escape.wolfpaw.net
Would you like ansi color?
*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*
W e l c o m e T o
- A R M O N I A ' S -
- E S C A P E F R O M D E S T I N Y -
(0)
<M
o <M
/| ...... /:M\----------------------------------,,,,,,
(0)||XXXXXX||I:K+}====={H} ======-------->
\| ++++++ \:W/----------------------------------''''''
o <W
<W
(0) "Greed, Fate, Ambition, Death... Can YOU Escape?"
*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*
We are running on a derivative of SMAUG 1.4 (written by Thoric (Derek Snider)
with Altrag, Blodkai, Haus, Narn, Scryn, Swordbearer, Tricops, Gorog, Rennard,
Grishnakh, Fireblade and Nivek) which was in turn based on Merc2.1 by Hatchet,
Fury, and Kahn, in turn based on DikuMUD code (Hans Staerfeldt, Katja Nyboe,
Tom Madsen, Michael Seifert & Sebastian Hammer). PleaseTelnet Fingerprint
This fingerprint is shared by 110 other servers.
Data source: 8d9ec9f191ea1be9/bf04e1053848311d.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "8d9ec9f191ea1be9",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"CHARSET",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": []
},
"session_data": {
"banner_after_return": "\n\r\n\r*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*\n\r \n\r W e l c o m e T o \n\r\n\r - A R M O N I A ' S -\n\r - E S C A P E F R O M D E S T I N Y -\n\r\n\r (0)\n\r <M\n\r o <M\n\r /| ...... /:M\\----------------------------------,,,,,,\n\r(0)||XXXXXX||I:K+}====={H} ======-------->\n\r \\| ++++++ \\:W/----------------------------------''''''\n\r o <W\n\r <W\n\r (0) \"Greed, Fate, Ambition, Death... Can YOU Escape?\"\n\r\n\r*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*<>*\n\rWe are running on a derivative of SMAUG 1.4 (written by Thoric (Derek Snider)\n\rwith Altrag, Blodkai, Haus, Narn, Scryn, Swordbearer, Tricops, Gorog, Rennard,\n\rGrishnakh, Fireblade and Nivek) which was in turn based on Merc2.1 by Hatchet,\n\rFury, and Kahn, in turn based on DikuMUD code (Hans Staerfeldt, Katja Nyboe,\n\rTom Madsen, Michael Seifert & Sebastian Hammer). Please",
"banner_before_return": "\n\rWould you like ansi color?\n\r",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"timing": {
"probe": 0.5043139457702637,
"total": 1.1360163688659668
}
}
},
"sessions": [
{
"connected": "2026-02-08T04:55:31.027482+00:00",
"host": "escape.wolfpaw.net",
"ip": "204.209.44.3",
"port": 2020
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=escape.wolfpaw.net port=2020
INFO client_base.py:174 Connected to <Peer 204.209.44.3 2020>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 204.209.44.3 2020>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug escape.wolfpaw.net 2020