104.131.109.59 (muck.narniamuck.org)
muck.narniamuck.org:2050
Connection Banner:
Server URLs
- Telnet: telnet://muck.narniamuck.org:2050
- Website: http://www.narniamuck.org
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 219 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-\u001b[0;37m ,\u001b[1;33mMMMMMMMMA\u001b[0;37m.\u001b[0m\r\n\u001b[0;37m \u001b[1;33m,M;' `YV'\u001b[0m\r\n\u001b[0;37m \u001b[0;36mWELCOME TO\u001b[0;37m \u001b[1;33mAM' ,OMA,\u001b[0m\r\n\u001b[0;37m \u001b[1;33mAM| `~VMM,. .,ama,____,amma,..\u001b[0m\r\n\u001b[0;37m \u001b[0;36mN A R N I A\u001b[0;37m \u001b[1;33mMML )MMMD .AMMMMMMMMMMMMMMMMMMD.\u001b[0m\r\n\u001b[0;37m \u001b[0;36mM U C K\u001b[0;37m \u001b[1;33mVMMM .AMMY' ,AMMMMMMMMMMMMMMMMMMMMD\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`VMM, AMMMV' ,AMMMMMMMMMMMMMMMMMMMMMMM, ,\u001b[0m\r\n\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-\u001b[0;37m \u001b[1;33mVMMMmMMV' ,AMY~~'' 'MMMMMMMMMMMM' '~~ ,aMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`YMMMM' AMM' `VMMMMMMMMP'_ A,aMMMM\u001b[0m\r\n\u001b[0;36mTo connect, type:\u001b[0;37m \u001b[1;33mAMMM' VMMA. YVmmmMMMMMMMMMMML MmmmY MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m,AMMA _,HMMMMmdMMMMMMMMMMMMMMMML`VMV' ,MMMMMMM\u001b[0m\r\n\u001b[0;36m'\u001b[1;32mconn guest guest\u001b[0;36m' \u001b[1;33mAMMMA _'MMMMMMMMMMMMMMMMMMMMMMMMMMA `' MMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mto connect as \u001b[0;37m \u001b[1;33m,AMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMa ,,, `MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36ma guest character.\u001b[0;37m \u001b[1;33mAMMMMMMMMM'~`YMMMMMMMMMMMMMMMMMMMMMMA ,AMMV MMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33mVMV MMMMMV `YMMMMMMMMMMMMMMMMMMMMMY `VMMY' adMMMMMMM\u001b[0m\r\n\u001b[0;36m'\u001b[1;32mconn name password\u001b[0;36m' \u001b[1;33m`V MMMM' `YMMMMMMMV.~~~~~~~~~,aado,`V'' MMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mto connect to an\u001b[0;37m \u001b[1;33maMMMMmv `YMMMMMMMm, ,/AMMMMMA, YMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36mexisting character.\u001b[0;37m \u001b[1;33mVMMMMM,,v YMMMMMMMMMo oMMMMMMMMM' a, YMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m`YMMMMMY' `YMMMMMMMY' `YMMMMMMMY MMmMMMMMMMM\u001b[0m\r\n\u001b[0;36mYou can also type\u001b[0;37m \u001b[1;33mAMMMMM , ~~~~~,aooooa,~~~~~~ MMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36m'HELP' for more\u001b[0;37m \u001b[1;33mYMMMb,d' dMMMMMMMMMMMMMD, a,, AMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;36minformation.\u001b[0;37m \u001b[1;33mYMMMMM, A YMMMMMMMMMMMMMY ,MMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[1;33m AMMMMMMMMM `~~~~' `~~~~' AMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;37m \u001b[0;35m-*-*-*-*-*-*-*-*-*-\u001b[0;37m \u001b[1;33m`VMMMMMM' ,A, ,,AMMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[0;36mFind us on the Web at:\u001b[0;37m \u001b[1;33m MMMMMMMMMMA, ,aAMMMMMMMMMMMMMMMMMMMMMMMMM\u001b[0m\r\n\u001b[1;32mhttp://www.narniamuck.org\u001b[0;37m \u001b[1;33m MMMMMMMMMMMA, AMMMMMMMMMMMMMMMMMMMMMMMM-GGN\u001b[0m\r\n\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.506972074508667,
"total": 5.022329092025757
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:17.527051+00:00",
"host": "muck.narniamuck.org",
"ip": "104.131.109.59",
"port": 2050
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug muck.narniamuck.org 2050
Show Logfile
DEBUG client.py:965 Fingerprint client: host=muck.narniamuck.org port=2050
INFO client_base.py:175 Connected to <Peer 104.131.109.59 2050>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 104.131.109.59 2050>
muck.universitymuck.org:2052
Connection Banner:
Server URLs
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 219 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": " WELCOME TO THE HALLOWED HALLS OF\r\n ______________________________________________________________________\r\n(______________________________________________________________________@\r\n | |\r\n | WWWWWW WWWWWW WWWWW WWWWW WWWWWW WWWWW WWWWW |\r\n | W::W W::W W:W W:W W::::::W W:W W:W |\r\n | W:::W W:::W W:W W:W W:WWWW:W W:W W:W |\r\n | W:W::W W::W:W W:W W:W W:W W:W W:W W:W |\r\n | W:WW::W::WW:W W:W W:W W:W WWW W:WW:W |\r\n | W:W W:::W W:W W:W W:W W:W W:::W |\r\n | W:W W:W W:W W:W W:W W:W WWW W:WW:W |\r\n | W:W W W:W W:W W:W W:W W:W W:W W:W |\r\n | W:W W:W W::WWWW::W W:WWWW:W W:W W:W |\r\n | W:W W:W W::::::W W::::::W W:W W:W |\r\n | WWWWW WWWWW WWWWWW WWWWWW WWWWW WWWWW |\r\n | |\r\n | U N I V E R S I T Y |\r\n |_____________________________________________________________________|\r\n (______________________________________________________________________@\r\n \r\n To connect to a guest character, type 'connect guest guest'\r\n To connect to an existing character, type 'connect <name> <password>\r\n Type 'WHO' to see who is logged in, and 'Help' for more information.\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5033807754516602,
"total": 5.010035991668701
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:25.566252+00:00",
"host": "muck.universitymuck.org",
"ip": "104.131.109.59",
"port": 2052
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug muck.universitymuck.org 2052
Show Logfile
DEBUG client.py:965 Fingerprint client: host=muck.universitymuck.org port=2052
INFO client_base.py:175 Connected to <Peer 104.131.109.59 2052>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 104.131.109.59 2052>