badtripmud.com
Connection Banner:
Server URLs
- Telnet: telnet://badtripmud.com:7778
Server Info
Server Location: 🇳🇱 The Netherlands (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 173 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\n\rWelcome to BadTrip! Ride the llama, mofos.\n\r\n\rBased on DikuMUD by Hans Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert,\n\rand Sebastian Hammer, on MERC 2.1 code by Hatchet, Fuery, and Kahn,\n\rand Rom 2.4 copyright (c) 1993-1996 Russ Taylor.\n\r\n\r\n\rBy what name do you wish to be known?\n\r",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.6470797061920166
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:02.674986+00:00",
"host": "badtripmud.com",
"ip": "81.4.123.168",
"port": 7778
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug badtripmud.com 7778
Show Logfile
DEBUG client.py:965 Fingerprint client: host=badtripmud.com port=7778
INFO client_base.py:175 Connected to <Peer 81.4.123.168 7778>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 81.4.123.168 7778>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41