15.157.195.64

15.157.195.64:4000

Telnet Fingerprint

c2dd7d4e76383b41…

This fingerprint is shared by 56 other servers.

Data source: c2dd7d4e76383b41/6f92281de0911178.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\n\r.                                          \"\"--..__        code based\n\r                     _                     []       ``-.._   on SMAUG\n\r                  .'` `'.                  ||__           `-._ \n\r                 /    ,-.\\                 ||_ ```---..__     `-.\n\r                /    /:::\\\\               /|//}          ``--._  `.\n\r                |    |:::||              |////}                `-. \\\n\r                |    |:::||             //'///                    `.\\\n\r                |    |:::||            //  ||'                      `|\n\r                /    |:::|/        _,-//\\  ||    CONQUEST 2024\n\r               /`    |:::|`-,__,-'`  |/  \\ ||\n\r             /`  |   |'' ||           \\   |||     A questing &\n\r           /`    \\   |   ||            |  /||    PvP(light) MUD\n\r         |`       |  |   |)            \\ | ||\n\r        |          \\ |   /      ,.__    \\| ||\n\r        /           `         /`    `\\   | ||\n\r       |                     /        \\  / ||    Conquest Code:\n\r       |                     |        | /  ||   Voodoo & Perthwin\n\r       |                     |        |/   ||\n\r       /         /           |        `(   ||     Code Mod's &\n\r      /          .           /          )  ||  WorldBuilding: Tkaudi         \n\r                                                 \n\r\t\t\t\t\t\t    \t\n\r\n\r\n\rEnter your name or type NEW:\n\r",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 2.5756983757019043
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T17:11:20.220421+00:00",
      "host": "15.157.195.64",
      "ip": "15.157.195.64",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:773 Fingerprint client: host=15.157.195.64 port=4000
INFO client_base.py:174 Connected to <Peer 15.157.195.64 4000>
DEBUG client_base.py:460 negotiation complete after 2.01s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 15.157.195.64 4000>
INFO fingerprinting.py:736 connection for server fingerprint c2dd7d4e76383b41

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 15.157.195.64 4000