50.16.123.54
(_____) (_) (_____)
_ / __ \ | | | __ \ _
;*; /| | | | __ _ _ __| | __ | |__) |_ _(_ _)_ __ (___) ;*;
= /| | | |/ _` | '__| |/ / | ___/ _` \ \ /\ / / '_ \/ __| =
.***. /| |__| | (_| | | | < | | | (_| |\ V V /| | | \__ \ .***.
~~~~~ /|_____/ \__,_|_| |_|\_\ ||| \__,_| \_/\_/ |_| |_|___/ ~~~~~
|||
|||
`.'
Based on CircleMUD 3.0 created by J. Elson and
DikuMUD Gamma 0.0 created by K. Nyboe, T. Madsen,
H. Staerfeldt, M. Seifert, and S. Hammer
By what name do you wish to be known?Telnet Fingerprint
This fingerprint is shared by 110 other servers.
Data source: 8d9ec9f191ea1be9/a7382c55020cefc3.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "8d9ec9f191ea1be9",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"CHARSET",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": []
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\n\r\n\r\n (_____) (_) (_____)\r\n _ / __ \\ | | | __ \\ _\r\n ;*; /| | | | __ _ _ __| | __ | |__) |_ _(_ _)_ __ (___) ;*;\r\n = /| | | |/ _` | '__| |/ / | ___/ _` \\ \\ /\\ / / '_ \\/ __| =\r\n .***. /| |__| | (_| | | | < | | | (_| |\\ V V /| | | \\__ \\ .***.\r\n ~~~~~ /|_____/ \\__,_|_| |_|\\_\\ ||| \\__,_| \\_/\\_/ |_| |_|___/ ~~~~~\r\n |||\r\n |||\r\n `.'\r\n\r\n Based on CircleMUD 3.0 created by J. Elson and\r\n DikuMUD Gamma 0.0 created by K. Nyboe, T. Madsen,\r\n H. Staerfeldt, M. Seifert, and S. Hammer\r\n\r\n\r\n\r\n\u001b[2K\n\rBy what name do you wish to be known? ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"0x56": false
},
"server_requested": {}
},
"timing": {
"probe": 0.5036334991455078,
"total": 1.106384038925171
}
}
},
"sessions": [
{
"connected": "2026-02-08T06:13:31.675144+00:00",
"host": "50.16.123.54",
"ip": "50.16.123.54",
"port": 6969
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:773 Fingerprint client: host=50.16.123.54 port=6969
INFO client_base.py:174 Connected to <Peer 50.16.123.54 6969>
DEBUG stream_writer.py:655 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:671 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1793 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:2883 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:896 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:1882 Unhandled: WILL MCCP2_COMPRESS.
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 50.16.123.54 6969>
INFO fingerprinting.py:736 connection for server fingerprint c2dd7d4e76383b41
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 50.16.123.54 6969