darkwiz.org

darkwiz.org:6969

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.

  • MSSP: Negotiated

  • GMCP: Negotiated

  • MSDP: No

  • MCCP: No

  • MCCP2: No

  • MXP: No

  • MSP: No

  • MCP: No

  • ZMP: No

Telnet Fingerprint

2d84e99d87364e37…

This fingerprint is shared by 1 other server.

Options requested from client: NEW_ENVIRON

Data source: 2d84e99d87364e37/cb0367323c598e1c.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "2d84e99d87364e37",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [
        "NEW_ENVIRON"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\n\r\n                                    \u001b[1;31m/   \\\n   \u001b[0;33m_                        \u001b[0;31m)      \u001b[1;31m((   ))     \u001b[0;31m(\n  \u001b[0;33m(\u001b[1;33m@\u001b[0;33m)                      \u001b[1;31m/\u001b[0;31m|\u001b[1;31m\\      ))\u001b[0;31m_\u001b[1;31m((     \u001b[1;31m/\u001b[0;31m|\u001b[1;31m\\                        \u001b[0;33m_\n  \u001b[0;33m|\u001b[1;30m-\u001b[0;33m|`\\                   \u001b[1;31m/ \u001b[0;31m| \u001b[1;31m\\    (/\\\u001b[0;31m|\u001b[1;31m/\\)   / \u001b[0;31m| \u001b[1;31m\\                      \u001b[0;33m(\u001b[1;36m@\u001b[0;33m)\n  \u001b[0;33m| |--------------------\u001b[1;31m/\u001b[0;33m--\u001b[0;31m|\u001b[0;33m-\u001b[1;31mvoV\u001b[0;33m---\u001b[1;31m\\\u001b[1;33m'\u001b[0;31m|\u001b[1;33m'\u001b[1;31m/\u001b[0;33m--\u001b[1;31mVov\u001b[0;33m-\u001b[0;31m|\u001b[0;33m--\u001b[1;31m\\\u001b[0;33m---------------------|\u001b[1;30m-\u001b[0;33m|\n  \u001b[0;33m|\u001b[1;30m-\u001b[0;33m|    -            -       \u001b[1;37m'^`   \u001b[1;31m(\u001b[1;30mo o\u001b[1;31m)  \u001b[1;37m'^`    \u001b[0;33m-                -    | |\n  \u001b[0;33m| | -            -         \u001b[1;35m_\u001b[0;35m_      \u001b[1;31m\\\u001b[1;33mY\u001b[1;31m/'                \u001b[0;33m-              |\u001b[1;30m-\u001b[0;33m|\n  \u001b[0;33m|\u001b[1;30m-\u001b[0;33m|   -         -           \u001b[1;35m|\u001b[0;35m\\   \u001b[1;35m/\u001b[0;35m\\  \u001b[1;35m|\u001b[0;35m-\\  \u001b[1;35m| \u001b[0;35m/     \u001b[0;33m-            -      | |\n  \u001b[0;33m| |    -                -   \u001b[1;35m| \u001b[0;35m| \u001b[1;35m|\u001b[0;35m__| \u001b[1;35m| \u001b[0;35m|  \u001b[1;35m|\u001b[0;35m-    \u001b[0;33m-                     | |\n  \u001b[0;33m|\u001b[1;30m-\u001b[0;33m|  -        - \u001b[0;34mO    \u001b[0;33m-     \u001b[1;35m_|\u001b[0;35m/  \u001b[1;35m|  \u001b[0;35m| \u001b[1;35m|  \u001b[0;35m\\ \u001b[1;35m| \u001b[0;35m\\         \u001b[0;33m-  \u001b[0;34mO      \u001b[0;33m-     |\u001b[1;30m-\u001b[0;33m|\n  \u001b[0;33m| |    -  \u001b[0;34m{\u001b[1;34mo\u001b[0;34m)\u001b[1;31mxxx\u001b[0;34m|\u001b[1;37m===============- \u001b[1;33m*    * \u001b[1;37m-===============\u001b[0;34m|\u001b[1;31mxxx\u001b[0;34m(\u001b[1;34mo\u001b[0;34m}      \u001b[0;33m| |\n  \u001b[0;33m| | -      -    \u001b[0;34mO   \u001b[1;32m\\  \u001b[0;33m-   \u001b[0;32m/ \u001b[1;32m|\u001b[0;32m| \u001b[1;32m-\u001b[0;32m-/ \u001b[1;32m/\u001b[0;32m\\  \u001b[1;32m|\u001b[0;32m-\\ \u001b[1;32m|\u001b[0;32m\\ \u001b[1;32m|\u001b[0;32m-\\ \u001b[1;32m\\  \u001b[0;32m/  \u001b[0;34mO      \u001b[0;33m-     |\u001b[1;30m-\u001b[0;33m|\n  \u001b[0;33m|\u001b[1;30m-\u001b[0;33m|  -               \u001b[1;32m\\    \u001b[0;32m/  \u001b[1;32m|\u001b[0;32m|  \u001b[0;32m/ \u001b[1;32m|\u001b[0;32m__| \u001b[1;32m| \u001b[0;32m| \u001b[1;32m| \u001b[0;32m|\u001b[1;32m| \u001b[0;32m|  \u001b[1;32m\\\u001b[0;32m/     \u001b[0;33m-          | |\n  \u001b[0;33m| |              -    \u001b[1;32m\\\u001b[0;32m/\u001b[1;32m\\\u001b[0;32m/   \u001b[1;32m|\u001b[0;32m| \u001b[1;32m/\u001b[0;32m__\u001b[1;32m|  \u001b[0;32m| \u001b[1;32m|  \u001b[0;32m\\\u001b[1;32m|\u001b[0;32m/ \u001b[1;32m|  \u001b[0;32m\\ \u001b[1;32m|\u001b[0;32m| \u001b[0;33m-          -   |\u001b[1;30m-\u001b[0;33m|\n  \u001b[0;33m|\u001b[1;30m-\u001b[0;33m|   -                     -            -                   -        | |\n  \u001b[0;33m|\u001b[1;30m_\u001b[0;33m|___________________________________________________________________| |\n  \u001b[0;33m(\u001b[1;32m@\u001b[0;33m)                 \u001b[1;31ml   /\\ /      ( (       \\ /\\   l                \u001b[0;33m`\\|\u001b[1;30m-\u001b[0;33m|\n                      \u001b[1;31ml /   \u001b[0;31mV\u001b[1;31m        \\ \\       \u001b[0;31mV\u001b[1;31m   \\ l                  \u001b[0;33m(\u001b[1;31m@\u001b[0;33m)\n                      \u001b[1;31ml/             _) )_          \\I       \n                                     `\\\u001b[0;31m,\u001b[1;31m/`\n                                       \\/\n                                       \u001b[0;31m,\u001b[0m\nBy what name do you wish to be known? ",
