狨諦俴

Connection Banner:

Welcome to chinese MUD XiaKeXing. Are you using BIG5 code?(Yes\|No) > Ok, use BIG5 code。 誰 縱 千 救 眼 三 將 閑 事 十 銀 趙 能 死 秋 趙 花 杯 炙 過 了 步 鞍 客 □ The 書 俠 二 揮 耳 吐 啖 信 拂 殺 照 縵 俠 閣 骨 壯 金 熱 然 朱 陵 衣 一 白 胡 Quest 下 香 士 槌 後 諾 亥 飲 去 人 馬 纓 客 Of 白 不 @ 邯 意 五 持 脫 深 千 颯 吳 首 慚 赫 鄲 氣 岳 觴 劍 藏 裡 沓 鉤 Oriental 太 世 大 先 素 倒 勸 膝 身 不 如 霜 行 玄 上 樑 震 霓 為 候 前 與 留 流 雪 □ Chivalry 經 英 城 驚 生 輕 贏 橫 名 行 星 明 Copyright XiaKeXing Gaming Group 1996-2010 俠客行網站:< www.xkx2.com > 官方QQ群:233296649 有任何意見,請 email 給 pettyfeng@gmail.com 兒女情長,仗劍江湖路,暮然回首,蕭風夜雨十四載。縱觀天下,圖形網 絡遊戲五花八門比比皆是,而仍不為所動,傾心狂醉俠客行中者,實乃獨 解其個中真味之輩。為讓俠客行遊戲更上一層樓,以更豐富的遊戲內容和 更高的遊戲質量來回報玩家之厚愛。從即日起,門路廣開,希望有志之士 能加入到我們俠客行巫師隊伍中來。詳情請參閱 (help wiz_apply) 也可通過捐款方式給俠客行予以支持,詳情請參閱 (help juankuan) - XkxOS v3.0 - 俠客行站點名稱 國際網路位址 埠號 運行時間 玩家人數 =​================ =​============== =​=== =​=================== =​=========== 錢塘俠客行(QT) 112.124.31.157 5555 八天九小時多 三百一十五位 =​================ =​============== =​=== =​=================== =​=========== 目前俠客行共有三百一十五位玩家在一個站點連線中。 英文ID識別( 新玩家請輸入 new 進入人物建立單元 ) 請輸入您的英文ID: ( 新玩家請輸入 new 進入人物建立單元 ) 請重新輸入您的ID:

Server URLs

Server Info

  • Players online: 315 [1]

  • Uptime: 8 days

  • Server Location: 🇨🇳 China (GeoIP)

  • Encoding: big5

    This server uses a legacy encoding:

    telnetlib3-client --encoding big5 --force-binary 112.124.31.157 5555

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation.

  • MSSP: Yes (MSSP)

  • GMCP: Negotiated

  • MSDP: No

  • MCCP: No

  • MCCP2: No

  • MXP: Negotiated

  • MSP: No

  • MCP: No

  • ZMP: Negotiated

Telnet Fingerprint

67bffa9d5cf57f36

This fingerprint is shared by 10 other servers.

