104.196.148.77 (arkadiamud.com.br)

arkadiamud.com.br:2442

Connection Banner:

Conectando... ::: ::::::::: ::: ::: ::: ::::::::: ::::::::::: ::: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: :+: +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +​#++:+​+#++: +​#++:++#: +​#++:++ +​#++:+​+#++: +#+ +:+ +#+ +​#++:+​+#++: +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# #+# ### ### ### ### ### ### ### ### #​######## #​########## ### ### _​----\| _ _ _ _ _ -​---\|_​----\| ]-I-I-I-[ _ _ _ _ _ _ _​----\| \| -​---\| \\ \` ' / ]-I-I-I-I-[ -​---\| \| \| \|. \` \| \\ \` '_/ \| / \\ \| \| /^\\\| [] \`__\| ^ / ^ \\ ^ \| \|\*\|\| \|__ ,\| / \\ / ^ ^\`\\ / \\ \| ===\| ___\| ___ ,\|__ / ^ /=​_=_=_=\\ ^ \\ \|, \`_\| I_I__I_I__I_I (=​===(_​________)_​^___\|_​___\|_​___ \\-\\--\|-\|--/-/ \| I [ ]__I I_I__\|_​___I_I_\| \|[] \` '\|_ \|_ _\|\`__ ._[ _-\\--\|-\|--/-/ / \\ [] \` .\| \|-\| \|-\| \|_\| \|_\| \|_\| \| [] [] \| <===> .\|-​=-=-=-=-=-=-=-=-=-=-\| / \\ ] []\|\` \` [] \| . _​________ . \|- <===> <===> \` ' \|\|\|\| \| \| \|\|\| \| [] <===> \\_/ -- \|\|\|\| \| \| \|\|\| \| . ' \\_/ ./\|' . . . .\|\|\|\|\|/\|_​______\|\\\|\|\|\| /\|. . . . .\|\\_ -​---------------------------------------------------- Baseado no CircleMUD, Criado por Jeremy Elson Derivado do DikuMUD (GAMMA 0.0), criado por Hans-Henrik Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert, e Sebastian Hammer. Nosso endereco: arkadiamud.com.br porta: 2442 Digite "Novo" para criar um personagem. Por qual nome voce deseja ser conhecido? Nome invalido, tente outro. Nome:

