Darkwind

darkwind.org:3000

Server Info

  • Codebase: LDMud 3.3.495

  • Family: LPMud

  • Genre: Fantasy

  • Gameplay: Hack and Slash

  • Players online: 4 [1]

  • Created: 1992

  • Status: Live

  • Website: https://www.darkwind.org

  • Location: United States

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.

  • MSSP: Yes (MSSP)

  • GMCP: Yes (MSSP)

  • MSDP: No

  • MCCP: No

  • MCCP2: No

  • MXP: No

  • MSP: No

  • MCP: No

  • ZMP: No

Telnet Fingerprint

8230b57f2279de84…

This fingerprint is shared by 102 other servers.

Data source: 8230b57f2279de84/bb36646329969cf6.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8230b57f2279de84",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "SGA",
        "STATUS"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Invalid entry. Please try again.\r\nBy what name do you wish to be known? ",
      "banner_before_return": "\r\nWelcome to DarkWind! (3 of 100 connections, 120 maximum)\r\n\r\nBy what name do you wish to be known?\r\n",
      "encoding": "ascii",
      "mssp": {
        "ANSI": "1",
        "AREAS": "130",
        "CLASSES": "15",
        "CODEBASE": "LDMud 3.3.495",
        "CONTACT": "admins@darkwind.org",
        "CREATED": "1992",
        "FAMILY": "LPMud",
        "GAMEPLAY": "Hack and Slash",
        "GAMESYSTEM": "Custom",
        "GENRE": "Fantasy",
        "GMCP": "1",
        "HELPFILES": "1",
        "HIRING BUILDERS": "0",
        "HIRING CODERS": "0",
        "HOSTNAME": "darkwind.org",
        "ICON": "https://imgur.com/a/eSryqER",
        "INTERMUD": "0",
        "IP": "157.230.139.143",
        "LANGUAGE": "English",
        "LEVELS": "90",
        "LOCATION": "United States",
        "MCCP": "0",
        "MCP": "0",
        "MINIMUM AGE": "13",
        "MOBILES": "0",
        "MSDP": "0",
        "MSP": "0",
        "MXP": "0",
        "NAME": "Darkwind",
        "OBJECTS": "1000",
        "PAY FOR PERKS": "0",
        "PAY TO PLAY": "0",
        "PLAYERS": "4",
        "PORT": "3000",
        "PUEBLO": "0",
        "RACES": "22",
        "ROOMS": "20000",
        "SKILLS": "200",
        "SSL": "0",
        "STATUS": "Live",
        "SUBGENRE": "Medieval Fantasy",
        "UPTIME": "1770472246",
        "UTF-8": "0",
        "VT100": "1",
        "WEBSITE": "https://www.darkwind.org",
        "XTERM 256 COLORS": "0"
      },
      "option_states": {
        "server_offered": {
          "GMCP": true,
          "MSSP": true
        },
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5033185482025146,
        "total": 3.0842368602752686
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T16:56:09.670582+00:00",
      "host": "darkwind.org",
      "ip": "157.230.139.143",
      "port": 3000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=darkwind.org port=3000
INFO client_base.py:174 Connected to <Peer 157.230.139.143 3000>
DEBUG stream_writer.py:692 recv IAC WILL GMCP
DEBUG stream_writer.py:708 WILL GMCP unsolicited
DEBUG stream_writer.py:1863 handle_will(GMCP)
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 remote_option[GMCP] = True
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:692 recv IAC WILL MSSP
DEBUG stream_writer.py:708 WILL MSSP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSSP)
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 remote_option[MSSP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:671 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2025 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1637 MSSP: {'PUEBLO': '0', 'GMCP': '1', 'ANSI': '1', 'SKILLS': '200', 'LOCATION': 'United States', 'MSDP':
    '0', 'ROOMS': '20000', 'GAMESYSTEM': 'Custom', 'MINIMUM AGE': '13', 'NAME': 'Darkwind', 'MXP': '0', 'MCP': '0', 'MCCP': '0',
    'CLASSES': '15', 'VT100': '1', 'IP': '157.230.139.143', 'PLAYERS': '4', 'HELPFILES': '1', 'PAY TO PLAY': '0', 'LEVELS': '90',
    'ICON': 'https://imgur.com/a/eSryqER', 'PORT': '3000', 'MSP': '0', 'HIRING BUILDERS': '0', 'RACES': '22', 'GAMEPLAY': 'Hack
    and Slash', 'SUBGENRE': 'Medieval Fantasy', 'CREATED': '1992', 'SSL': '0', 'XTERM 256 COLORS': '0', 'STATUS': 'Live',
    'LANGUAGE': 'English', 'INTERMUD': '0', 'HIRING CODERS': '0', 'GENRE': 'Fantasy', 'UTF-8': '0', 'HOSTNAME': 'darkwind.org',
    'OBJECTS': '1000', 'UPTIME': '1770472247', 'FAMILY': 'LPMud', 'MOBILES': '0', 'CONTACT': 'admins@darkwind.org', 'CODEBASE':
    'LDMud 3.3.495', 'PAY FOR PERKS': '0', 'AREAS': '130', 'WEBSITE': 'https://www.darkwind.org'}
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
DEBUG stream_writer.py:692 recv IAC WONT b'\xfc'
DEBUG stream_writer.py:1985 handle_wont(WONT)
DEBUG stream_writer.py:3030 remote_option[WONT] = False
DEBUG stream_writer.py:3030 pending_option[DO + WONT] = False
DEBUG stream_writer.py:692 recv IAC WONT ECHO
DEBUG stream_writer.py:1985 handle_wont(ECHO)
DEBUG stream_writer.py:3030 remote_option[ECHO] = False
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:692 recv IAC WONT STATUS
DEBUG stream_writer.py:1985 handle_wont(STATUS)
DEBUG stream_writer.py:3030 remote_option[STATUS] = False
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:692 recv IAC WONT CHARSET
DEBUG stream_writer.py:1985 handle_wont(CHARSET)
DEBUG stream_writer.py:3030 remote_option[CHARSET] = False
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:692 recv IAC WONT EOR
DEBUG stream_writer.py:1985 handle_wont(EOR)
DEBUG stream_writer.py:3030 remote_option[EOR] = False
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = False
DEBUG stream_writer.py:692 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:1985 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3030 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:692 recv IAC WONT MSDP
DEBUG stream_writer.py:1985 handle_wont(MSDP)
DEBUG stream_writer.py:3030 remote_option[MSDP] = False
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:692 recv IAC WONT MSP
DEBUG stream_writer.py:1985 handle_wont(MSP)
DEBUG stream_writer.py:3030 remote_option[MSP] = False
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = False
DEBUG stream_writer.py:692 recv IAC WONT MXP
DEBUG stream_writer.py:1985 handle_wont(MXP)
DEBUG stream_writer.py:3030 remote_option[MXP] = False
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = False
DEBUG stream_writer.py:692 recv IAC WONT ZMP
DEBUG stream_writer.py:1985 handle_wont(ZMP)
DEBUG stream_writer.py:3030 remote_option[ZMP] = False
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:692 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:1985 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3030 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:692 recv IAC WONT ATCP
DEBUG stream_writer.py:1985 handle_wont(ATCP)
DEBUG stream_writer.py:3030 remote_option[ATCP] = False
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = False
INFO fingerprinting.py:737 new server fingerprint ddbc772ea79dc333
INFO client_base.py:105 Connection closed to <Peer 157.230.139.143 3000>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug darkwind.org 3000