cheesymud.com

Connection Banner:

This connection is not secure! Try our secure client: https://cheesymud.com/play/ CCCCCC hhhh dddd CC C h MMMMM MM dd CC C hh MM MMM MMM dd CC hhhhh eeee eeee ssss yy yy MM MMM MMMM uuu uu ddddd CC hhh hh ee ee ee ee sss yy yy MM MMM MMMM uu uu dd dd CC hh hh eeee eeee sss y y M MMMM MM uu uu dd dd CCC CC hh hh ee e ee e s ss yyy MM MMM MM uu uu dd ddd CCCC hh hhh eeee eeee ssss yy MMM M MMM uuuuuu ddd dd y yy We treat you right! y C L A S S I C yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy CheesyMUD v5 was written by Jim Baumgardner and Aaron Pesetski CheesyMUD is derived from CircleMUD 3.0bpl8 by Jeremy Elson, which is based on DIKU Gamma 0.0 by Katja Nyboe, Tom Madsen, Michael Seifert and Sebastian Hammer And who might you be? Invalid name, please try another. Name:

Server URLs

Server Info

  • Server Location: πŸ‡ΊπŸ‡Έ United States (GeoIP)

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 291 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Invalid name, please try another.\r\nName: ",
      "banner_before_return": "\r\n\u001b[0m\u001b[31m\u001b[5mThis connection is not secure!\u001b[0m\r\nTry our secure client: \u001b[0m\u001b[33mhttps://cheesymud.com/play/\u001b[0m\r\n\r\n\u001b[0m\u001b[33m     CCCCCC   hhhh                          \u001b[0m\u001b[0m\u001b[31m                              dddd\u001b[0m\r\n\u001b[0m\u001b[33m   CC    C   h                              \u001b[0m\u001b[0m\u001b[31m   MMMMM     MM              dd   \u001b[0m\r\n\u001b[0m\u001b[33m  CC     C  hh                              \u001b[0m\u001b[0m\u001b[31m MM  MMM   MMM              dd    \u001b[0m\r\n\u001b[0m\u001b[33m CC         hhhhh   eeee  eeee  ssss yy  yy \u001b[0m\u001b[0m\u001b[31m MM   MMM  MMMM  uuu  uu  ddddd   \u001b[0m\r\n\u001b[0m\u001b[33m CC        hhh hh  ee ee ee ee sss    yy yy \u001b[0m\u001b[0m\u001b[31m  MM  MMM MMMM    uu uu  dd dd    \u001b[0m\r\n\u001b[0m\u001b[33m CC        hh  hh eeee  eeee    sss    y y  \u001b[0m\u001b[0m\u001b[31m     M MMMM MM   uu  uu dd  dd    \u001b[0m\r\n\u001b[0m\u001b[33m CCC   CC  hh hh  ee  e ee  e s  ss    yyy  \u001b[0m\u001b[0m\u001b[31m    MM MMM MM    uu uu  dd ddd    \u001b[0m\r\n\u001b[0m\u001b[33m   CCCC   hh  hhh eeee  eeee  ssss     yy   \u001b[0m\u001b[0m\u001b[31m MMM    M  MMM   uuuuuu ddd dd    \u001b[0m\r\n\u001b[0m\u001b[33m                                       y\u001b[0m\r\n\u001b[0m\u001b[33m   yy\u001b[0m       We treat you right!       \u001b[0m\u001b[33my\u001b[0m              C   L   A   S   S   I   C\r\n\u001b[0m\u001b[33m    yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy\u001b[0m\r\n\r\n         \u001b[0m\u001b[33mCheesy\u001b[0m\u001b[0m\u001b[31mMUD\u001b[0m v5 was written by \u001b[0m\u001b[33mJim Baumgardner\u001b[0m and \u001b[0m\u001b[31mAaron Pesetski\u001b[0m\r\n\r\n\u001b[0m\u001b[33mCheesy\u001b[0m\u001b[0m\u001b[31mMUD\u001b[0m is derived from CircleMUD 3.0bpl8 by Jeremy Elson, which is based on\r\nDIKU Gamma 0.0 by Katja Nyboe, Tom Madsen, Michael Seifert and Sebastian Hammer\r\n\r\nAnd who might \u001b[0m\u001b[31myou\u001b[0m be? ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5061943531036377,
        "total": 11.241068363189697
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T03:59:42.401796+00:00",
      "host": "cheesymud.com",
      "ip": "205.196.221.18",
      "port": 4001
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug cheesymud.com 4001
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=cheesymud.com port=4001
INFO client_base.py:186 Connected to <Peer 205.196.221.18 4001>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
    WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
    DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:118 Connection closed to <Peer 205.196.221.18 4001>