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 320 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Nome invalido, tente outro.\r\nNome: ",
      "banner_before_return": "\r\nConectando...\r\n\r\n\u001b[1;37m    :::     :::::::::  :::    :::     :::     :::::::::  :::::::::::     :::\r\n\u001b[1;37m  :+: :+:   :+:    :+: :+:   :+:    :+: :+:   :+:    :+:     :+:       :+: :+:\r\n\u001b[1;37m +:+   +:+  +:+    +:+ +:+  +:+    +:+   +:+  +:+    +:+     +:+      +:+   +:+\r\n\u001b[1;37m+#++:++#++: +#++:++#:  +#++:++    +#++:++#++: +#+    +:+     +#+     +#++:++#++:\r\n\u001b[1;37m+#+     +#+ +#+    +#+ +#+  +#+   +#+     +#+ +#+    +#+     +#+     +#+     +#+\r\n\u001b[1;37m#+#     #+# #+#    #+# #+#   #+#  #+#     #+# #+#    #+#     #+#     #+#     #+#\r\n\u001b[1;37m###     ### ###    ### ###    ### ###     ### #########  ########### ###     ###\r\n                                    \u001b[0;32m_----\u001b[0m|         _ _ _ _ _\r\n                                     \u001b[0;32m----\u001b[0m|\u001b[0;32m_----\u001b[0m|   ]-I-I-I-[\r\n                 _ _ _ _ _ _ \u001b[0;32m_----\u001b[0m|      | \u001b[0;32m----\u001b[0m|   \\ `  ' /\r\n                 ]-I-I-I-I-[  \u001b[0;32m----\u001b[0m|      |     |    |. ` |\r\n                  \\ `   '_/       |     / \\    |    | /^\\|\r\n                   []  `__|       ^    / ^ \\   ^    | |*||\r\n                   |__   ,|      / \\  / ^ ^`\\ / \\   | ===|\r\n                ___| ___ ,|__   / ^  /=_=_=_=\\ ^ \\  |, `_|\r\n                I_I__I_I__I_I  (====(_________)_^___|____|____\r\n                \\-\\--|-|--/-/  |     I  [ ]__I I_I__|____I_I_|\r\n                 |[] `    '|_  |_   _|`__  ._[  _-\\--|-|--/-/\r\n                / \\  [] ` .| |-| |-| |_| |_| |_| | []   [] |\r\n               <===>      .|-=-=-=-=-=-=-=-=-=-=-|        / \\\r\n               ] []|` ` [] | .   _________   .   |-      <===>\r\n               <===>  `  ' ||||  |       |  |||  |  []   <===>\r\n                \\_/     -- ||||  |       |  |||  | .  '   \\_/\r\n               ./|' . . . .|||||/|_______|\\|||| /|. . . . .|\\_\r\n             -----------------------------------------------------\r\n\u001b[0m                             Baseado no CircleMUD,\r\n\u001b[0m                             Criado por Jeremy Elson\r\n\r\n                       Derivado do DikuMUD (GAMMA 0.0),\r\n                 criado por Hans-Henrik Staerfeldt, Katja Nyboe,\r\n                Tom Madsen, Michael Seifert, e Sebastian Hammer.\r\n\r\n                \u001b[1;37mNosso endereco: \u001b[0;36markadiamud.com.br \u001b[1;37mporta: \u001b[0;36m2442\u001b[0m\r\n\r\n                   Digite \"\u001b[1;37mNovo\u001b[0m\" para criar um personagem.\r\n\r\nPor qual nome voce deseja ser conhecido? ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.505239725112915,
        "total": 11.178817510604858
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:03:49.176863+00:00",
      "host": "arkadiamud.com.br",
      "ip": "104.196.148.77",
      "port": 2442
    },
    {
      "connected": "2026-04-07T07:19:21.608829+00:00",
      "host": "arkadiamud.com.br",
      "ip": "104.196.148.77",
      "port": 2442
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug arkadiamud.com.br 2442
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=arkadiamud.com.br port=2442
INFO client_base.py:190 Connected to <Peer 104.196.148.77 2442>
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL ZMP, WILL ATCP, WILL AARDWOLF, WILL MXP, WILL MSP, WILL MCCP2_COMPRESS, WILL MSDP,
    WILL MSSP, WILL GMCP, WILL MCCP3_COMPRESS, DO ZMP, DO ATCP, DO AARDWOLF, DO MXP, DO MSP, DO MCCP2_COMPRESS, DO MSDP, DO MSSP,
    DO GMCP, DO MCCP3_COMPRESS'
DEBUG stream_writer.py:3384 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1024 send IAC DO BINARY
DEBUG stream_writer.py:3384 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1024 send IAC DO SGA
DEBUG stream_writer.py:3384 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1024 send IAC DO ECHO
DEBUG stream_writer.py:3384 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1024 send IAC DO STATUS
DEBUG stream_writer.py:3384 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1024 send IAC DO CHARSET
DEBUG stream_writer.py:3384 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1024 send IAC DO EOR
DEBUG stream_writer.py:3384 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1024 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:998 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:998 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:998 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:998 skip DO MSP; pending_option = True
DEBUG stream_writer.py:998 skip DO MXP; pending_option = True
DEBUG stream_writer.py:998 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:998 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:998 skip DO ATCP; pending_option = True
DEBUG fingerprinting.py:849 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:122 Connection closed to <Peer 104.196.148.77 2442>

VitaliaMUD Reborn (vitaliamud.com.br:8242)

Connection Banner:

Tentando identificar o cliente. Aguarde... [Cliente] xterm-256color \| [Cores] 256 \| [MXP] Sim \| [MSDP] Sim \| [ATCP] Sim d888b 88b d88 88 88 d8' \`8b 888bd888 88 88 88 88 88\`88'88 88 88 88,d8b d88b88 d888b d88b88 d888b 88 88 88 88 88 88 88' 88 d8 88 d8' '8b d8 88 d8 ,d8' 88, .88 88 88 88, .88 88 88 88, ,88 88, ,88 88, ,88 88o8' \`888' 88 88 \`88'88 88 88 '888'8 '888' '888'8 '8888 .v~ .(W ';;' ';' ,, , ,;; ';; ,, /<M. ;; ,' '' ,; '' ;; '' \\~b_​_________/$\|\\-​-------;; ,' ';; ';;'' .,'';. ;; ';; .,'';.​-------. >i)$$$$$$$$($( )#H>=​=====';, ,' ;; ;; '' ,;; ;; ;; '' ,;;=​==-----> /_p~​~~~~~~~~~\\$\|/-​--------';;; ;; ;; .,' ;; ;; ;; .,' ;;-​------' \\<M\` ; ,;;, ';,' ';,';;.',;;, ,;;, ';,';;.' \`(B \`?_ Baseado no CircleMUD 3.0, criado por Jeremy Elson; Derivado do DikuMUD (GAMMA 0.0), criado por Hans-Henrik Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert e Sebastian Hammer. Personagem:

