dw.kicks-ass.org

dw.kicks-ass.org:1111

Telnet Fingerprint

c2dd7d4e76383b41…

This fingerprint is shared by 56 other servers.

Data source: c2dd7d4e76383b41/562d6296e3e91974.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\u001b[1;34m \r\n    _____\r\n    \\  _ \\                        /|   /|              _         /|\r\n     | | \\ \\                     / |  / |             |_|       / |\r\n     | |   \\ \\     ___    ___    | |  | |__   _     _  _   ___  | |__\r\n     | |     \\ \\  / _ \\  / _ \\   | |__|  _ \\ | | _ | || | / _ \\ |  _ \\\r\n     | |      \\ \\| | | || | | |  | | /| | | || || || || || | | || | | |\r\n     | | \\ /  | || | | || | | | /  /  | | | || || || || || | | || | | |\r\n     | |  |   | || | | ||_| | ||/| |  | | | || || || || || | |_|| | | |\r\n     | |  |   | || |/ /  / \\| |  | |  | | | || || || || | \\ \\   | | | |\r\n     | |  |   | || |/ /|/ /\\| |  | |  | | | || || || || | _ \\ \\ | | | |\r\n     | | / \\  | || | | || | | |  | |  | | | || || || || || | | || | | |\r\n     | |      | || | | || | | |  | |  | | | || || || || || | | || | | |\r\n     | |     / / | |_| || | | |  | |  | | | || || || || || |_| || | | |\r\n     | |   / /    \\___/  \\___\\|  |_|  |_| |_|\\_/\\_/\\_/|_| \\___/ |_| |_|\u001b[0;37m\r\n\u001b[1;34m     | |_/ /\u001b[0m                      \u001b[1;30m ,-+-,\u001b[0m                    \r\n\u001b[1;34m     |   /                       \u001b[1;30m.'  -  `.                \u001b[1;34m\r\n     | /                         \u001b[30m|  MUD  \u001b[0m\u001b[1;30m|             \u001b[34m(c) 1994 - 2026\r\n\u001b[1;34m     |/                    \u001b[0;31m_\\|/_ \u001b[1;30m|  /    |   \u001b[0;32m/\u001b[1;33m*\r\n                           \u001b[0;31m /|\\  \u001b[1;30m|   /   | \u001b[0;32m\\|/\r\n                            \u001b[0;32m \\|/ \u001b[1;30m|=======| \u001b[0;32m\\|/\t\t   \r\n                         \u001b[0;32m-= RIP Myst 1950-2024 =-\u001b[0;m\r\n  \r\n\r\nBy what name do you wish to be known? ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 2.5684211254119873
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T16:16:54.673086+00:00",
      "host": "dw.kicks-ass.org",
      "ip": "212.227.237.241",
      "port": 1111
    },
    {
      "connected": "2026-02-08T17:12:19.587654+00:00",
      "host": "dw.kicks-ass.org",
      "ip": "212.227.237.241",
      "port": 1111
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=dw.kicks-ass.org port=1111
INFO client_base.py:174 Connected to <Peer 212.227.237.241 1111>
DEBUG client_base.py:460 negotiation complete after 2.01s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 212.227.237.241 1111>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug dw.kicks-ass.org 1111