77.33.29.130

Connection Banner:

gfgnHf>sf\\U:mOykԚ[^y\*RL x@$RF2hV7E\*H"b\*" f.1%]&a$\`d ob3ZHd v bJŲU cHVߪ3 .){غi"% Ei)\*tf\|ڍl^&;]+qv,WPuHH8{_ :1m2 \|UU,jGKn'P YK (۽~7#Röaˣ[pA'[ȠmPj6R_d5"+}q8"8炮%+9KE2isU0˸bGdBbބvFt;\\ZYTl:Է i\\:)H}S&-sugL>ۄCYd E:Ik>&~QQ#0p; Fv\`Zz7r5=^+Wf\\kF :TϞoI wYs%=}g>q%u^ԵYF3jlzy"snv;U23(k"%ɥRΉ.Dc--AO\|z#

Server URLs

Server Info

  • Server Location: 🇩🇰 Denmark (GeoIP)

Telnet Fingerprint

c2dd7d4e76383b41

This fingerprint is shared by 111 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u0003\u0000\udcf7#\udcb5\udcfc",
      "banner_before_return": "g\udcbefgn\udc8b\udcbaH\udcb2\u000f\udcbb\udcd3f>\udcee\udcdcs\udcee\udc99\udcd3f\udcf8\udcec\u0013\udc9f\\\udcf3\udcc9U\udc9d:m\udcafO\udc81yk\udceb\udcb0\udcd4\udc9a\udcb2\udcbd[\udcc9^y\u0017\udcc1\udcd5\u0007\udc98*R\u0001L\u0005\udcd1\udccd\b \udc82x@$RF2\udc80\udcdb\udccbh\u0001V\udc9b\udca6\udc807\udcb1\udca0\udc98E*\udca8H\"b*\udcc6\"\f\udccaf.\udcc11\u001a%]\u0004&\udcae\udcbfa\udce4\u0006$\udc99\udca8\udc98\udc90\udcdd`d\to\udca2b\udca93ZH\udc8ed\udcc1\udcf8\u001c\udcaa\udc89v\u001cbJ\udc84\udc91\udc8f\udc9e\udcc5\udcb2U\u001cc\udcaf\udc92\udc85\udc99HV\udcdf\udcaa\udcad\udc82\udcab\udca83\u001e\u0017.)\udcaa\udc94\u0012{\udc97\udcd8\udcba\u0002i\"%\udcf2\udcab\u000b\udc87\udcccEi)*\udcb1t\udc95f\udcf3\udcb5|\udcec\u000e\udcda\udc8d\u0016\udcbe\udcf3l\udca5^\udc94\udca9\udc9a\udcb2&\udcba\u0012;\udc85\udcfd\udc9b]+q\udccbv,\udccd\udcd7\udcd6W\udca0\udc8aPuHH\udcfd\udc9e\udced8\udcb6{\u000f_\udcc0\udcf0\u001c:\u00101\udcb8\udcf0m\udcea2\udcda\u0001\udcfd\udcaa\udcbc\u0012\u000b\udc90\udcf9\udc9e\u0001\udcb0\u0018\u001b|UU\udce2\udcf7,j\udcf7G\udcb6\udcc0\udcf8\udc8aK\u0019n'\udcc0\udc8c\udc98\udcfe\udceb\udc9bP\tY\udcf7\udcb6K\u001c(\udcdb\udcbd\udca1\udc90\u0006\udcad\u0010~\u00127\udc80\u001a#\udcd4\udcefR\udca7\udcc3\udcb6\udce0\udc94\udcb0\u0007\u0002\udce7a\udccb\udca3[p\udce9\udcf5A'\udc9d\udc80\udcba[\udcc8\udca0\udcdbm\udc8bP\u0007j6\udcedR_d\u0013\udcb7\u00035\udcda\"\u0001\udcb3\udc89+\udcc8\udcfa}q\u00028\"\udc818\udcbc\udce7\udc82\udcae\u0019%\udcc8+9\u0004\udcb7\udcbd\u000e\udc8dK\udcb2\udcb6E\u0005\udcb82\udcf4i\u0018s\udc9c\u0012\udccbU0\udccb\udcb8\udcd0\u0005bGd\u000fB\udca1\udcd7b\udcb0\udcd1\udcde\udc84\udcdc\udcc1\udcc1vFt;\udc92\udcc0\u0018\u0006\u0001\\\udc92\udcd0\udcf1\udcfc\u0018\udcf3Z\udc8fYTl\udcf8\udc8c\udcf8\udcc3\u0000:\udcd4\udcb7\u001f\t\udcb3\u001fi\\:\udce1)H\udc9e}\udcc9S&\udcae-\u000es\udcec\u0013\udc8b\udcf4\u0013\udc8f\udc8au\udcd8\udcc8g\udcb3\udcb9L>\udc9b\udcdf\udcdb\udc84C\udca8Yd \udcc8E:\udcb3\udcfb\udcc2\u0012I\u0015k>&~\udc97\udcf8\udcd4Q\udcfe\udcf3\udc97\udc92\udccfQ\b#\udc8b0p\udc89\udcb8\u000f;\u001e\udc84\udcde\u0010Fv`\udc89\udcbb\u0011Z\u0014z\udcae7r\u007f\u0000\udcac\udcad\udcf3\udcf95\udc9f=\udcf1\udcf1\udc93^+W\udc95\udc9af\\kF\udcf3\udca4\f\udcc5\udcf8\udc9f\udc82:\udcfeT\udcfc\udc85\udccf\udc9e\udcf9\udcf8\udcf9oI\udcf3\n\udc9fw\udcf9\udcbc\udcce\udce7\u001a\udc9f\udcdf\udcf2Y\udc83\udc8f\u001b\udcfc\udce5s\udca3\udcf0\udc8b\udccf\udcef\udce4%=}\udce2\udcd3g>\udca9\udcf0q%u^\udcd4\udcb5\udcf4\udc9f\u0014\udca9\udceaY\udcf1F3j\udce9l\udcea\udcaazy\"\udcf6s\udc85\udcc2\udcee\udcce\udcfe\udcdenv;U2\udc8a\udcf53(k\"%\udc9d\udcc9\udca5\udcf4R\udca9\udc9a\udcce\udc89\udca2\udcd3.\udc9f\udcd6\udcf9D\udce3c-\udcf5\udcaa-\udcfdA\udcdb\udce4\udc96O\u001a|z\udcf7\u001b\u0000\u0000\udcff",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 6.914451837539673
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-04-08T22:39:42.420841+00:00",
      "host": "77.33.29.130",
      "ip": "77.33.29.130",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 77.33.29.130 4000
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=77.33.29.130 port=4000
INFO client_base.py:186 Connected to <Peer 77.33.29.130 4000>
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP_COMPRESS
WARNING stream_writer.py:745 sub-negotiation SB MCCP_COMPRESS (51 bytes) interrupted by IAC b'\xc6'
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MCCP2_COMPRESS, WILL ATCP, WILL GMCP, WILL MSSP, WILL AARDWOLF, WILL MCCP3_COMPRESS,
    WILL MSDP, WILL MSP, WILL MXP, WILL ZMP, DO MCCP2_COMPRESS, DO ATCP, DO GMCP, DO MSSP, DO AARDWOLF, DO MCCP3_COMPRESS, DO
    MSDP, DO MSP, DO MXP, DO ZMP'
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:118 Connection closed to <Peer 77.33.29.130 4000>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41