44.235.126.228

Connection Banner:

Welcome to DC610-MUD. Running GurbaLib v0.52 on DGD 1.6.20. Welcome to the DC610 MUD Opinions expressed in this game do not represent EvilMog, his employer, DEF CON, the Church of Wifi, DC610, or any other party. All characters are a work of fiction. Trigger Warning: PG13 ish, Code Of Conduct Applies Hashing is unsalted SHA1, special characters break passwords (don't ask) Bring Peeps Crispies, Peeps Cola, and A Cheese Fez Helmet to EvilMog for Cheat Codes. Alternatively a Junmai Ginjo Sake from Hiroshima, or a Junmai Daiginjo at 5 degrees Celcius with a ceramic sake cup will get you good cheat codes Tell Johnny Xmas the password is Sea Cucumber, he will give you something. Enter your name ('quit'): <!-- Elements to support the Automapper --><!ELEMENT RName FLAG="RoomName"><!ELEMENT RDesc FLAG='RoomDesc'><!ELEMENT RExits FLAG='RoomExit'><!-- The next element is used to define a room exit link that sends the exit direction to the MUD if the user clicks on it --><!ELEMENT Ex '<SEND>'><!ELEMENT Announce '<FONT COLOR=Cyan>' OPEN><!ELEMENT Gossip '<FONT COLOR=Green>' OPEN><!-- the next elements deal with the MUD prompt --><!ELEMENT Prompt FLAG="Prompt"><!ELEMENT Hp FLAG="Set hp"><!ELEMENT MaxHp FLAG="Set maxhp"><!ELEMENT Mana FLAG="Set mana"><!ELEMENT MaxMana FLAG="Set maxmana"><!ELEMENT End FLAG="Set end"><!ELEMENT MaxEnd FLAG="Set maxend"><!ELEMENT RoomX FLAG="Set room_x"><!ELEMENT RoomY FLAG="Set room_y"><!ELEMENT RoomZ FLAG="Set room_Z"><!EL Itm '<send "look &text;\|drop &text;\|wear &text;\|wield &text;\|drink &text;\|unwield &text;\|remove &text;">'><!EL Click '<send "&text;">'><!EL ClickP '<send "&text;" PROMPT>'> Please enter your name :

Server URLs

Server Info

  • Server Location: πŸ‡ΊπŸ‡Έ United States (GeoIP)

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation.

  • MSSP: No

  • GMCP: Negotiated

  • MSDP: No

  • MCCP: No

  • MCCP2: No

  • MXP: Negotiated

  • MSP: No

  • MCP: No

  • ZMP: No

Telnet Fingerprint

0532bfc07a52c110

This fingerprint is unique to this server.

Options offered by server: GMCP, MXP

Options requested from client: LINEMODE, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "0532bfc07a52c110",
    "fingerprint-data": {
      "offered-options": [
        "GMCP",
        "MXP"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "MSDP",
        "MSP",
        "MSSP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "LINEMODE",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\r\nPlease enter your name : ",
      "banner_before_return": "Welcome to DC610-MUD.\r\nRunning GurbaLib v0.52 on DGD 1.6.20.\r\n\u001b[7z\r\nWelcome to the DC610 MUD\r\n\r\nOpinions expressed in this game do not represent EvilMog, his\r\nemployer, DEF CON, the Church of Wifi, DC610, or any other\r\nparty.\r\n\r\nAll characters are a work of fiction. \r\n\r\nTrigger Warning: PG13 ish, Code Of Conduct Applies\r\n\r\nHashing is unsalted SHA1, special characters break passwords (don't ask)\r\n\r\nBring Peeps Crispies, Peeps Cola, and A Cheese Fez Helmet to EvilMog\r\nfor Cheat Codes. Alternatively a Junmai Ginjo Sake from Hiroshima, or\r\na Junmai Daiginjo at 5 degrees Celcius with a ceramic sake cup will\r\nget you good cheat codes\r\n\r\nTell Johnny Xmas the password is Sea Cucumber, he will give you something.\r\n\r\nEnter your name ('quit'): \u001b[6z<!-- Elements to support the Automapper --><!ELEMENT RName FLAG=\"RoomName\"><!ELEMENT RDesc FLAG='RoomDesc'><!ELEMENT RExits  FLAG='RoomExit'><!-- The next element is used to define a room exit link that sends the exit direction to the MUD if the user clicks on it --><!ELEMENT Ex '<SEND>'><!ELEMENT Announce '<FONT COLOR=Cyan>' OPEN><!ELEMENT Gossip '<FONT COLOR=Green>' OPEN><!-- the next elements deal with the MUD prompt --><!ELEMENT Prompt FLAG=\"Prompt\"><!ELEMENT Hp FLAG=\"Set hp\"><!ELEMENT MaxHp FLAG=\"Set maxhp\"><!ELEMENT Mana FLAG=\"Set mana\"><!ELEMENT MaxMana FLAG=\"Set maxmana\"><!ELEMENT End FLAG=\"Set end\"><!ELEMENT MaxEnd FLAG=\"Set maxend\"><!ELEMENT RoomX FLAG=\"Set room_x\"><!ELEMENT RoomY FLAG=\"Set room_y\"><!ELEMENT RoomZ FLAG=\"Set room_Z\"><!EL Itm '<send \"look &text;|drop &text;|wear &text;|wield &text;|drink &text;|unwield &text;|remove &text;\">'><!EL Click '<send \"&text;\">'><!EL ClickP '<send \"&text;\" PROMPT>'>\u001b[7z",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "mxp": [
        "activated"
      ],
      "option_states": {
        "server_offered": {
          "ECHO": false,
          "GMCP": true,
          "MXP": true
        },
        "server_requested": {
          "LINEMODE": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5164134502410889,
        "total": 5.168087482452393
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:10:18.041346+00:00",
      "host": "44.235.126.228",
      "ip": "44.235.126.228",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 44.235.126.228 4000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=44.235.126.228 port=4000
INFO client_base.py:175 Connected to <Peer 44.235.126.228 4000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WONT ECHO
DEBUG stream_writer.py:2025 handle_wont(ECHO)
DEBUG stream_writer.py:3174 remote_option[ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC DO LINEMODE
DEBUG stream_writer.py:1770 handle_do(LINEMODE)
DEBUG stream_writer.py:3174 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:950 send IAC WILL LINEMODE
DEBUG stream_writer.py:3174 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3174 local_option[LINEMODE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC WILL GMCP
DEBUG stream_writer.py:723 WILL GMCP unsolicited
DEBUG stream_writer.py:1900 handle_will(GMCP)
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 remote_option[GMCP] = True
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MXP
DEBUG stream_writer.py:723 WILL MXP unsolicited
DEBUG stream_writer.py:1900 handle_will(MXP)
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 remote_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:686 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + LINEMODE] = False
DEBUG stream_writer.py:2544 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE
DEBUG stream_writer.py:1277 set Linemode <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False, remote:False,
    local:True>
DEBUG stream_writer.py:1280 send IAC SB LINEMODE LINEMODE-MODE <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False,
    remote:False, local:True> IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:737 new server fingerprint 0532bfc07a52c110
INFO client_base.py:106 Connection closed to <Peer 44.235.126.228 4000>