aow.lol
Connection Banner:
Server URLs
- Telnet: telnet://aow.lol:6000
- Play in Browser: LociTerm
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: Negotiated
MSDP: No
MCCP: No
MCCP2: No
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is unique to this server.
Options offered by server: GMCP
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "0fd4d37adba59b53",
"fingerprint-data": {
"offered-options": [
"GMCP"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\n\r\n\r\n\r\n\r\n\r\u001b[0;33m a#@, @\n\r\n\r\u001b[0;33m ____g _F __, _ @ \n\r\n\r\u001b[0;33m _#\" _#[ _, @ _#\"g# g@ # \n\r\n\r\u001b[0;33m @ _F@L @ g# _* @^ g@@ g^ _ \n\r\n\r\u001b[0;33m # _F @ p#p gg@gp _##@, gg@Lgg # q@ g^#F g\" _g@# _#F_@W \n\r\n\r\u001b[0;33m _F q@ # #F g^ #@ q@ `* #@ q\" @L _F # q# = @g\" \n\r\n\r\u001b[0;33m _F__]@ # @ g@ #@ #F #@ _F @L _* # @L @^ \n\r\n\r\u001b[0;33m #\"\"\"#F q@ ]@ @F @P @^ ]@_F @Lg\" qF _@ l@ \n\r\n\r\u001b[0;33m # @| (@ _z #[_g\" @@ qF q@ d@F @k\" #k _#@ p @L \n\r\n\r\u001b[0;33m _# #ma @@#* ##* `@m#\" #F \" @ #@#^##* # \n\r\n\r\u001b[0;33m a_gF @ \n\r\n\r\u001b[0;33m * qF \n\r\n\r\u001b[0m \u001b[0;33m gmg@\" \u001b[1;36m Chapter 3.9.1 (\u001b[0;36m3\u001b[0m.\u001b[0;36mL\u001b[0m.\u001b[0;36mG\u001b[1;36m)\n\r\n\r\n\r\n\r\u001b[0;37m Original DikuMUD by Hans Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert,\u001b[0m\n\r\n\r\u001b[0;37m and Sebastian Hammer. \u001b[0m\n\r\n\r\u001b[0;37m Based on MERC 2.1 code by Hatchet, Furey, and Kahn\u001b[0m\n\r\n\r\u001b[0;37m ROM 2.4 copyright (c) 1993-1996 Russ Taylor\u001b[0m\n\r\n\r \u001b[0;35m Warning: AoW contains adult language and violence.\n\r\n\r \u001b[0;35m Based on heavily modified ROM 2.4 code\n\r\n\r See \u001b[1;36mCREDITS\n\r\n\r\n\r\n\r\u001b[0mWhat name will you take amongst the ranks of Act of War?\u001b[0m ",
"banner_before_return": "\n\rGreetings modem.xyz do you want full ANSI color text? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {
"GMCP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5074942111968994,
"total": 11.216993570327759
}
}
},
"sessions": [
{
"connected": "2026-04-06T19:30:03.146148+00:00",
"host": "aow.lol",
"ip": "167.172.252.196",
"port": 6000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug aow.lol 6000
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=aow.lol port=6000
INFO client_base.py:186 Connected to <Peer 167.172.252.196 6000>
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:773 recv IAC WILL GMCP
DEBUG stream_writer.py:2045 handle_will(GMCP)
DEBUG stream_writer.py:998 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[GMCP] = True
DEBUG stream_writer.py:1072 send IAC SB GMCP Core.Hello IAC SE
DEBUG stream_writer.py:1072 send IAC SB GMCP Core.Supports.Set IAC SE
INFO client.py:201 GMCP handshake: Core.Hello + Core.Supports.Set ['Char 1', 'Char.Vitals 1', 'Char.Items 1', 'Room 1', 'Room.Info
1', 'Comm 1', 'Comm.Channel 1', 'Group 1']
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = False
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL ZMP, WILL AARDWOLF, WILL MCCP2_COMPRESS, WILL MXP, WILL MSP, WILL MSSP, WILL ATCP,
WILL GMCP, WILL MCCP3_COMPRESS, WILL MSDP, DO ZMP, DO AARDWOLF, DO MCCP2_COMPRESS, DO MXP, DO MSP, DO MSSP, DO ATCP, DO
MCCP3_COMPRESS, DO MSDP'
DEBUG stream_writer.py:3384 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1024 send IAC DO BINARY
DEBUG stream_writer.py:3384 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1024 send IAC DO SGA
DEBUG stream_writer.py:3384 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1024 send IAC DO ECHO
DEBUG stream_writer.py:3384 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1024 send IAC DO STATUS
DEBUG stream_writer.py:3384 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1024 send IAC DO CHARSET
DEBUG stream_writer.py:3384 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1024 send IAC DO EOR
DEBUG stream_writer.py:3384 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1024 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:998 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:998 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:998 skip DO MSP; pending_option = True
DEBUG stream_writer.py:998 skip DO MXP; pending_option = True
DEBUG stream_writer.py:998 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:998 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:998 skip DO ATCP; pending_option = True
DEBUG fingerprinting.py:849 connection for server fingerprint 0fd4d37adba59b53
INFO client_base.py:118 Connection closed to <Peer 167.172.252.196 6000>