Server URLs

Server Info

  • Codebase: tbaMUD

  • Genre: Fantasy

  • Gameplay: Hack and Slash

  • Players online: 0 [1]

  • Uptime: 11 days

  • Status: Alpha

  • Server Location: 🇺🇸 United States (GeoIP)

  • Language: Portuguese

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation.

  • MSSP: Yes (MSSP)

  • GMCP: Yes (MSSP)

  • MSDP: Yes (MSSP)

  • MCCP: Yes (MSSP)

  • MCCP2: Negotiated

  • MXP: Yes (MSSP)

  • MSP: Yes (MSSP)

  • MCP: No

  • ZMP: No

Telnet Fingerprint

f44e1953e55cd589

This fingerprint is unique to this server.

Options offered by server: GMCP, MCCP2, MCCP3, MSDP, MSP, MSSP

Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "f44e1953e55cd589",
    "fingerprint-data": {
      "offered-options": [
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "ATCP",
        "CHARSET",
        "MXP",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "atcp": [
        {
          "package": "MSDP.SERVER_ID",
          "value": "VitaliaMUD Reborn"
        }
      ],
      "banner_after_return": "",
      "banner_before_return": "\r\nTentando identificar o cliente. Aguarde...\r\n\u001b[7z\u001b[7z\r\n\u001b[H\u001b[J\u001b[38;5;214m[\u001b[38;5;208mCliente\u001b[38;5;214m] \u001b[38;5;145mxterm-256color\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mCores\u001b[38;5;214m] \u001b[38;5;145m256\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMXP\u001b[38;5;214m] \u001b[38;5;145mSim\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMSDP\u001b[38;5;214m] \u001b[38;5;145mSim\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mATCP\u001b[38;5;214m] \u001b[38;5;145mSim\u001b[0;00m\r\n\r\n\u001b[38;5;028m      d888b     88b  d88                      88                 88\r\n\u001b[38;5;028m     d8' `8b    888bd888                      88                 88\r\n\u001b[38;5;028m     88   88    88`88'88 88   88 88,d8b   d88b88  d888b      d88b88  d888b\r\n\u001b[38;5;028m     88   88    88    88 88   88 88'  88 d8   88 d8' '8b    d8   88 d8 ,d8'\r\n\u001b[38;5;028m     88, .88    88    88 88, .88 88   88 88, ,88 88, ,88    88, ,88 88o8'\r\n\u001b[38;5;028m      `888'     88    88  `88'88 88   88  '888'8  '888'      '888'8  '8888\r\n\u001b[38;5;088m                .v~\r\n\u001b[38;5;088m               .(W       \u001b[38;5;033m';;'    ';' ,,   ,      ,;;  ';;   ,,\r\n\u001b[38;5;088m               /<M.       \u001b[38;5;033m;;     ,'  ''  ,;      ''    ;;   ''\r\n\u001b[38;5;088m\\~b__________/$|\\\u001b[38;5;145m--------\u001b[38;5;033m;; ,'  ';; ';;'' .,'';.   ;;  ';;  .,'';.\u001b[38;5;145m-------.\r\n\u001b[38;5;088m>i\u001b[38;5;142m)$$$$$$$$(\u001b[38;5;088m$\u001b[38;5;231m( )\u001b[38;5;088m#H\u001b[38;5;231m>======\u001b[38;5;033m';, ,'    ;;  ;;   '' ,;;   ;;   ;;  '' ,;;\u001b[38;5;231m===----->\r\n\u001b[38;5;088m /_p~~~~~~~~~~\\$|/\u001b[38;5;145m---------\u001b[38;5;033m';;;     ;;  ;;   .,' ;;   ;;   ;;  .,' ;;\u001b[38;5;145m-------'\r\n\u001b[38;5;088m               \\<M`           \u001b[38;5;033m;     ,;;, ';,' ';,';;.',;;, ,;;, ';,';;.'\r\n\u001b[38;5;088m                `(B\r\n\u001b[38;5;088m                  `?_\u001b[38;5;142m        Baseado no CircleMUD 3.0, criado por Jeremy Elson;\r\n\u001b[38;5;142m                                    Derivado do DikuMUD (GAMMA 0.0), criado por\r\n\u001b[38;5;142m                               Hans-Henrik Staerfeldt, Katja Nyboe, Tom Madsen,\r\n\u001b[38;5;142m                                            Michael Seifert e Sebastian Hammer.\r\n\r\n\u001b[38;5;231mPersonagem:",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "mssp": {
        "ANSI": "1",
        "ATCP": "1",
        "CODEBASE": "tbaMUD",
        "CRAWL DELAY": "-1",
        "FAMILY": "CircleMUD",
        "GAMEPLAY": "Hack and Slash",
        "GAMESYSTEM": "Custom",
        "GENRE": "Fantasy",
        "GMCP": "1",
        "LANGUAGE": "Portuguese",
        "MCCP": "1",
        "MCP": "0",
        "MSDP": "1",
        "MSP": "1",
        "MXP": "1",
        "NAME": "VitaliaMUD Reborn",
        "PLAYERS": "0",
        "PUEBLO": "0",
        "SSL": "0",
