groundzero2.duckdns.org
Resolving hostname and negotiating connection options. Scenario : GZ2 Default Scenario Round started : Sun Feb 8 16:55:23 2026 System time : Sun Feb 8 17:14:24 2026 Time Left in Round : 162 minutes Most players this boot: 0 . _______ _______ | _ | _ | Ground Zero Ii - The Second Coming |. |___|___| | TELNET: groundzero2.duckdns.org 4000 |. | |/ ___/ WEB SITE: None! |: 1 |: 1 \ Administrative Staff: |::.. . |::.. . | https://www.facebook.com/groups/25285999988 `-------`-------' Original DikuMUD by Hans Staerfeldt, Katja Nyboe Tom Madsen, Michael Seifert, and Sebastian Hammer Based on MERC 2.1 code by Hatchet, Furey, and Kahn ROM 2.3 code written by Russ Taylor, copyright 1993-1994 Ground ZERO base by Cory Hilke. Welcome soldier. Please state your name, clearly :
Telnet Fingerprint
This fingerprint is unique to this server.
Options requested from client: LFLOW, NAWS, TTYPE
Data source: c5f425c36a52e5f9/5c20372b1a26465a.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "c5f425c36a52e5f9",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"LFLOW",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "Resolving hostname and negotiating connection options.\r\n\r\nScenario : GZ2 Default Scenario\r\nRound started : Sun Feb 8 16:55:23 2026\n\rSystem time : Sun Feb 8 17:14:24 2026\n\rTime Left in Round : 162 minutes\r\nMost players this boot: 0\r\n.\r\n\u001b[0;37m _______ _______ \r\n | _ | _ | \u001b[1;31mGround Zero Ii \u001b[30m-\u001b[31m The Second Coming\u001b[0;37m\r\n |. |___|___| | TELNET: \u001b[36mgroundzero2.duckdns.org 4000\u001b[0;37m\r\n |. | |/ ___/ WEB SITE: \u001b[36mNone!\u001b[0;37m\r\n |: 1 |: 1 \\ Administrative Staff:\r\n |::.. . |::.. . | https://www.facebook.com/groups/25285999988\r\n `-------`-------'\r\n\r\n Original DikuMUD by Hans Staerfeldt, Katja Nyboe\r\n Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n Based on MERC 2.1 code by Hatchet, Furey, and Kahn\r\n ROM 2.3 code written by Russ Taylor, copyright 1993-1994\r\n Ground ZERO base by Cory Hilke.\r\n\r\nWelcome soldier.\r\nPlease state your name, clearly : ",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {
"LFLOW": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.6083784103393555
}
}
},
"sessions": [
{
"connected": "2026-02-08T17:14:30.703977+00:00",
"host": "groundzero2.duckdns.org",
"ip": "35.212.169.241",
"port": 4000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=groundzero2.duckdns.org port=4000
INFO client_base.py:174 Connected to <Peer 35.212.169.241 4000>
DEBUG stream_writer.py:692 recv IAC DO LFLOW
DEBUG stream_writer.py:1733 handle_do(LFLOW)
DEBUG stream_writer.py:3030 pending_option[WILL + LFLOW] = True
DEBUG stream_writer.py:933 send IAC WILL LFLOW
DEBUG stream_writer.py:3030 pending_option[SB + LFLOW] = True
DEBUG stream_writer.py:3030 local_option[LFLOW] = True
DEBUG stream_writer.py:3030 pending_option[WILL + LFLOW] = False
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:692 recv IAC DO NAWS
DEBUG stream_writer.py:1733 handle_do(NAWS)
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:933 send IAC WILL NAWS
DEBUG stream_writer.py:2300 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3030 local_option[NAWS] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2025 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB LFLOW'
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 35.212.169.241 4000>
INFO fingerprinting.py:746 connection for server fingerprint c5f425c36a52e5f9
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug groundzero2.duckdns.org 4000