138.197.193.89 (moo.squidsoft.net)
moo.squidsoft.net:4444
Connection Banner:
Server URLs
- Telnet: telnet://moo.squidsoft.net:4444
- Website: wc.xm
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 219 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nPassword: \r\n",
"banner_before_return": " . __,.\r\n ._wawwaas.___s_>+~. ..ss,_3WWQa,\r\n _%*C{xiwwwa%ii%xs=|^- _, _a}^-- -~\"\"`\r\n .<wmDYl>)VYT?T?YSass;x}\"~ . .a7\"\r\n <wa _aa. x71awBWmzYT$mwaa,_ _a!`\r\n :###m, <WP4hxgmw%SpV?~.... .-\"??9Ydowuaii\"` _a7\"\r\n jWXBmWqa,_ .__s%w%V#U1mBBBWwc.xmZTT?^\"?*i,_,._..___ss%)?^\r\n .jWWZZX#mXWWmmwwa>iImmBWWm#xXmwm#YXWmmB#qwa, ..--^^^^~-\r\n sawWmWmmGmBBm###mmWmWmz3mBmmWmmXmmmmmmmWmmdU$BQL\r\n ##UXVVAXqBBBE<mmmmm#BBm%*?$BmW#m#WmWmmWmWBW#mmBE\r\n \"!9mmBmWmWmwmWmmm#mBBBmgaiXWm#dmBBmWmWmB##m#BW(\r\n \"VVVXw2?V#VY?!!\"?!???T()mWS#TXT$mWmB#m#TTo,. ._s,s>isiss,,\r\n ]WmWBD\"` ~\"{WP4p$#B#Z5a,\"?VVX11:?!~.._____. -\"?5a,.\r\n -$Wm? -$mWf-?!S|$mWga,___,_awwZITY??!\"!\"\"=. \"?a,\r\n -\"` - )AwuTYU#W#U()?^- _,_,. \"1c\r\n ~xY$#mqwgzxmmYVSI+>\"?!+=, -?a,\r\n \"!swwXeswawa%;_x%!~. .- \"!ias,_3mgwa,,\r\n ~\"-~\"~ -^^:, ~--{m#Y\"-\r\n\r\n\r\n ------=== Welcome to JesusMOO ===------\r\n\r\n\r\nThe last server reset was at Mon Sep 26 03:35:02 2022 UTC\r\n\r\nContact us via email at: squidmoo@squidsoft.net\r\n\r\nPlease log in now.\r\n\r\nSquidsoft.net Account Maintenance: http://account.squidsoft.net/\r\n\r\nIf you do not yet have a Squidsoft.net account, visit the above web address.\r\n\r\nAccount ID:\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.504544734954834,
"total": 5.2940638065338135
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:29.781445+00:00",
"host": "moo.squidsoft.net",
"ip": "138.197.193.89",
"port": 4444
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug moo.squidsoft.net 4444
Show Logfile
DEBUG client.py:965 Fingerprint client: host=moo.squidsoft.net port=4444
INFO client_base.py:175 Connected to <Peer 138.197.193.89 4444>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 138.197.193.89 4444>
moo.squidsoft.net:7777
Connection Banner:
Server URLs
- Telnet: telnet://moo.squidsoft.net:7777
- Website: http://squidsoft.net
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is unique to this server.
Options offered by server: ECHO
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c8e9c61c9db3f383",
"fingerprint-data": {
"offered-options": [
"ECHO"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nPassword: \r\n",
"banner_before_return": " * Welcome to Star Conquest! *\r\nWelcome to... **\r\n **\r\n ** ******* **** ********\r\n ** ****** ** ** *** ***\r\n ** ** ******** *******\r\n ** ** ** ** ** **\r\n ** ** ** ** ** ** \r\n _______ ** ** ** ** ** ** ___________\r\n / \\ ** ** ** ** ** ** | |\r\n / ____/ ** **|___ ___|\r\n | / ** ** | |\r\n | | _____ _____ _____ _ _ _____ _____| |\r\n | \\___/ _ | _ / _ | | | | -- | ____| |\r\n \\ | |_| | | | | |_| | |_| | ____|____ | |\r\n \\______\\_____|_| |_\\___ |_____|_____|_____|___|\r\n | |_\r\n | | |\r\n \\_/\r\n\r\n\r\n\r\nOfficial Website: http://squidsoft.net\r\n\r\n-------------------------------------------------------------------------------\r\nHumanity has just emerged from the lowest point in its collective history, and\r\nthe closest it has been to extinction since the advent of agriculture. By the\r\nyear 2304, the Coalition of humans and their alien allies the Jinu has spread\r\nacross the stars, and thought themselves powerful. But the Outsiders, an alien\r\nempire occupying vast reaches of Rimward space, proved them wrong. First contact\r\nbetween the two allies was severed, and suddenly humanity was alone. Then the\r\nOutsiders attacked in force, and human planets and governments fell one by one.\r\n\r\n It was the apocalypse.\r\n\r\nBut contrary to the beliefs of many, not all hope was lost. After five years,\r\na single starship, the Percival Lowell, returned from Rimward space, bringing\r\nwith it the means to nullify the Outsiders' greatest weapon. With this, and the\r\nhelp of many other brave pilots, the occupying Outsiders were driven off human\r\n worlds and back to where they came from.\r\n\r\n Humanity is now trying to rebuild, and trying to regain what it has lost. The\r\nOutsiders are finished with occupation, and now desire only to see humans extinct.\r\nNew threats and new mysteries seem to appear every day. In the midst of it all,\r\ncivilian starships span the stars, maintaining an open threat against any new\r\n invasion and trying to make a few credits while they're at it.\r\n\r\nYou too have felt the lure of this; the desire for a unique freedom that most\r\ncitizens will never know, the drive to explore, the need to defend your species,\r\n and yes, greed for the vast wealth that is to be had.\r\n\r\n It is time to take to the stars.\r\n-------------------------------------------------------------------------------\r\n\r\nWelcome to the original and still the most innovative pulp science fiction multiplayer roleplaying adventure!