admud.comο
Connection Banner:
Server URLsο
- Telnet: telnet://admud.com:1999
Server Infoο
Server Location: πΊπΈ United States (GeoIP)
Telnet Fingerprintο
This fingerprint is shared by 75 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\n\r\u001b[01;34m\n\r /]\n\r / ]\n\r / ]\n\r / [ ]\n\r / /[ ]\n\r[ / [ ] _]_]_] _]_]_] _]_]_] _]_]_] _]_]_}\n\r[ ]_[ ] _] _] _] _] _] _] _] _] _]\n\r[ _ ] _]_]_] _]_]_] _]_]_] _] _] _]\n\r[ ] [ ] _] _] _] _] _] _] _] _] _]\n\r[ ] [_] _] _] _] _] _] _] _] _] _]\n\r\\ ]\n\r \\]\u001b[01;37m D \u001b[01;30m-\u001b[01;37m E \u001b[01;30m-\u001b[01;37m S \u001b[01;30m-\u001b[01;37m T \u001b[01;30m-\u001b[01;37m I \u001b[01;30m-\u001b[01;37m N \u001b[01;30m-\u001b[01;37m Y\u001b[00;37m\n\r\n\r\u001b[00;36mBeta 1.0.0 - Andrew Baker/Alvin Johnson/Edward Bauler/Tyler Phegley\n\rBased on DikuMud by: Hans Henrik Staerfeldt, Katja Nyboe, Tom Madsen,\n\rMicheal Seifert and Sebastian Hammer. Also see 'help diku' and 'help envy'\n\r\n\r\u001b[01;36mBy what name will you seek your destiny? \u001b[00;37m",
"banner_before_return": "Does your client support ANSI color? \n\r",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {
"AARDWOLF": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 10.913970232009888
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:00:59.302339+00:00",
"host": "admud.com",
"ip": "172.104.12.33",
"port": 1999
}
]
}
Connection Logο
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug admud.com 1999
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=admud.com port=1999
INFO client_base.py:186 Connected to <Peer 172.104.12.33 1999>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:768 recv IAC WILL AARDWOLF
DEBUG stream_writer.py:1994 handle_will(AARDWOLF)
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:3330 remote_option[AARDWOLF] = True
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = False
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO MSP, DO MSDP, DO MSSP, DO ZMP, DO
MCCP2_COMPRESS'
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:118 Connection closed to <Peer 172.104.12.33 1999>
INFO fingerprinting.py:755 connection for server fingerprint c2dd7d4e76383b41