ateraan.com
Connection Banner:
Server URLs
- Telnet: telnet://ateraan.com:4002
- Play in Browser: LociTerm
- Website: mail.com
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 24 other servers.
Options requested from client: NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c405afe101fc3e8c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nReturn when you are able.\r\n",
"banner_before_return": "\u001b[32m \r\n N E W W O R L D S A T E R A A N \r\n fantasy adventure \r\n\r\n\u001b[40m |>>>+ |~|_|~|_|~| |>>>+\r\n | _|---------|_ . |\r\n |~|_|~|_|~|_|~| [_|_________|_] |>>>>>+ |~|_|~|_|~|_|~|\r\n |_____________| |=========| + | |_____________|\r\n | [].~[] .| | ~ [+]. | + | |.~[]. [].|\r\n |_________| |>> | . ~ | {~} u-u|u-u-u |_________|\r\n { / | | ~ [+] . | |u| |. .O . | {.. /\r\n ||.|~|_|~|_|~| |. ~ . | |~| | . O. .| |~|_|.|_|~|_|~|\r\n ||.-u-^^-u-u-u^^~-~-~-~-~-~-~-~~---~~-~-~-~^^-~-~-~-~^^-u-u-u-u-u-u-u-u\r\n || . -- ~ . -- . ^ . ~ . . ^ . -- . . -- . . ||| o |\r\n || . /**} . /**} |V| ~ .[o] . ~ |V| . /**} . ./**} .|| }_|\r\n || |[]| |[]| |.|-v-v-v-v-v-v-|.| |[]| |[]| . || o o}\r\n ||. -- . ~ -- |o| .~_______~ .|o| .-- . -- ~ . || ~ .|\r\n || . ~ ~ . |o| .|}:|:/|. |o| . ~ ~ . ~ . ~ || .~ |\r\n ||. . ~ .~ . |.|. ~|::|::|~ .|.| . ..~ ~ . ~ . .||.__~|\r\n ||_________________|_|___|/:|:}|___|_|________________________|| ||.|\r\n /------------------------_______------------------------------||_||_|\r\n /************************_________*************************************|\r\n\u001b[39m\r\n Warning!!! Logging in to this game expresses a commitment to follow all the rules.\r\n\u001b[0;37;40m\r\nIf you have problems you may contact the administration at: ateraan@mail.com\r\n\r\nEnter your character name:\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {},
"server_requested": {
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.653787851333618
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:09:23.481494+00:00",
"host": "ateraan.com",
"ip": "66.113.179.125",
"port": 4002
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug ateraan.com 4002
Show Logfile
DEBUG client.py:965 Fingerprint client: host=ateraan.com port=4002
INFO client_base.py:175 Connected to <Peer 66.113.179.125 4002>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 66.113.179.125 4002>
INFO fingerprinting.py:737 new server fingerprint c405afe101fc3e8c