      "encoding": "ascii",
      "option_states": {
        "environ_requested": [
          {
            "name": "REAL_IP",
            "type": "VAR"
          },
          {
            "name": "CLIENTIP",
            "type": "VAR"
          },
          {
            "name": "IPADDR",
            "type": "VAR"
          },
          {
            "name": "IPADDRESS",
            "type": "VAR"
          }
        ],
        "server_offered": {
          "0x56": false,
          "0x58": false,
          "0x5b": false,
          "GMCP": true,
          "MSSP": true,
          "SGA": true
        },
        "server_requested": {
          "NEW_ENVIRON": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 5.000988960266113
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T17:19:36.827084+00:00",
      "host": "darkwiz.org",
      "ip": "72.62.81.158",
      "port": 6969
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=darkwiz.org port=6969
INFO client_base.py:174 Connected to <Peer 72.62.81.158 6969>
DEBUG stream_writer.py:692 recv IAC WILL SGA
DEBUG stream_writer.py:708 WILL SGA unsolicited
DEBUG stream_writer.py:1863 handle_will(SGA)
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 remote_option[SGA] = True
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = False
DEBUG stream_writer.py:692 recv IAC WILL b'X'
DEBUG stream_writer.py:708 WILL b'X' unsolicited
DEBUG stream_writer.py:1863 handle_will(b'X')
DEBUG stream_writer.py:3030 remote_option[b'X'] = False
DEBUG stream_writer.py:933 send IAC DONT b'X'
WARNING stream_writer.py:1968 Unhandled: WILL b'X'.
DEBUG stream_writer.py:692 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:708 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1863 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3030 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:933 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:1968 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:692 recv IAC WILL MXP
DEBUG stream_writer.py:708 WILL MXP unsolicited
DEBUG stream_writer.py:1863 handle_will(MXP)
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 remote_option[MXP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = False
DEBUG stream_writer.py:692 recv IAC WILL MSSP
DEBUG stream_writer.py:708 WILL MSSP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSSP)
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 remote_option[MSSP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:692 recv IAC WILL GMCP
DEBUG stream_writer.py:708 WILL GMCP unsolicited
DEBUG stream_writer.py:1863 handle_will(GMCP)
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 remote_option[GMCP] = True
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:692 recv IAC DO NEW_ENVIRON
DEBUG stream_writer.py:1733 handle_do(NEW_ENVIRON)
DEBUG stream_writer.py:3030 pending_option[WILL + NEW_ENVIRON] = True
DEBUG stream_writer.py:933 send IAC WILL NEW_ENVIRON
DEBUG stream_writer.py:3030 pending_option[SB + NEW_ENVIRON] = True
DEBUG stream_writer.py:3030 local_option[NEW_ENVIRON] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NEW_ENVIRON] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB NEW_ENVIRON
DEBUG stream_writer.py:671 sub-negotiation cmd NEW_ENVIRON SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + NEW_ENVIRON] = False
DEBUG stream_writer.py:2241 recv NEW_ENVIRON SEND: REAL_IP, CLIENTIP, IPADDR, IPADDRESS
DEBUG stream_writer.py:2266 env send: REAL_IP='', CLIENTIP='', IPADDR='', IPADDRESS=''
DEBUG stream_writer.py:684 begin sub-negotiation SB MXP
DEBUG stream_writer.py:671 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:2025 [SB + MXP] unsolicited
DEBUG stream_writer.py:1646 MXP: b''
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 72.62.81.158 6969>
INFO fingerprinting.py:746 connection for server fingerprint 2d84e99d87364e37

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug darkwiz.org 6969