frandum.fr

Connection Banner:

_​_____ /\\ \| _​____ _ _ ___ __ \\/ _​___\| \| __ \\ \| \| \| \| \| \\/ \| o \|\| \| _ __ __ _ _ __ \| \| \| \| \| \| \| \| \| \\ / \| / \|\| \|__ \| '__\| / _\` \| \| '_ \\ \| \| \| \| \| \| \| \| \| \|\\/\| \| v 7.1 /\|_​________\|--\| \|---\|\|-​------\| \|-​----\| \|-​-----\| \|-​-----\| \|-​-----\| \|-​-------, o#​##########>=\| __\|===\|\|=​======\| \|=​====\| \|=​=====\| \|=​=====\| \|=​=====\| \|=​==------> \\\|~​~~~~~~~~\|--\|\|-​-----\|\|-​------\| \|-​----\| \|-​-----\| \|-​-----\| \|-​-----\| \|-​-------' \\ \|\| \| \|_\| \\__,_\| \|_\| \|_\| \|_​____/ \\_​___/ \|_\| \|_\| o \|\| \| /\\__\| www.frandum.fr \\/ By what name shall you be called: Alright, good-bye then!

Server URLs

Server Info

  • Server Location: 🇳🇱 The Netherlands (GeoIP)

Telnet Fingerprint

c2dd7d4e76383b41

This fingerprint is shared by 173 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Alright, good-bye then!\r\n",
      "banner_before_return": "\r\n             ______\r\n           /\\      |                        _____    _    _  ___  __\r\n           \\/  ____|                       |  __ \\  | |  | | |  \\/  |\r\n  o        ||  |      _ __   __ _   _ __   | |  | | | |  | | | \\  / |\r\n /         ||  |__   | '__| / _` | | '_ \\  | |  | | | |  | | | |\\/| |  v 7.1\r\n/|_________|--|   |---||-------| |-----| |------| |------| |------| |--------,\r\no###########>=| __|===||=======| |=====| |======| |======| |======| |===------>\r\n\\|~~~~~~~~~|--||------||-------| |-----| |------| |------| |------| |--------'\r\n \\         ||  |     |_|    \\__,_| |_| |_| |_____/   \\____/  |_|  |_|\r\n  o        ||  |                     \r\n           /\\__|                    www.frandum.fr\r\n           \\/     \r\n\r\n\r\nBy what name shall you be called: ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": false
        },
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 4.179969549179077
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-15T01:18:32.457431+00:00",
      "host": "frandum.fr",
      "ip": "51.15.3.143",
      "port": 2001
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug frandum.fr 2001
Show Logfile
DEBUG client.py:998 Fingerprint client: host=frandum.fr port=2001
INFO client_base.py:175 Connected to <Peer 51.15.3.143 2001>
DEBUG client_base.py:494 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WONT ECHO
DEBUG stream_writer.py:2025 handle_wont(ECHO)
DEBUG stream_writer.py:3174 remote_option[ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 51.15.3.143 2001>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41