gizmomud.com

Connection Banner:

, .-; , \|\\ / / __, \|\\ '.\`-.\| \|.'.-' \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \\\`'-: \`; : / \`-._'. \\'\| Gizmo Mud ,_​.-=\` \` \` ~,_ a.k.a Imperial Omega '--,. .-. ,=". / { 0 )\`;-.} http://www.gizmomud.com \| '-' /__ \| / \\_,\\\| \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \* \| ( __ / ' \\ /,'\`\| ' .​-~"~~-. \| / ' , / \\ \| ; , . \| , ' . \| \| \| , , \| : ; : \| \\ \|. , \| \| \| \| \| \\ \| ' \|\\_\|-'\|_,'\\\| \`\\ ' . ' \| \| \| \| \| \| , ' \|_/'-\|_\\_/ Based on DikuMUD I (GAMMA 2.5) by \\ . , ' .\| \| \| \| \| Staerfeldt, Nyboe, Madsen, \\ , \| \| \| \| \| Seifert, and Hammer \`\\ \\/\|,\| ;/' jgs\\' , \| ; /' By what name do you wish to be known?

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

c2dd7d4e76383b41

This fingerprint is shared by 173 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\u0000\r\n\r\n\u001b[1m\u001b[33m           ,      .-;\r\n\u001b[1m\u001b[33m        ,  |\\    / /  __,\r\n\u001b[1m\u001b[33m        |\\ '.`-.|  |.'.-'       \u001b[1m\u001b[37m* * * * * * * * * * * * * * * * * *\r\n\u001b[1m\u001b[33m         \\`'-:  `; : /\r\n\u001b[1m\u001b[33m          `-._'.  \\'|                        \u001b[1m\u001b[31mGizmo Mud\r\n\u001b[1m\u001b[33m         ,_.-=` ` `  ~,_               \u001b[1m\u001b[31ma.k.a Imperial Omega\r\n\u001b[1m\u001b[33m          '--,.    \u001b[1m\u001b[31m.-. \u001b[1m\u001b[33m,=\".\r\n\u001b[1m\u001b[33m            /     \u001b[1m\u001b[31m{ \u001b[1m\u001b[32m0 \u001b[1m\u001b[31m)\u001b[1m\u001b[33m`\u001b[0m\u001b[33m;-.\u001b[1m\u001b[33m}          \u001b[1m\u001b[31mhttp://www.gizmomud.com\r\n\u001b[1m\u001b[33m            |      \u001b[1m\u001b[31m'-' \u001b[0m\u001b[33m/__ |\r\n\u001b[1m\u001b[33m            /          \u001b[0m\u001b[33m\\_,\\|    \u001b[1m\u001b[37m* * * * * * * * * * * * * * * * * *\r\n\u001b[1m\u001b[33m           |          (\r\n\u001b[1m\u001b[31m       __ \u001b[1m\u001b[33m/ '          \\ \r\n\u001b[1m\u001b[31m      /,'`\u001b[1m\u001b[33m|     '   \u001b[1m\u001b[31m.-~\"~~-.\r\n\u001b[1m\u001b[31m     |   \u001b[1m\u001b[33m/  ' ,    \u001b[1m\u001b[31m/        \\ \r\n\u001b[1m\u001b[31m     |  \u001b[1m\u001b[33m; ,     . \u001b[1m\u001b[31m|  ,  '  . |\r\n\u001b[1m\u001b[31m     |  \u001b[1m\u001b[33m|  ,  ,   \u001b[1m\u001b[31m|  :  ;  : |\r\n\u001b[1m\u001b[31m     \\  \u001b[1m\u001b[33m|.     ,  \u001b[1m\u001b[31m|  |  |  | |\r\n\u001b[1m\u001b[31m      \\ \u001b[1m\u001b[33m|   '     \u001b[1m\u001b[32m|\u001b[1m\u001b[31m\\_|-'|_,'\\|\r\n\u001b[1m\u001b[31m       `\u001b[1m\u001b[33m\\  '  . ' \u001b[1m\u001b[32m| |  | |  |\r\n\u001b[1m\u001b[33m        | ,  '    \u001b[1m\u001b[32m|_/'-|_\\_/     \u001b[0m\u001b[32mBased on DikuMUD I (GAMMA 2.5) by\r\n\u001b[1m\u001b[33m        \\ .  , ' .| | | | |         \u001b[0m\u001b[32mStaerfeldt, Nyboe, Madsen,\r\n\u001b[1m\u001b[33m         \\     ,  | | | | |             \u001b[0m\u001b[32mSeifert, and Hammer\r\n\u001b[1m\u001b[33m          `\\      \\/|,| ;/'\r\n\u001b[0m\u001b[32m          jgs\u001b[1m\u001b[33m\\' ,  | ; /' \u001b[0m\r\n\r\n\r\nBy what name do you wish to be known? ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 2.6557769775390625
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:11:59.745183+00:00",
      "host": "gizmomud.com",
      "ip": "147.160.225.77",
      "port": 6969
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug gizmomud.com 6969
Show Logfile
DEBUG client.py:965 Fingerprint client: host=gizmomud.com port=6969
INFO client_base.py:175 Connected to <Peer 147.160.225.77 6969>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:1319 IAC NOP: Null Operation (unhandled).
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 147.160.225.77 6969>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41