176.9.151.147
176.9.151.147:1111
Connection Banner:
Server URLs
- Telnet: telnet://176.9.151.147:1111
- Website: ti-legacy.com
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: Negotiated
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is unique to this server.
Options offered by server: ECHO, GMCP, MSDP, MSP, MXP
Options requested from client: CHARSET, MXP, NAWS, SGA, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c75b6aeeae7b041b",
"fingerprint-data": {
"offered-options": [
"ECHO",
"GMCP",
"MSDP",
"MSP",
"MXP"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"MSSP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [
"CHARSET",
"MXP",
"NAWS",
"SGA",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "Account names are three characters at a minimum. Please try again?\n\r > ",
"banner_before_return": "\u001b[49;22;36m|----------------------------------------------|\u001b[49;22;37m\n\r\u001b[49;22;36m|\u001b[49;1;36m . .\u001b[49;22;37m \u001b[49;22;36m|\u001b[49;22;37m\n\r\u001b[49;22;36m|\u001b[49;1;36m . \u001b[49;22;37m_ \u001b[49;22;36m|\u001b[49;1;37m______ _\u001b[49;22;37m\n\r\u001b[49;22;31m.--------------------\u001b[49;1;37m/\\\u001b[49;22;31m--\u001b[49;1;37m| |_\u001b[49;22;31m-----------------\u001b[49;1;37m(_______)\u001b[49;22;31m----------------.\u001b[49;1;37m| |\u001b[49;22;37m\n\r\u001b[49;22;31m| \u001b[49;1;37m/ \\ | | |_ ____ ____ _____ ____ ___ ____| | _\n\r\u001b[49;22;31m| \u001b[49;1;37m/ /\\ \\| | _)/ _ )/ ___) | ___) | _ \\ / _ \\ / ___) || \\ \n\r\u001b[49;22;31m| \u001b[49;1;37m| |__| | | |_( (/ /| | | |_____| | | | |_| ( (___| |\u001b[49;22;31m\\\u001b[49;22;37m| |\n\r\u001b[49;22;31m| \u001b[49;1;37m|______|_|\\___)____)_| |_______) ||_/ \\___/ \\____)_| |_|\n\r\u001b[49;22;31m|\u001b[49;22;37m . \u001b[49;1;37m|_|\u001b[49;1;31m REBOOT \u001b[49;22;31m\\\u001b[0;37m\n\r\u001b[49;22;31m.------------------------\u001b[49;22;37m|\u001b[49;22;31m--------------------.-------------------------------'\u001b[49;22;37m\n\r\u001b[49;22;36m| \u001b[49;1;36m.\u001b[49;22;37m .' '. \u001b[49;22;36m|\u001b[49;22;37m Based on InqMUTT(\u001b[49;22;36mti-legacy.com\u001b[49;22;37m)\n\r\u001b[49;22;36m|\u001b[49;22;37m ,-----. \u001b[49;1;36m. \u001b[49;22;36m|\u001b[49;22;37m which was based on DikuMUD, ROM\n\r\u001b[49;22;36m| \u001b[49;1;36m.\u001b[49;22;37m : \u001b[49;1;37m' \u001b[49;22;37m' \u001b[49;1;30m'\u001b[49;22;37m : \u001b[49;22;36m|\u001b[49;22;37m 2.4b and Merc 2.1. Please check\n\r\u001b[49;22;36m|\u001b[49;22;37m : ' \u001b[49;1;37m' \u001b[49;22;37m' : \u001b[49;1;36m. \u001b[49;22;36m|\u001b[49;22;37m \u001b[49;22;36mHELP CREDITS\u001b[49;22;37m in-game for a full\n\r\u001b[49;22;36m| \u001b[49;1;36m.\u001b[49;22;37m : \u001b[49;1;30m' \u001b[49;22;37m' \u001b[49;1;37m'\u001b[49;22;37m : \u001b[49;22;36m|\u001b[49;22;37m account of code contributions.\n\r\u001b[49;22;36m|\u001b[49;22;37m :--' \u001b[49;1;30m' \u001b[49;22;37m'--: \u001b[49;22;36m|\u001b[49;22;37m\n\r\u001b[49;22;36m|\u001b[49;22;37m |' ' ' \u001b[49;1;30m'\u001b[49;22;37m |\u001b[49;1;36m . \u001b[49;22;36m|\u001b[49;1;37m ACCESS CURATION:\u001b[0;37m\n\r\u001b[49;22;36m|\u001b[49;22;37m ------. |' \u001b[49;1;30m'\u001b[49;22;37m ' ' |\u001b[49;22;36m |\u001b[0;37m \n\r\u001b[49;22;36m| \u001b[49;1;37m.\u001b[49;22;37m : ' \u001b[49;1;30m'\u001b[49;22;37m : |' \u001b[49;1;30m' \u001b[49;22;37m' ' | \u001b[49;1;37m. \u001b[49;22;36m|\u001b[0;37m We are a \u001b[49;1;37mwhitelist\u001b[0;37m-only\n\r\u001b[49;22;36m|\u001b[0;37m | : \u001b[49;1;30m'\u001b[0;37m ' : |' ' ' \u001b[49;1;30m'\u001b[0;37m | \u001b[49;22;36m| |\u001b[0;37m game. An invitation from\n\r\u001b[49;22;36m|\u001b[0;37m .