\r\nOriginally opened in its classic form on 19 December 1998! Reopened in its new iteration on 28 February 2009!\r\n\r\nAll original work (including setting, non-player characters, design, source code, all related background material, and all text) located in this game or on the Squidsoft.net website is copyright (c) Squidsoft.net 1998-2015. Unauthorised reproduction prohibited.\r\n\r\nWarning: Speech in this game is largely uncensored, and sensitive individuals may find some other players offensive. The staff is ultimately not responsible for the words and actions of the players.\r\n\r\nThe last server reset was at Sun Feb 8 10:35:28 2026 UTC\r\n\r\nContact us via email at: starconquest@squidsoft.net\r\n\r\nNo new announcements to display.\r\nPlease log in now.\r\n\r\nIf you do not have a SquidSoft.net account and wish to create one, please send a web browser here: http://moo.squidsoft.net:3333/\r\n\r\nAccount ID:\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.505328893661499,
"total": 5.158550024032593
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:52.356260+00:00",
"host": "moo.squidsoft.net",
"ip": "138.197.193.89",
"port": 7777
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug moo.squidsoft.net 7777
Show Logfile
DEBUG client.py:965 Fingerprint client: host=moo.squidsoft.net port=7777
INFO client_base.py:175 Connected to <Peer 138.197.193.89 7777>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WILL ECHO
DEBUG stream_writer.py:723 WILL ECHO unsolicited
DEBUG stream_writer.py:1900 handle_will(ECHO)
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 remote_option[ECHO] = True
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:737 new server fingerprint c8e9c61c9db3f383
INFO client_base.py:106 Connection closed to <Peer 138.197.193.89 7777>
moo.squidsoft.net:7888
Connection Banner:
Server URLs
- Telnet: telnet://moo.squidsoft.net:7888
- Website: http://www.squidsoft.net
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 219 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nPassword: \r\n",
"banner_before_return": " * Welcome to Star Conquest! *\r\nWelcome to... **\r\n **\r\n ** ******* **** ********\r\n ** ****** ** ** *** ***\r\n ** ** ******** *******\r\n ** ** ** ** ** **\r\n ** ** ** ** ** ** \r\n _______ ** ** ** ** ** ** ___________\r\n / \\ ** ** ** ** ** ** | |\r\n / ____/ ** **|___ ___|\r\n | / ** ** | |\r\n | | _____ _____ _____ _ _ _____ _____| |\r\n | \\___/ _ | _ / _ | | | | -- | ____| |\r\n \\ | |_| | | | | |_| | |_| | ____|____ | |\r\n \\______\\_____|_| |_\\___ |_____|_____|_____|___|\r\n | |_\r\n | | |\r\n \\_/\r\n C L A S S I C\r\n\r\n\r\nOfficial Website: http://www.squidsoft.net\r\n\r\n-----------------------------------------------------------------------\r\nStar Conquest is a multiplayer role-playing game set in interstellar\r\nspace, as well as on dozens of planets, space stations, and starships.\r\nYour goal is what you want it to be. There are many different ways to\r\nmake a living. And you won't be alone; all your activities take place\r\nwith your choice of three diverse unions as a backdrop. And when you\r\nfinally work your way up to one of the greatest powers in interstellar\r\nspace, a fourth alliance of certain humans and some alien species may\r\nbegin trying to recruit you.\r\n-----------------------------------------------------------------------\r\n\r\nOpen to the public since 19 December 1998!\r\n\r\nAll original work located in this game is copyright (c) SquidSoft.net 1998-2009, unauthorised reproduction prohibited.\r\n\r\nWarning: Speech in this game is largely uncensored, and sensitive individuals may find some other players offensive. The staff is ultimately not responsible for the words and actions of the players.\r\n\r\nNOTICE: Star Conquest: Classic is offered mainly for the purposes of nostalgia and will receive MINIMAL support. Go to Star Conquest at telnet://squidsoft.net:7777 for a more active development experience and to play the game as it is meant to be!\r\n\r\nThe last server reset was at Sat Apr 19 12:02:10 2025 UTC\r\n\r\nContact us via email at: starconquest@squidsoft.net\r\n\r\nPlease log in now.\r\n\r\nIf you do not have a SquidSoft.net account and wish to create one, please send a web browser here: http://moo.squidsoft.net:3333/\r\n\r\nAccount ID:\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5093903541564941,
"total": 5.1629228591918945
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:59.948435+00:00",
"host": "moo.squidsoft.net",
"ip": "138.197.193.89",
"port": 7888
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug moo.squidsoft.net 7888
Show Logfile
DEBUG client.py:965 Fingerprint client: host=moo.squidsoft.net port=7888
INFO client_base.py:175 Connected to <Peer 138.197.193.89 7888>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 138.197.193.89 7888>