ifmud.port4000.com

Connection Banner:

\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* \*\* \*\* \*\* Welcome to ifMUD! \*\* \*\* \*\* \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* FAQ: http://www.allthingsjacq.com/ifMUDfaq/ IP: 66.114.68.227 MONKEY: Ook. If you... have an account Type "connect name password" to log in need an account Go to http://ifmud.port4000.com:4001/ and apply are just visiting Type "connect guest guest" to login as Guest want to see who's on Type "who" for a list of players online have problems Login as Guest, type "lounge", and ask for a wizard or type "wizards my problem is .​.." to leave a message (include your email address if you want a reply) TYPE connect, who, or quit:

Server URLs

Server Info

  • Server Location: πŸ‡ΊπŸ‡Έ United States (GeoIP)

Telnet Fingerprint

a8a260cc4662430c

This fingerprint is shared by 219 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "a8a260cc4662430c",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "************************************************************************\r\n**                                                                    **\r\n**                          Welcome to ifMUD!                         **\r\n**                                                                    **\r\n************************************************************************\r\n\r\n    FAQ:        http://www.allthingsjacq.com/ifMUDfaq/\r\n    IP:\t\t66.114.68.227\r\n    MONKEY:     Ook.\r\n\r\nIf you...\r\n  have an account       Type \"connect name password\" to log in\r\n  need an account       Go to http://ifmud.port4000.com:4001/ and apply\r\n  are just visiting     Type \"connect guest guest\" to login as Guest\r\n  want to see who's on  Type \"who\" for a list of players online\r\n  have problems         Login as Guest, type \"lounge\", and ask for a wizard\r\n                        or type \"wizards my problem is ...\" to leave a message\r\n                        (include your email address if you want a reply)\r\n\r\nTYPE connect, who, or quit:\r\n",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5111849308013916,
        "total": 5.01856803894043
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:11:31.304057+00:00",
      "host": "ifmud.port4000.com",
      "ip": "173.255.227.103",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug ifmud.port4000.com 4000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=ifmud.port4000.com port=4000
INFO client_base.py:175 Connected to <Peer 173.255.227.103 4000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 173.255.227.103 4000>