deepertrouble.org

deepertrouble.org:4242

Telnet Fingerprint

8230b57f2279de84…

This fingerprint is shared by 102 other servers.

Data source: 8230b57f2279de84/2516d81e45b44305.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8230b57f2279de84",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "SGA",
        "STATUS"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Too short name.\r\nPlease enter your character name: ",
      "banner_before_return": "Welcome to...\r\r\n                  _____                               \r\r\n                 |     \\.-----.-----.-----.-----.----.\r\r\n                 |  --  |  -__|  -__|  _  |  -__|   _|\r\r\n                 |_____/|_____|_____|   __|_____|__|  \r\r\n              _______               |__| __     __        \r\r\n             |_     _|.----.-----.--.--.|  |--.|  |.-----.\r\r\n               |   |  |   _|  _  |  |  ||  _  ||  ||  -__|\r\r\n               |___|  |__| |_____|_____||_____||__||_____|\r\r\n\r\r\n        Council: Amokoma, Caine, Exarkun, Harlquinth and Zordiac\r\r\n\r\r\n            Visit our website: http://www.deepertrouble.org/\r\r\n\r\r\n     Be \u001b[1mS U R E\u001b[0m you have read and understood the rules of this MUD.\r\r\n   You can read the rules by typing '\u001b[1mrules\u001b[0m' after you have logged in.\r\r\n\r\r\n        Can't find a good name? Try: http://www.kirith.com/name/\r\r\n\r\r\nPlease note our new address: \u001b[1mdeepertrouble.org 4242\u001b[0m. Spread the word! :)\r\r\nIf you just want to look around, use the name 'guest' (? for help).\r\r\nWelcome to Deeper Trouble. (Type '\u001b[1mquit\u001b[0m' to log off)\r\nPlease enter your character name: ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5038342475891113,
        "total": 3.1302316188812256
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T16:16:02.781583+00:00",
      "host": "deepertrouble.org",
      "ip": "172.104.251.185",
      "port": 4242
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=deepertrouble.org port=4242
INFO client_base.py:174 Connected to <Peer 172.104.251.185 4242>
DEBUG client_base.py:460 negotiation complete after 2.01s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
DEBUG stream_writer.py:692 recv IAC WONT SGA
DEBUG stream_writer.py:1985 handle_wont(SGA)
DEBUG stream_writer.py:3030 remote_option[SGA] = False
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = False
DEBUG stream_writer.py:692 recv IAC WONT ECHO
DEBUG stream_writer.py:1985 handle_wont(ECHO)
DEBUG stream_writer.py:3030 remote_option[ECHO] = False
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = False
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 172.104.251.185 4242>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug deepertrouble.org 4242