Options offered by server: MSSP, ZMP

Options requested from client: GMCP, MXP, NAWS, NEW_ENVIRON, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "67bffa9d5cf57f36",
    "fingerprint-data": {
      "offered-options": [
        "MSSP",
        "ZMP"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MXP",
        "SGA",
        "STATUS"
      ],
      "requested-options": [
        "GMCP",
        "MXP",
        "NAWS",
        "NEW_ENVIRON",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Ok, use \u001b[1;32mBIG5\u001b[0;0m code\u3002\r\n\r\n\u001b[2J\u001b[33m\r\n    \u001b[41;1m\u8ab0  \u7e31  \u5343  \u6551  \u773c  \u4e09  \u5c07  \u9591  \u4e8b  \u5341  \u9280  \u8d99\u001b[37;0m\u001b[33m\r\n    \u001b[41;1m\u80fd  \u6b7b  \u79cb  \u8d99  \u82b1  \u676f  \u7099  \u904e  \u4e86  \u6b65  \u978d  \u5ba2\u001b[37;0m\u001b[1;37m\u001b[33m      \u25a1 The\r\n    \u001b[41;1m\u66f8  \u4fe0  \u4e8c  \u63ee  \u8033  \u5410  \u5556  \u4fe1  \u62c2  \u6bba  \u7167  \u7e35\u001b[37;0m    \u001b[1;37m  \u4fe0\u001b[37;0m\u001b[33m\r\n    \u001b[41;1m\u95a3  \u9aa8  \u58ef  \u91d1  \u71b1  \u7136  \u6731  \u9675  \u8863  \u4e00  \u767d  \u80e1\u001b[37;0m\u001b[1;37m\u001b[33m        Quest\r\n    \u001b[41;1m\u4e0b  \u9999  \u58eb  \u69cc  \u5f8c  \u8afe  \u4ea5  \u98f2  \u53bb  \u4eba  \u99ac  \u7e93\u001b[37;0m\u001b[33m\r\n    \u001b[41;1m                       \u001b[37;0m   \u001b[1;37m  \u5ba2\u001b[37;0m\u001b[1;37m\u001b[33m   Of\r\n    \u001b[41;1m\u767d  \u4e0d  \udc9f@  \u90af  \u610f  \u4e94  \u6301  \u812b  \u6df1  \u5343  \u98af  \u5433\u001b[37;0m\u001b[33m\r\n    \u001b[41;1m\u9996  \u615a  \u8d6b  \u9132  \u6c23  \u5cb3  \u89f4  \u528d  \u85cf  \u88e1  \u6c93  \u9264\u001b[37;0m\u001b[1;37m\u001b[33m        Oriental\r\n    \u001b[41;1m\u592a  \u4e16  \u5927  \u5148  \u7d20  \u5012  \u52f8  \u819d  \u8eab  \u4e0d  \u5982  \u971c\u001b[37;0m    \u001b[1;37m  \u884c\u001b[37;0m\u001b[33m\r\n    \u001b[41;1m\u7384  \u4e0a  \u6a11  \u9707  \u9713  \u70ba  \u5019  \u524d  \u8207  \u7559  \u6d41  \u96ea\u001b[37;0m\u001b[1;37m\u001b[33m      \u25a1 Chivalry\r\n    \u001b[41;1m\u7d93  \u82f1  \u57ce  \u9a5a  \u751f  \u8f15  \u8d0f  \u6a6b  \u540d  \u884c  \u661f  \u660e\u001b[37;0m\u001b[33m\r\n\r\n          \u001b[33m Copyright XiaKeXing Gaming Group 1996-2010 \u001b[37;0m\r\n\r\n            \u001b[33m\u4fe0\u5ba2\u884c\u7db2\u7ad9\uff1a< \u001b[1;32m www.xkx2.com  \u001b[37;0m\u001b[33m >\u001b[37;0m  \u001b[33m\u5b98\u65b9QQ\u7fa4\uff1a\u001b[1;37m233296649\r\n                \u001b[33m\u6709\u4efb\u4f55\u610f\u898b\uff0c\u8acb email \u7d66 pettyfeng@gmail.com\u001b[37;0m\r\n\r\n\u001b[1;37m        \u5152\u5973\u60c5\u9577\uff0c\u4ed7\u528d\u6c5f\u6e56\u8def\uff0c\u66ae\u7136\u56de\u9996\uff0c\u856d\u98a8\u591c\u96e8\u5341\u56db\u8f09\u3002\u7e31\u89c0\u5929\u4e0b\uff0c\u5716\u5f62\u7db2\r\n    \u7d61\u904a\u6232\u4e94\u82b1\u516b\u9580\u6bd4\u6bd4\u7686\u662f\uff0c\u800c\u4ecd\u4e0d\u70ba\u6240\u52d5\uff0c\u50be\u5fc3\u72c2\u9189\u4fe0\u5ba2\u884c\u4e2d\u8005\uff0c\u5be6\u4e43\u7368\r\n    \u89e3\u5176\u500b\u4e2d\u771f\u5473\u4e4b\u8f29\u3002\u70ba\u8b93\u4fe0\u5ba2\u884c\u904a\u6232\u66f4\u4e0a\u4e00\u5c64\u6a13\uff0c\u4ee5\u66f4\u8c50\u5bcc\u7684\u904a\u6232\u5167\u5bb9\u548c\r\n    \u66f4\u9ad8\u7684\u904a\u6232\u8cea\u91cf\u4f86\u56de\u5831\u73a9\u5bb6\u4e4b\u539a\u611b\u3002\u5f9e\u5373\u65e5\u8d77\uff0c\u9580\u8def\u5ee3\u958b\uff0c\u5e0c\u671b\u6709\u5fd7\u4e4b\u58eb\r\n    \u80fd\u52a0\u5165\u5230\u6211\u5011\u4fe0\u5ba2\u884c\u5deb\u5e2b\u968a\u4f0d\u4e2d\u4f86\u3002\u8a73\u60c5\u8acb\u53c3\u95b1  \u001b[1;32m(help wiz_apply)\u001b[33m\r\n    \u4e5f\u53ef\u901a\u904e\u6350\u6b3e\u65b9\u5f0f\u7d66\u4fe0\u5ba2\u884c\u4e88\u4ee5\u652f\u6301\uff0c\u8a73\u60c5\u8acb\u53c3\u95b1 \u001b[1;32m(help juankuan)\r\n                \u001b[33m\u001b[37;0m\u001b[1;36m\t     - XkxOS v3.0 -\r\n\u001b[0;0m \u4fe0\u5ba2\u884c\u7ad9\u9ede\u540d\u7a31\t     \u570b\u969b\u7db2\u8def\u4f4d\u5740     \u57e0\u865f\t  \u904b\u884c\u6642\u9593\t   \u73a9\u5bb6\u4eba\u6578\r\n=================   ===============   ====  ====================  ============\r\n\u001b[1;32m  \u9322\u5858\u4fe0\u5ba2\u884c(QT)   112.124.31.157    5555          \u516b\u5929\u4e5d\u5c0f\u6642\u591a  \u4e09\u767e\u4e00\u5341\u4e94\u4f4d\r\n\u001b[0;0m=================   ===============   ====  ====================  ============\r\n\u76ee\u524d\u4fe0\u5ba2\u884c\u5171\u6709\u4e09\u767e\u4e00\u5341\u4e94\u4f4d\u73a9\u5bb6\u5728\u4e00\u500b\u7ad9\u9ede\u9023\u7dda\u4e2d\u3002\r\n\r\n\u82f1\u6587ID\u8b58\u5225( \u65b0\u73a9\u5bb6\u8acb\u8f38\u5165 new \u9032\u5165\u4eba\u7269\u5efa\u7acb\u55ae\u5143 )\r\n\u8acb\u8f38\u5165\u60a8\u7684\u82f1\u6587ID\uff1a\r\n( \u65b0\u73a9\u5bb6\u8acb\u8f38\u5165 new \u9032\u5165\u4eba\u7269\u5efa\u7acb\u55ae\u5143 )\r\n\u8acb\u91cd\u65b0\u8f38\u5165\u60a8\u7684ID\uff1a",