        "STATUS": "Alpha",
        "UPTIME": "1774571273",
        "UTF-8": "1",
        "VT100": "0",
        "XTERM 256 COLORS": "1"
      },
      "mxp": [
        "activated",
        "activated"
      ],
      "option_states": {
        "server_offered": {
          "GMCP": true,
          "MCCP2": true,
          "MCCP3": true,
          "MSDP": true,
          "MSP": true,
          "MSSP": true
        },
        "server_requested": {
          "ATCP": true,
          "CHARSET": true,
          "MXP": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5039083957672119,
        "total": 11.017640352249146
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:02:10.335371+00:00",
      "host": "vitaliamud.com.br",
      "ip": "104.196.148.77",
      "port": 8242
    },
    {
      "connected": "2026-04-07T06:50:36.997369+00:00",
      "host": "vitaliamud.com.br",
      "ip": "104.196.148.77",
      "port": 8242
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug vitaliamud.com.br 8242
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=vitaliamud.com.br port=8242
INFO client_base.py:190 Connected to <Peer 104.196.148.77 8242>
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:773 recv IAC DO TTYPE
DEBUG stream_writer.py:1887 handle_do(TTYPE)
DEBUG stream_writer.py:3384 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:1024 send IAC WILL TTYPE
DEBUG stream_writer.py:3384 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3384 local_option[TTYPE] = True
DEBUG stream_writer.py:3384 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:767 begin sub-negotiation SB ATCP
DEBUG stream_writer.py:754 sub-negotiation cmd ATCP SE completion byte
DEBUG stream_writer.py:2238 [SB + ATCP] unsolicited
DEBUG stream_writer.py:1820 ATCP: MSDP.SERVER_ID 'VitaliaMUD Reborn'
DEBUG stream_writer.py:767 begin sub-negotiation SB MXP
DEBUG stream_writer.py:754 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:2238 [SB + MXP] unsolicited
DEBUG stream_writer.py:1805 MXP: b''
DEBUG stream_writer.py:767 begin sub-negotiation SB MXP
DEBUG stream_writer.py:754 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:2238 [SB + MXP] unsolicited
DEBUG stream_writer.py:1805 MXP: b''
DEBUG stream_writer.py:767 begin sub-negotiation SB GMCP
DEBUG stream_writer.py:754 sub-negotiation cmd GMCP SE completion byte
DEBUG stream_writer.py:2238 [SB + GMCP] unsolicited
DEBUG client.py:210 GMCP: Core.Hello {'client': 'VitaliaMUD Reborn', 'version': '1.0'}
DEBUG stream_writer.py:767 begin sub-negotiation SB GMCP
DEBUG stream_writer.py:754 sub-negotiation cmd GMCP SE completion byte
DEBUG stream_writer.py:2238 [SB + GMCP] unsolicited
DEBUG client.py:210 GMCP: Core.Supports.Set ['Char 1', 'Char.Items 1', 'Char.Skills 1', 'Room 1', 'Comm.Channel 1']
DEBUG stream_writer.py:767 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:754 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2238 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1792 MSDP: {'SERVER_ID': 'VitaliaMUD Reborn'}
DEBUG stream_writer.py:767 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:754 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2238 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1796 MSSP: {'NAME': 'VitaliaMUD Reborn', 'PLAYERS': '0', 'UPTIME': '1774571273', 'CRAWL DELAY': '-1',
    'CODEBASE': 'tbaMUD', 'LANGUAGE': 'Portuguese', 'FAMILY': 'CircleMUD', 'GENRE': 'Fantasy', 'GAMEPLAY': 'Hack and Slash',
    'STATUS': 'Alpha', 'GAMESYSTEM': 'Custom', 'ANSI': '1', 'GMCP': '1', 'MCCP': '1', 'MCP': '0', 'MSDP': '1', 'MSP': '1', 'MXP':
    '1', 'PUEBLO': '0', 'UTF-8': '1', 'VT100': '0', 'XTERM 256 COLORS': '1', 'ATCP': '1', 'SSL': '0'}
DEBUG stream_writer.py:767 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:754 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3384 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2404 recv TTYPE SEND: b''
DEBUG stream_writer.py:2416 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:773 recv IAC DO NAWS
DEBUG stream_writer.py:1887 handle_do(NAWS)
