admud.com
Does your client support ANSI color? /] / ] / ] / [ ] / /[ ] [ / [ ] _]_]_] _]_]_] _]_]_] _]_]_] _]_]_} [ ]_[ ] _] _] _] _] _] _] _] _] _] [ _ ] _]_]_] _]_]_] _]_]_] _] _] _] [ ] [ ] _] _] _] _] _] _] _] _] _] [ ] [_] _] _] _] _] _] _] _] _] _] \ ] \] D - E - S - T - I - N - Y Beta 1.0.0 - Andrew Baker/Alvin Johnson/Edward Bauler/Tyler Phegley Based on DikuMud by: Hans Henrik Staerfeldt, Katja Nyboe, Tom Madsen, Micheal Seifert and Sebastian Hammer. Also see 'help diku' and 'help envy' By what name will you seek your destiny?
Telnet Fingerprint
This fingerprint is shared by 102 other servers.
Data source: 8230b57f2279de84/52a433a9f9c4b5a1.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "8230b57f2279de84",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"SGA",
"STATUS"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\n\r\u001b[01;34m\n\r /]\n\r / ]\n\r / ]\n\r / [ ]\n\r / /[ ]\n\r[ / [ ] _]_]_] _]_]_] _]_]_] _]_]_] _]_]_}\n\r[ ]_[ ] _] _] _] _] _] _] _] _] _]\n\r[ _ ] _]_]_] _]_]_] _]_]_] _] _] _]\n\r[ ] [ ] _] _] _] _] _] _] _] _] _]\n\r[ ] [_] _] _] _] _] _] _] _] _] _]\n\r\\ ]\n\r \\]\u001b[01;37m D \u001b[01;30m-\u001b[01;37m E \u001b[01;30m-\u001b[01;37m S \u001b[01;30m-\u001b[01;37m T \u001b[01;30m-\u001b[01;37m I \u001b[01;30m-\u001b[01;37m N \u001b[01;30m-\u001b[01;37m Y\u001b[00;37m\n\r\n\r\u001b[00;36mBeta 1.0.0 - Andrew Baker/Alvin Johnson/Edward Bauler/Tyler Phegley\n\rBased on DikuMud by: Hans Henrik Staerfeldt, Katja Nyboe, Tom Madsen,\n\rMicheal Seifert and Sebastian Hammer. Also see 'help diku' and 'help envy'\n\r\n\r\u001b[01;36mBy what name will you seek your destiny? \u001b[00;37m",
"banner_before_return": "Does your client support ANSI color? \n\r",
"encoding": "ascii",
"option_states": {
"server_offered": {
"0x66": false
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5037133693695068,
"total": 3.3380677700042725
}
}
},
"sessions": [
{
"connected": "2026-02-08T16:13:53.706636+00:00",
"host": "admud.com",
"ip": "172.104.12.33",
"port": 1999
},
{
"connected": "2026-02-08T17:16:56.438237+00:00",
"host": "admud.com",
"ip": "172.104.12.33",
"port": 1999
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=admud.com port=1999
INFO client_base.py:174 Connected to <Peer 172.104.12.33 1999>
DEBUG stream_writer.py:692 recv IAC WILL AARDWOLF
DEBUG stream_writer.py:708 WILL AARDWOLF unsolicited
DEBUG stream_writer.py:1863 handle_will(AARDWOLF)
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 remote_option[AARDWOLF] = True
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = False
DEBUG client_base.py:460 negotiation complete after 2.01s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
INFO fingerprinting.py:737 new server fingerprint a3d6aaf3bf9a2101
INFO client_base.py:105 Connection closed to <Peer 172.104.12.33 1999>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug admud.com 1999