feathermuck.avians.net

feathermuck.avians.net:8888

Telnet Fingerprint

8d9ec9f191ea1be9…

This fingerprint is shared by 110 other servers.

Data source: 8d9ec9f191ea1be9/e965a4c43c5ee2ac.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8d9ec9f191ea1be9",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AUTHENTICATION",
        "BINARY",
        "BM",
        "CHARSET",
        "COM_PORT",
        "DET",
        "ECHO",
        "ENCRYPT",
        "EOR",
        "FORWARD_X",
        "KERMIT",
        "NAMS",
        "NAOCRD",
        "NAOFFD",
        "NAOHTD",
        "NAOHTS",
        "NAOL",
        "NAOLFD",
        "NAOP",
        "NAOVTD",
        "NAOVTS",
        "PRAGMA_HEARTBEAT",
        "PRAGMA_LOGON",
        "RCP",
        "RCTE",
        "RSP",
        "SEND_URL",
        "SGA",
        "SSPI_LOGON",
        "STATUS",
        "SUPDUP",
        "SUPDUPOUTPUT",
        "SUPPRESS_LOCAL_ECHO",
        "TLS",
        "TN3270E",
        "TTYLOC",
        "VT3270REGIME",
        "X3PAD",
        "XAUTH"
      ],
      "requested-options": []
    },
    "session_data": {
      "banner_after_return": "dchat..\r\nroosting place, and truly                **         **** *FeatherMuck* ****\r\nwish each avian arrival..                *               *************        \r\n                                        ,**-                               \r\n------------ <: ..a SpLeNdId TiMe aLoFt wItH dOwNy fRiEnDs! :> ------------\r\n\r\n",
      "banner_before_return": "#$#mcp version: \"2.1\" to: \"2.1\"\r\n--------------------------------------------------------------------------- \r\n    Welcome, featheries :>   You have found the nest...    *fluffle*\r\n---------------------------------------- ,~~---- -------------------------- \r\nConnect with three words:               **/---      *Also be sure to visit*\r\n\" connect name password \"              ****-        * irc.avians.net 6667 *\r\nor \"connect guest guest\".            ****--         *with your irc client.*    \r\n* Originally we ran the *           *.**.*-         Truly amazing is that..\r\n*Tiny-Muck *2.2* fb5.60,*          /*.*.*.-         with this muck platform\r\nnow Fuzzball on UNIX box,          _-*.**           nicely extended by that\r\nthe fine coding o'Foxen &        /  -**|**-         wonderful foxbird known\r\nother industrious paws :>        |',-\\\\***\\\\ ~      as Keet.. it is apropos\r\nSo with these warbles, we         V    -**-_/       that we can now submit,\r\nwingly welcome you to our               ***         a tribute to bir",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "timing": {
        "probe": 0.504288911819458,
        "total": 1.0050101280212402
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T04:57:29.337487+00:00",
      "host": "feathermuck.avians.net",
      "ip": "45.56.113.225",
      "port": 8888
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:773 Fingerprint client: host=feathermuck.avians.net port=8888
INFO client_base.py:174 Connected to <Peer 45.56.113.225 8888>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:896 send IAC DO BINARY
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = True
DEBUG stream_writer.py:896 send IAC DO SGA
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:896 send IAC DO ECHO
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:896 send IAC DO STATUS
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:896 send IAC DO CHARSET
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = True
DEBUG stream_writer.py:896 send IAC DO EOR
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:896 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:655 recv IAC WONT BINARY
DEBUG stream_writer.py:1899 handle_wont(BINARY)
DEBUG stream_writer.py:2883 remote_option[BINARY] = False
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:655 recv IAC WONT SGA
DEBUG stream_writer.py:1899 handle_wont(SGA)
DEBUG stream_writer.py:2883 remote_option[SGA] = False
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = False
DEBUG stream_writer.py:655 recv IAC WONT ECHO
DEBUG stream_writer.py:1899 handle_wont(ECHO)
DEBUG stream_writer.py:2883 remote_option[ECHO] = False
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:655 recv IAC WONT STATUS
DEBUG stream_writer.py:1899 handle_wont(STATUS)
DEBUG stream_writer.py:2883 remote_option[STATUS] = False
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:655 recv IAC WONT CHARSET
DEBUG stream_writer.py:1899 handle_wont(CHARSET)
DEBUG stream_writer.py:2883 remote_option[CHARSET] = False
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:655 recv IAC WONT EOR
DEBUG stream_writer.py:1899 handle_wont(EOR)
DEBUG stream_writer.py:2883 remote_option[EOR] = False
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = False
DEBUG stream_writer.py:655 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:1899 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:2883 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = False
INFO fingerprinting.py:736 connection for server fingerprint 8230b57f2279de84
INFO client_base.py:105 Connection closed to <Peer 45.56.113.225 8888>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug feathermuck.avians.net 8888