winds.org ========= .. raw:: html .. raw:: html

winds.org:4000

Telnet Fingerprint ------------------ :ref:`c405afe101fc3e8c... ` *This fingerprint is shared by 4 other servers.* **Options requested from client**: ``NAWS``, ``TTYPE`` **Data source**: `c405afe101fc3e8c/fd95bf31edc65406.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata. .. code-block:: json { "server-probe": { "fingerprint": "c405afe101fc3e8c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [ "NAWS", "TTYPE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "\u001bc\u001b(U\u001b[1;5]\u001b[2J\u001b[H\r\n \u001b[0;1;34m.\r\n :`'-,. .\r\n\u001b[30m<<-----\u001b[34m| |\u001b[30m-----------------\u001b[34m:`'-.\u001b[30m------------------------------------------>>\r\n \u001b[34m_| | /'`^`'\\| | _. _., /'`^'`\\ _., __\r\n /'` |~-,. .,--| : | `,.--;/'` `' `| |/'`_ `\\/'` '`\\\r\n | | | | |___| ___.' . . | | | | | | |\r\n \u001b[0;36m| | | | |____ | : | | | | | | | : _____|\r\n | | | | | | | | __: | | | : | :___| | :\r\n \u001b[1m: : | : | : : `-' | : : | _ | | : : |\r\n `-,.__.,-'`-,._____:`-,.,-' `-,_.,-'|___|---| |--' `--:___| `-,._.,-`\r\n\u001b[30m<<---------------------------------------------\u001b[36m| |\u001b[30m------------------------->>\r\n \u001b[36m`. |\r\n `:\u001b[0m\r\n\r\nEnter your character's name, New, or Guest: ", "encoding": "ascii", "option_states": { "server_offered": { "EOR": true }, "server_requested": { "NAWS": true, "TTYPE": true } }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 3.292311191558838 } } }, "sessions": [ { "connected": "2026-02-08T16:27:51.155928+00:00", "host": "winds.org", "ip": "68.75.195.9", "port": 4000 }, { "connected": "2026-02-08T16:55:59.169215+00:00", "host": "winds.org", "ip": "68.75.195.9", "port": 4000 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:770 Fingerprint client: host=winds.org port=4000 INFO client_base.py:174 Connected to DEBUG stream_writer.py:697 recv IAC WILL EOR DEBUG stream_writer.py:713 WILL EOR unsolicited DEBUG stream_writer.py:1869 handle_will(EOR) DEBUG stream_writer.py:3036 pending_option[DO + EOR] = True DEBUG stream_writer.py:938 send IAC DO EOR DEBUG stream_writer.py:3036 remote_option[EOR] = True DEBUG stream_writer.py:3036 pending_option[DO + EOR] = False DEBUG stream_writer.py:697 recv IAC DO NAWS DEBUG stream_writer.py:1739 handle_do(NAWS) DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = True DEBUG stream_writer.py:938 send IAC WILL NAWS DEBUG stream_writer.py:2306 send IAC SB NAWS (rows=25, cols=80) IAC SE DEBUG stream_writer.py:3036 local_option[NAWS] = True DEBUG stream_writer.py:3036 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:697 recv IAC DO TTYPE DEBUG stream_writer.py:1739 handle_do(TTYPE) DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = True DEBUG stream_writer.py:938 send IAC WILL TTYPE DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = True DEBUG stream_writer.py:3036 local_option[TTYPE] = True DEBUG stream_writer.py:3036 pending_option[WILL + TTYPE] = False DEBUG stream_writer.py:689 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:676 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:3036 pending_option[SB + TTYPE] = False DEBUG stream_writer.py:2203 recv TTYPE SEND: b'' DEBUG stream_writer.py:2214 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG stream_writer.py:1311 IAC EOR: End of Record (unhandled). DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c405afe101fc3e8c *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug winds.org 4000