everwarmud.net

everwarmud.net:4545

Telnet Fingerprint

8d9ec9f191ea1be9…

This fingerprint is shared by 110 other servers.

Data source: 8d9ec9f191ea1be9/ab8d4d03f7a82968.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8d9ec9f191ea1be9",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AUTHENTICATION",
        "BINARY",
        "BM",
        "CHARSET",
        "COM_PORT",
        "DET",
        "ECHO",
        "ENCRYPT",
        "EOR",
        "FORWARD_X",
        "KERMIT",
        "NAMS",
        "NAOCRD",
        "NAOFFD",
        "NAOHTD",
        "NAOHTS",
        "NAOL",
        "NAOLFD",
        "NAOP",
        "NAOVTD",
        "NAOVTS",
        "PRAGMA_HEARTBEAT",
        "PRAGMA_LOGON",
        "RCP",
        "RCTE",
        "RSP",
        "SEND_URL",
        "SGA",
        "SSPI_LOGON",
        "STATUS",
        "SUPDUP",
        "SUPDUPOUTPUT",
        "SUPPRESS_LOCAL_ECHO",
        "TLS",
        "TN3270E",
        "TTYLOC",
        "VT3270REGIME",
        "X3PAD",
        "XAUTH"
      ],
      "requested-options": []
    },
    "session_data": {
      "banner_after_return": "    \u001b[1;37m/,-'\n\r             \u001b[1;37m    ``       \u001b[0;31m/     \\    ,='/ \\`=.    /     \\       \u001b[1;37m''\n\r             \u001b[0;31m            |__   /|\\_,--.,-.--,--._/|\\   __|\n\r             \u001b[1;37m            /  `./  \u001b[0;31m\\\\`\\ \u001b[1;30m|  |  | \u001b[0;31m/,//' \u001b[1;37m\\,'  \\\n\r             \u001b[1;37m           /   /     \u001b[0;31m||\u001b[1;30m--+--|--+-\u001b[0;31m/-|     \u001b[1;37m\\   \\\n\r             \u001b[1;37m          |   |     \u001b[0;31m/'\\_\\_\\ \u001b[1;30m| \u001b[0;31m/_/_/`\\     \u001b[1;37m|   |\n\r             \u001b[1;37m           \\   \\__, \u001b[0;31m\\_     `-'     _/ \u001b[1;37m.__/   /\n\r             \u001b[1;37m            `-._,-'   \u001b[0;31m`-._______,-'   \u001b[1;37m`-._,-'\n\r \n\r                                \u001b[1;37m- \u001b[1;30mLEG\u001b[1;37mE\u001b[1;30mNDS \u001b[1;37mOF \u001b[0;36mF\u001b[1;37mA\u001b[1;36mT\u001b[1;37mE \u001b[1;37m-\n\r \n\r\u001b[1;30mRunning FateCode (Emlen Based) \u001b[1;37mCode by: \u001b[0;34mDrak, Eraser, Murazor, Avanon, Shadowheart\n\r \n\r                             \u001b[1;37mFate Staff: \u001b[0;34mDrak \u001b[1;31mDarkside\n\r \n\r \n\r\u001b[0;31m-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-",
      "banner_before_return": "\n\r\u001b[0;31m-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\u001b[0;37m\n\r \n\r               \u001b[0;31m                        ,-.\n\r               \u001b[1;37m   ___\u001b[0;31m,---.__          /'|`\\          __,---,\u001b[1;37m___\n\r               \u001b[1;37m,-'    \u001b[0;31m\\`    `-.____,-'  |  `-.____,-'    //    \u001b[1;37m`-.     \n\r              \u001b[1;37m,'        \u001b[0;31m|           -'\\     /`-           |        \u001b[1;37m`.    \n\r             \u001b[1;37m/      ___\u001b[0;31m//              `. ,'          ,  , \\\u001b[1;37m___      \u001b[1;37m\\  \n\r            \u001b[1;37m|    ,-'   \u001b[0;31m`-.__   _    \u001b[0;36mF  \u001b[1;37mA \u001b[0;31m| \u001b[1;36mT  \u001b[1;37mE\u001b[0;31m   ,    __,-'   \u001b[1;37m`-.    | \n\r            \u001b[1;37m|   /          \u001b[0;31m/\\_  `   .    |    ,      _/\\          \u001b[1;37m\\   | \n\r            \u001b[1;37m\\  |           \u001b[0;31m\\ \\`-.___ \\   |   / ___,-'/ /           \u001b[1;37m|  / \n\r            \u001b[1;37m \\  \\           \u001b[0;31m| `._   `\\\\  |  //'   _,' |           \u001b[1;37m/  /\n\r             \u001b[1;37m `-.\\         \u001b[0;31m/'  _ `---'' , . ``---' _  `\\     ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "timing": {
        "probe": 0.5060486793518066,
        "total": 1.0066711902618408
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T06:03:17.223141+00:00",
      "host": "everwarmud.net",
      "ip": "86.92.98.115",
      "port": 4545
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=everwarmud.net port=4545
INFO client_base.py:174 Connected to <Peer 86.92.98.115 4545>
DEBUG client_base.py:460 negotiation complete after 2.01s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 86.92.98.115 4545>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug everwarmud.net 4545