      "banner_before_return": "\r\nWelcome to chinese MUD \u001b[1;37mXiaKeXing\u001b[0;0m.\r\n\r\nAre you using BIG5 code?(Yes|No)\r\n>",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "big5",
      "mssp": {
        "NAME": "\u72e8\u8ae6\u4ff4  ",
        "PLAYERS": "315",
        "UPTIME": "1770396051"
      },
      "option_states": {
        "environ_requested": [
          {
            "name": "*",
            "type": "VAR"
          },
          {
            "name": "*",
            "type": "USERVAR"
          }
        ],
        "server_offered": {
          "MSSP": true,
          "ZMP": true
        },
        "server_requested": {
          "GMCP": true,
          "MXP": true,
          "NAWS": true,
          "NEW_ENVIRON": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5026204586029053,
        "total": 7.578837871551514
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:12:42.413009+00:00",
      "host": "112.124.31.157",
      "ip": "112.124.31.157",
      "port": 5555
    },
    {
      "connected": "2026-02-15T02:10:34.229114+00:00",
      "host": "112.124.31.157",
      "ip": "112.124.31.157",
      "port": 5555
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 112.124.31.157 5555
Show Logfile
DEBUG client.py:998 Fingerprint client: host=112.124.31.157 port=5555
INFO client_base.py:175 Connected to <Peer 112.124.31.157 5555>
DEBUG client_base.py:494 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC WILL ZMP
DEBUG stream_writer.py:723 WILL ZMP unsolicited
DEBUG stream_writer.py:1900 handle_will(ZMP)
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 remote_option[ZMP] = True
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC DO NEW_ENVIRON
DEBUG stream_writer.py:1770 handle_do(NEW_ENVIRON)
DEBUG stream_writer.py:3174 pending_option[WILL + NEW_ENVIRON] = True
DEBUG stream_writer.py:950 send IAC WILL NEW_ENVIRON
DEBUG stream_writer.py:3174 pending_option[SB + NEW_ENVIRON] = True
DEBUG stream_writer.py:3174 local_option[NEW_ENVIRON] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NEW_ENVIRON] = False
DEBUG stream_writer.py:707 recv IAC DO GMCP
DEBUG stream_writer.py:1770 handle_do(GMCP)
DEBUG stream_writer.py:3174 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:950 send IAC WILL GMCP
DEBUG stream_writer.py:3174 local_option[GMCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + GMCP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': '狨諦俴  ', 'PLAYERS': '315', 'UPTIME': '1770396051'}
DEBUG stream_writer.py:699 begin sub-negotiation SB NEW_ENVIRON
DEBUG stream_writer.py:686 sub-negotiation cmd NEW_ENVIRON SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + NEW_ENVIRON] = False
DEBUG stream_writer.py:2289 recv NEW_ENVIRON SEND (all)
DEBUG stream_writer.py:2312 env send: LANG='C', TERM='xterm-256color', LINES=25, COLUMNS=80, COLORTERM=''
DEBUG stream_writer.py:1323 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:1323 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT BINARY
DEBUG stream_writer.py:2025 handle_wont(BINARY)
DEBUG stream_writer.py:3174 remote_option[BINARY] = False
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:707 recv IAC WONT SGA
DEBUG stream_writer.py:2025 handle_wont(SGA)
DEBUG stream_writer.py:3174 remote_option[SGA] = False
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC WONT GMCP
DEBUG stream_writer.py:2025 handle_wont(GMCP)
DEBUG stream_writer.py:3174 remote_option[GMCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:707 recv IAC WONT MSDP
DEBUG stream_writer.py:2025 handle_wont(MSDP)
DEBUG stream_writer.py:3174 remote_option[MSDP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WONT MSP
DEBUG stream_writer.py:2025 handle_wont(MSP)
DEBUG stream_writer.py:3174 remote_option[MSP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC WONT MXP
DEBUG stream_writer.py:2025 handle_wont(MXP)
DEBUG stream_writer.py:3174 remote_option[MXP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint 67bffa9d5cf57f36
INFO client_base.py:106 Connection closed to <Peer 112.124.31.157 5555>