DO EOR
DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:938 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:938 send IAC DO GMCP
DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:938 send IAC DO MSDP
DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:938 send IAC DO MSSP
DEBUG stream_writer.py:3036 pending_option[DO + MSP] = True
DEBUG stream_writer.py:938 send IAC DO MSP
DEBUG stream_writer.py:3036 pending_option[DO + MXP] = True
DEBUG stream_writer.py:938 send IAC DO MXP
DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:938 send IAC DO ZMP
DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:938 send IAC DO AARDWOLF
DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:938 send IAC DO ATCP
DEBUG stream_writer.py:697 recv IAC WONT b'\xfc'
DEBUG stream_writer.py:1991 handle_wont(WONT)
DEBUG stream_writer.py:3036 remote_option[WONT] = False
DEBUG stream_writer.py:3036 pending_option[DO + WONT] = False
DEBUG stream_writer.py:697 recv IAC WONT ECHO
DEBUG stream_writer.py:1991 handle_wont(ECHO)
DEBUG stream_writer.py:3036 remote_option[ECHO] = False
DEBUG stream_writer.py:3036 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:697 recv IAC WONT STATUS
DEBUG stream_writer.py:1991 handle_wont(STATUS)
DEBUG stream_writer.py:3036 remote_option[STATUS] = False
DEBUG stream_writer.py:3036 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:697 recv IAC WONT CHARSET
DEBUG stream_writer.py:1991 handle_wont(CHARSET)
DEBUG stream_writer.py:3036 remote_option[CHARSET] = False
DEBUG stream_writer.py:3036 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:697 recv IAC WONT EOR
DEBUG stream_writer.py:1991 handle_wont(EOR)
DEBUG stream_writer.py:3036 remote_option[EOR] = False
DEBUG stream_writer.py:3036 pending_option[DO + EOR] = False
DEBUG stream_writer.py:697 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:1991 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3036 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3036 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:697 recv IAC WONT GMCP
DEBUG stream_writer.py:1991 handle_wont(GMCP)
DEBUG stream_writer.py:3036 remote_option[GMCP] = False
DEBUG stream_writer.py:3036 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:697 recv IAC WONT MSDP
DEBUG stream_writer.py:1991 handle_wont(MSDP)
DEBUG stream_writer.py:3036 remote_option[MSDP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:697 recv IAC WONT MSSP
DEBUG stream_writer.py:1991 handle_wont(MSSP)
DEBUG stream_writer.py:3036 remote_option[MSSP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:697 recv IAC WONT MSP
DEBUG stream_writer.py:1991 handle_wont(MSP)
DEBUG stream_writer.py:3036 remote_option[MSP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MSP] = False
DEBUG stream_writer.py:697 recv IAC WONT MXP
DEBUG stream_writer.py:1991 handle_wont(MXP)
DEBUG stream_writer.py:3036 remote_option[MXP] = False
DEBUG stream_writer.py:3036 pending_option[DO + MXP] = False
DEBUG stream_writer.py:697 recv IAC WONT ZMP
DEBUG stream_writer.py:1991 handle_wont(ZMP)
DEBUG stream_writer.py:3036 remote_option[ZMP] = False
DEBUG stream_writer.py:3036 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:697 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:1991 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3036 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3036 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:697 recv IAC WONT ATCP
DEBUG stream_writer.py:1991 handle_wont(ATCP)
DEBUG stream_writer.py:3036 remote_option[ATCP] = False
DEBUG stream_writer.py:3036 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug weehours.net 2000