173.160.76.205 (muds.toccobrator.com)

muds.toccobrator.com:4201

Connection Banner:

Welcome to TinyMUD To connect to your existing character, enter "connect name password" To create a new character, enter "create name password" Use the news command to get up-to-date news on program changes. You can disconnect using the QUIT command, which must be capitalized as shown. Use the WHO command to find out who is currently active.

Server URLs

Server Info

  • Server Location: πŸ‡ΊπŸ‡Έ United States (GeoIP)

Telnet Fingerprint

a8a260cc4662430c

This fingerprint is shared by 219 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "a8a260cc4662430c",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "Welcome to TinyMUD\nTo connect to your existing character, enter \"connect name password\"\nTo create a new character, enter \"create name password\"\nUse the news command to get up-to-date news on program changes.\n\nYou can disconnect using the QUIT command, which must be capitalized as shown.\n\nUse the WHO command to find out who is currently active.\n\n",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5079789161682129,
        "total": 5.013283014297485
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:13:42.938350+00:00",
      "host": "muds.toccobrator.com",
      "ip": "173.160.76.205",
      "port": 4201
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug muds.toccobrator.com 4201
Show Logfile
DEBUG client.py:965 Fingerprint client: host=muds.toccobrator.com port=4201
INFO client_base.py:175 Connected to <Peer 173.160.76.205 4201>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 173.160.76.205 4201>

muds.toccobrator.com:9901

Connection Banner:

Welcome to the... _​___________ \| \|wilight \|_​___ _​___\|_​_________ For a new character: create (player) (password) \| \| \| For an old character: connect (player) (password) \| \| \| To just look around: connect guest guest \| \|_​_______ \| \| \| / / Once connected: WHO to see who's on \| \| / / QUIT to leave \|__\| / / help or +help to get help / / / / / / _​_________ ___ _​____ _​____ / / / \\ / \\ / _ \\ / /_​_____\| __ \| __ \\ / /_\\ \| \| \| \|__\| \| / \\ \| ___/ \| \| \| \| \| \|\\ \|_​___ \|_​_____________\|\\_​________/___\| \|__\| \\_​_____\| A RhostsMUSH

Server URLs

Server Info

  • Server Location: πŸ‡ΊπŸ‡Έ United States (GeoIP)

Telnet Fingerprint

a8a260cc4662430c

This fingerprint is shared by 219 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "a8a260cc4662430c",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\r\nWelcome to the...\r\n ____________  \t       \t       \t       \t       \t       \t \r\n|\t     |wilight\t\t\t\t\t \r\n|____  \t ____|__________    For a new character:  create (player) (password)\r\n     |  |      \t      \t|   For an old character: connect (player) (password)\r\n     |  |\t\t|   To just look around:  connect guest guest  \t     \r\n     |  |________\t|\t\t\t\t \t     \t\r\n     | \t|\t/      \t/   Once connected:  WHO to see who's on     \t\r\n     |\t|      /       /  \t\t     QUIT to leave     \t\t\r\n     |__|     /\t      /\t  \t\t     help or +help to get help \t\r\n\t     / \t     / \t  \t\t\t\t     \t\t\r\n\t    / \t    / \t  \t\t\t\t     \t\t\r\n\t   / \t   / \t __________ ___\t_____  \t  _____\t     \t\t\r\n       \t  /    \t  /    \t/      \t   \\   /     \\   /  _  \\     \t\t\r\n\t / \t /______|    __    |\t __   \\ /  /_\\ \t|    \t\t\r\n\t |\t\t|   |__|   |    /  \\   |    ___/     \t\t\r\n\t |\t\t|\t   |   |    |  |\\  |____     \t\t\r\n\t |______________|\\_________/___|    |__| \\______|   A RhostsMUSH\r\n\r\n",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5179731845855713,
        "total": 5.027010202407837
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:11:38.628862+00:00",
      "host": "muds.toccobrator.com",
      "ip": "173.160.76.205",
      "port": 9901
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug muds.toccobrator.com 9901
Show Logfile
DEBUG client.py:965 Fingerprint client: host=muds.toccobrator.com port=9901
INFO client_base.py:175 Connected to <Peer 173.160.76.205 9901>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 173.160.76.205 9901>