Iberia
___ _ _
|_ _| |__ ___ _ __(_) __ _
| || '_ \ / _ \ '__| |/ _` |
| || |_) | __/ | | | (_| |
|___|_.__/ \___|_| |_|\__,_|
Iberia is running in Iberia MUD Engine (IME) v1.0.250815
Type "credits" for copyright and creation details.
Player activity in the last 7 days: 14m 27s.
9 logins since last reboot on 28JAN26 05:30 (GMT).
"Let your plans be dark and impenetrable as night, and when you move, fall
like a thunderbolt." - Sun Tzu, Art of War
'connect [name] [password]' connects you to an existing character.
'create [name] [password] [re-type password]' creates a new character.
>Server Info
Codebase: IME v1.0.250815
Family: Custom
Genre: Historical
Gameplay: Hack and Slash,Adventure,Player versus Environment,Roleplaying,Strategy
Players online: 0 [1]
Created: 2006
Status: Live
Website: https://iberia.jdai.pt/
Location: Portugal
TLS/SSL: Yes
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.
MSSP: Yes (MSSP)
GMCP: No
MSDP: No
MCCP: Yes (MSSP)
MCCP2: No
MXP: Yes (MSSP)
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 17 other servers.
Options requested from client: NAWS, TTYPE
Data source: e6a428c13bbcd7f5/1a8c809f049eeba2.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "e6a428c13bbcd7f5",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"CHARSET",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": [
"NAWS",
"TTYPE"
]
},
"session_data": {
"banner_after_return": "",
"banner_before_return": " ___ _ _ \n\r |_ _| |__ ___ _ __(_) __ _ \n\r | || '_ \\ / _ \\ '__| |/ _` |\n\r | || |_) | __/ | | | (_| |\n\r |___|_.__/ \\___|_| |_|\\__,_|\n\r\n\r Iberia is running in Iberia MUD Engine (IME) v1.0.250815\n\r Type \"credits\" for copyright and creation details.\n\r\n\r Player activity in the last 7 days: 14m 27s.\n\r 9 logins since last reboot on 28JAN26 05:30 (GMT).\n\r\n\r\"Let your plans be dark and impenetrable as night, and when you move, fall \n\rlike a thunderbolt.\" - Sun Tzu, Art of War\n\r\n\r'connect [name] [password]' connects you to an existing character.\n\r'create [name] [password] [re-type password]' creates a new character.\n\r\u001b[0m\n\r>\u001b[0m\n\r\r\n",
"encoding": "ascii",
"mssp": {
"ANSI": "1",
"AREAS": "13",
"CLASSES": "0",
"CODEBASE": "IME v1.0.250815",
"CONTACT": "joaodiasafonso@gmail.com",
"CRAWL DELAY": "-1",
"CREATED": "2006",
"FAMILY": "Custom",
"GAMEPLAY": "Hack and Slash,Adventure,Player versus Environment,Roleplaying,Strategy",
"GAMESYSTEM": "Custom",
"GENRE": "Historical",
"HELPFILES": "173",
"HIRING BUILDERS": "0",
"HIRING CODERS": "0",
"HOSTNAME": "iberia.jdai.pt",
"ICON": "https://iberia.jdai.pt/images/IME_LOGO.jpg",
"INTERMUD": [
"Grapevine",
"I3"
],
"IP": "",
"LANGUAGE": "English",
"LEVELS": "0",
"LOCATION": "Portugal",
"MCCP": "1",
"MCP": "0",
"MINIMUM AGE": "0",
"MOBILES": "5516",
"MSP": "0",
"MXP": "1",
"NAME": "Iberia",
"OBJECTS": "457",
"PAY FOR PERKS": "0",
"PAY TO PLAY": "0",
"PLAYERS": "0",
"PORT": "5900",
"PUEBLO": "0",
"RACES": "8",
"ROOMS": "12636",
"SKILLS": "23",
"SSL": "1",
"STATUS": "Live",
"SUBGENRE": "Classical fantasy",
"UPTIME": "1769578233",
"VT100": "0",
"WEBSITE": "https://iberia.jdai.pt/",
"XTERM 256 COLORS": "0"
},
"option_states": {
"server_offered": {
"0x56": false,
"0x5a": false,
"0x5b": false,
"MSSP": true
},
"server_requested": {
"NAWS": true,
"TTYPE": true
}
},
"timing": {
"probe": 0.5080575942993164,
"total": 4.013002634048462
}
}
},
"sessions": [
{
"connected": "2026-02-08T06:25:56.203182+00:00",
"host": "iberia.jdai.pt",
"ip": "95.95.134.25",
"port": 5900
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=iberia.jdai.pt port=5899
INFO client_base.py:174 Connected to <Peer 95.95.134.25 5899>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 95.95.134.25 5899>
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug iberia.jdai.pt 5900