DEBUG stream_writer.py:3384 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:1024 send IAC WILL NAWS
DEBUG stream_writer.py:2507 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3384 local_option[NAWS] = True
DEBUG stream_writer.py:3384 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:773 recv IAC DO CHARSET
DEBUG stream_writer.py:1887 handle_do(CHARSET)
DEBUG stream_writer.py:3384 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:1024 send IAC WILL CHARSET
DEBUG stream_writer.py:3384 local_option[CHARSET] = True
DEBUG stream_writer.py:3384 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL GMCP
DEBUG stream_writer.py:2045 handle_will(GMCP)
DEBUG stream_writer.py:998 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[GMCP] = True
DEBUG stream_writer.py:1072 send IAC SB GMCP Core.Hello IAC SE
DEBUG stream_writer.py:1072 send IAC SB GMCP Core.Supports.Set IAC SE
INFO client.py:201 GMCP handshake: Core.Hello + Core.Supports.Set ['Char 1', 'Char.Vitals 1', 'Char.Items 1', 'Room 1', 'Room.Info
    1', 'Comm 1', 'Comm.Channel 1', 'Group 1']
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:773 recv IAC WILL MSSP
DEBUG stream_writer.py:2045 handle_will(MSSP)
DEBUG stream_writer.py:998 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSSP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:773 recv IAC DO ATCP
DEBUG stream_writer.py:1887 handle_do(ATCP)
DEBUG stream_writer.py:998 skip WILL ATCP; pending_option = True
DEBUG stream_writer.py:3384 local_option[ATCP] = True
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:773 recv IAC WILL MSP
DEBUG stream_writer.py:2045 handle_will(MSP)
DEBUG stream_writer.py:998 skip DO MSP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = False
DEBUG stream_writer.py:773 recv IAC DO MXP
DEBUG stream_writer.py:1887 handle_do(MXP)
DEBUG stream_writer.py:998 skip WILL MXP; pending_option = True
DEBUG stream_writer.py:3384 local_option[MXP] = True
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP3_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP3_COMPRESS] = True
DEBUG stream_writer.py:2110 MCCP3: client compression activated
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = False
DEBUG client_base.py:510 MCCP3 compression started (client→server)
DEBUG stream_writer.py:767 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:754 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2238 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2404 recv TTYPE SEND: b''
DEBUG stream_writer.py:2416 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:767 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:754 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2238 [SB + CHARSET] unsolicited
DEBUG client.py:376 encoding negotiated: UTF-8
DEBUG stream_writer.py:2321 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL AARDWOLF, WILL MCCP3_COMPRESS, WILL MSP, WILL GMCP, WILL MSDP, WILL MCCP2_COMPRESS,
    WILL MSSP, WILL ZMP, DO AARDWOLF, DO ATCP, DO MXP, DO ZMP'
DEBUG stream_writer.py:3384 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1024 send IAC DO BINARY
DEBUG stream_writer.py:3384 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1024 send IAC DO SGA
DEBUG stream_writer.py:3384 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1024 send IAC DO ECHO
DEBUG stream_writer.py:3384 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1024 send IAC DO STATUS
DEBUG stream_writer.py:3384 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1024 send IAC DO CHARSET
DEBUG stream_writer.py:3384 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1024 send IAC DO EOR
DEBUG stream_writer.py:3384 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1024 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:998 skip DO MXP; pending_option = True
DEBUG stream_writer.py:998 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:998 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:998 skip DO ATCP; pending_option = True
DEBUG fingerprinting.py:849 connection for server fingerprint f44e1953e55cd589
INFO client_base.py:122 Connection closed to <Peer 104.196.148.77 8242>