imperium.genesismuds.com
@@@@@@@@@@@
@@@@@@@@@@@
@@@
@@@ @@@@ @@@@ @ @@@ @@
@@@ @@@ @@@ @@ @@ @@ @@ @@ @@ @@ @@
@@@ @@ @@ @@ @@ @@ @@@@@@ @@ @@ @@ @@ @@@ @@@
@@@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@
@@@ @@ @@ @@ @@@@@ @@@@ @@ @@ @@ @@ @@ @@ @@
@@@ @@ @@ @@ @@ @@ @@@@ @@ @@ @@
@@@@@@@@@@@ @@ @@ @@ @@ v2.1
@@@@@@@@@@@ @@
A variation of DikuMUD I (gamma0.0)
created by: Hans Henrik Staerfeldt,
Katja Nyboe, Tom Madsen, Michael
Siefert, and Sebastian Hammer
Questions and comments can be sent gregmilford@gmail.com
Visit the Imperium webpage at http://imperium.genesismuds.com Enjoy!!
By what name do you wish to be known?imperium.genesismuds.com:40000
Telnet Fingerprint
This fingerprint is shared by 2 other servers.
Options requested from client: NAWS
Data source: 4c3054f2191e9619/9547c0b5f3d70943.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "4c3054f2191e9619",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"NAWS"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\n\r\n @@@@@@@@@@@\r\n @@@@@@@@@@@\r\n @@@\r\n @@@ @@@@ @@@@ @ @@@ @@\r\n @@@ @@@ @@@ @@ @@ @@ @@ @@ @@ @@ @@\r\n @@@ @@ @@ @@ @@ @@ @@@@@@ @@ @@ @@ @@ @@@ @@@\r\n @@@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@ @@\r\n @@@ @@ @@ @@ @@@@@ @@@@ @@ @@ @@ @@ @@ @@ @@\r\n @@@ @@ @@ @@ @@ @@ @@@@ @@ @@ @@ \r\n @@@@@@@@@@@ @@ @@ @@ @@ v2.1\r\n @@@@@@@@@@@ @@ \r\n A variation of DikuMUD I (gamma0.0)\r\n created by: Hans Henrik Staerfeldt,\r\n Katja Nyboe, Tom Madsen, Michael\r\n Siefert, and Sebastian Hammer\r\n\r\n\r\nQuestions and comments can be sent gregmilford@gmail.com\r\nVisit the Imperium webpage at http://imperium.genesismuds.com Enjoy!!\r\n\r\n\r\nBy what name do you wish to be known? ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": false
},
"server_requested": {
"NAWS": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.7333850860595703
}
}
},
"sessions": [
{
"connected": "2026-02-08T16:22:14.573339+00:00",
"host": "imperium.genesismuds.com",
"ip": "216.136.9.5",
"port": 40000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:773 Fingerprint client: host=imperium.genesismuds.com port=40000
INFO client_base.py:174 Connected to <Peer 216.136.9.5 40000>
DEBUG stream_writer.py:655 recv IAC DO NAWS
DEBUG stream_writer.py:1668 handle_do(NAWS)
DEBUG stream_writer.py:2883 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:896 send IAC WILL NAWS
DEBUG stream_writer.py:2208 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:2883 local_option[NAWS] = True
DEBUG stream_writer.py:2883 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:655 recv IAC WONT ECHO
DEBUG stream_writer.py:1899 handle_wont(ECHO)
DEBUG stream_writer.py:2883 remote_option[ECHO] = False
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 216.136.9.5 40000>
INFO fingerprinting.py:736 connection for server fingerprint 4c3054f2191e9619
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug imperium.genesismuds.com 40000