groundzero2.duckdns.org

groundzero2.duckdns.org:4000

Telnet Fingerprint

c5f425c36a52e5f9…

This fingerprint is unique to this server.

Options requested from client: LFLOW, NAWS, TTYPE

Data source: c5f425c36a52e5f9/5c20372b1a26465a.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "c5f425c36a52e5f9",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [
        "LFLOW",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "Resolving hostname and negotiating connection options.\r\n\r\nScenario              : GZ2 Default Scenario\r\nRound started         : Sun Feb  8 16:55:23 2026\n\rSystem time           : Sun Feb  8 17:14:24 2026\n\rTime Left in Round    : 162 minutes\r\nMost players this boot: 0\r\n.\r\n\u001b[0;37m           _______ _______ \r\n          |   _   |   _   |  \u001b[1;31mGround Zero Ii \u001b[30m-\u001b[31m The Second Coming\u001b[0;37m\r\n          |.  |___|___|   |  TELNET: \u001b[36mgroundzero2.duckdns.org 4000\u001b[0;37m\r\n          |.  |   |/  ___/   WEB SITE: \u001b[36mNone!\u001b[0;37m\r\n          |:  1   |:  1  \\   Administrative Staff:\r\n          |::.. . |::.. . |  https://www.facebook.com/groups/25285999988\r\n          `-------`-------'\r\n\r\n               Original DikuMUD by Hans Staerfeldt, Katja Nyboe\r\n               Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n               Based on MERC 2.1 code by Hatchet, Furey, and Kahn\r\n               ROM 2.3 code written by Russ Taylor, copyright 1993-1994\r\n               Ground ZERO base by Cory Hilke.\r\n\r\nWelcome soldier.\r\nPlease state your name, clearly : ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {
          "LFLOW": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 2.6083784103393555
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T17:14:30.703977+00:00",
      "host": "groundzero2.duckdns.org",
      "ip": "35.212.169.241",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=groundzero2.duckdns.org port=4000
INFO client_base.py:174 Connected to <Peer 35.212.169.241 4000>
DEBUG stream_writer.py:692 recv IAC DO LFLOW
DEBUG stream_writer.py:1733 handle_do(LFLOW)
DEBUG stream_writer.py:3030 pending_option[WILL + LFLOW] = True
DEBUG stream_writer.py:933 send IAC WILL LFLOW
DEBUG stream_writer.py:3030 pending_option[SB + LFLOW] = True
DEBUG stream_writer.py:3030 local_option[LFLOW] = True
DEBUG stream_writer.py:3030 pending_option[WILL + LFLOW] = False
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:692 recv IAC DO NAWS
DEBUG stream_writer.py:1733 handle_do(NAWS)
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:933 send IAC WILL NAWS
DEBUG stream_writer.py:2300 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3030 local_option[NAWS] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2025 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB LFLOW'
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 35.212.169.241 4000>
INFO fingerprinting.py:746 connection for server fingerprint c5f425c36a52e5f9

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug groundzero2.duckdns.org 4000