216.136.9.8

216.136.9.8:4919

Telnet Fingerprint

8230b57f2279de84…

This fingerprint is shared by 102 other servers.

Data source: 8230b57f2279de84/a84dcc4a6925051e.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8230b57f2279de84",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "SGA",
        "STATUS"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "This world is Pueblo 1.0 enhanced\r\n\r\nWelcome to TinyMUSH\r\n------------------------------------------------------------------------------\r\n  \"connect <name> <password>\" connects you to an existing character.\r\n  \"create <name> <password>\" creates a new character.\r\n  \"WHO\" tells you who is logged in to the game (case sensitive).\r\n  \"QUIT\" exits the game and saves your character.\r\n  \"news\" informs you about recent program changes and items of interest.\r\n  \"help\" gives help on the commands, \"help commands\" for a list.\r\n------------------------------------------------------------------------------\r\n",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5036642551422119,
        "total": 6.009169101715088
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T16:21:12.295058+00:00",
      "host": "216.136.9.8",
      "ip": "216.136.9.8",
      "port": 4919
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:773 Fingerprint client: host=216.136.9.8 port=4919
INFO client_base.py:174 Connected to <Peer 216.136.9.8 4919>
DEBUG client.py:773 Fingerprint client: host=216.136.9.8 port=2220
DEBUG client_base.py:460 negotiation complete after 2.01s.
ERROR client.py:852 216.136.9.8:2220: [Errno 111] Connect call failed ('216.136.9.8', 2220)
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:896 send IAC DO BINARY
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = True
DEBUG stream_writer.py:896 send IAC DO SGA
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:896 send IAC DO ECHO
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:896 send IAC DO STATUS
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:896 send IAC DO CHARSET
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = True
DEBUG stream_writer.py:896 send IAC DO EOR
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:896 send IAC DO COM_PORT_OPTION
INFO fingerprinting.py:736 connection for server fingerprint 8230b57f2279de84
INFO client_base.py:105 Connection closed to <Peer 216.136.9.8 4919>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 216.136.9.8 4919