-. : ' ' : |\u001b[49;1;30m' \u001b[0;37m' ' ' | ,---. \u001b[49;22;36m|\u001b[0;37m an existing player or\n\r\u001b[49;22;36m|\u001b[0;37m : ' :---' '--- |' \u001b[49;1;30m' \u001b[0;37m' ' | : ' : \u001b[49;22;36m|\u001b[0;37m Staff member is required\n\r\u001b[49;22;36m|\u001b[0;37m .:-'-:.' ' \u001b[49;1;30m' \u001b[0;37m| |' ' \u001b[49;1;30m'\u001b[0;37m ' | |--'--| \u001b[49;22;36m|\u001b[0;37m to access Alter Epoch.\n\r\u001b[49;22;36m|\u001b[0;37m |' ' |' ' ' | |' ' ' ' | |' ' | \u001b[49;22;36m|\u001b[0;37m \n\r\u001b[49;22;36m|\u001b[0;37m |' ' |' ' ' | |' ' ' |--------| |' ' | \u001b[49;22;36m|\u001b[0;37m Enter your existing, whitelisted\n\r\u001b[49;22;36m|\u001b[0;37m |' ' |' ' ' | |' ' ' |' ' ' ' | |' ' | \u001b[49;22;36m|\u001b[0;37m account name to access character\n\r\u001b[49;22;36m|\u001b[0;37m |' ' |' ' ' | ;' ' ' |' ' ' ' | |' ' | \u001b[49;22;36m|\u001b[0;37m generation and/or log-in.\n\r\u001b[49;22;36m| -\u001b[49;22;32m'\u001b[49;22;36m----\u001b[49;22;37m|\u001b[49;22;36m--\u001b[49;22;32m'\u001b[49;22;36m----\u001b[49;22;37m|\u001b[49;22;36m--\u001b[49;22;37m|\u001b[49;22;36m---\u001b[49;22;32m'\u001b[49;22;36m---\u001b[49;22;37m|\u001b[49;22;36m---\u001b[49;22;32m.\u001b[49;22;36m------\u001b[49;22;37m|\u001b[49;22;36m--\u001b[49;22;32m'\u001b[49;22;36m--- |\u001b[49;22;37m \n\r\n\rWhat is your account name? \u001b[49;22;36m[Enter your whitelisted account]\u001b[0;37m\n\r\u001b[7z",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"GMCP": true,
"MSDP": true,
"MSP": true
},
"server_requested": {
"CHARSET": true,
"MXP": true,
"NAWS": true,
"SGA": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5098328590393066,
"total": 5.721675872802734
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:23.583835+00:00",
"host": "176.9.151.147",
"ip": "176.9.151.147",
"port": 1111
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 176.9.151.147 1111
Show Logfile
DEBUG client.py:965 Fingerprint client: host=176.9.151.147 port=1111
INFO client_base.py:175 Connected to <Peer 176.9.151.147 1111>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:707 recv IAC WILL GMCP
DEBUG stream_writer.py:723 WILL GMCP unsolicited
DEBUG stream_writer.py:1900 handle_will(GMCP)
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 remote_option[GMCP] = True
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:707 recv IAC DO SGA
DEBUG stream_writer.py:1770 handle_do(SGA)
DEBUG stream_writer.py:3174 pending_option[WILL + SGA] = True
DEBUG stream_writer.py:950 send IAC WILL SGA
DEBUG stream_writer.py:3174 local_option[SGA] = True
DEBUG stream_writer.py:3174 pending_option[WILL + SGA] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'Alter Epoch'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT b'\xfc'
DEBUG stream_writer.py:2025 handle_wont(WONT)
DEBUG stream_writer.py:3174 remote_option[WONT] = False
DEBUG stream_writer.py:3174 pending_option[DO + WONT] = False
DEBUG stream_writer.py:707 recv IAC WILL ECHO
DEBUG stream_writer.py:1900 handle_will(ECHO)
DEBUG stream_writer.py:924 skip DO ECHO; pending_option = True
DEBUG stream_writer.py:3174 remote_option[ECHO] = True
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC DONT MSSP
DEBUG stream_writer.py:1863 handle_dont(MSSP)
DEBUG stream_writer.py:3174 pending_option[WILL + MSSP] = False
DEBUG stream_writer.py:3174 local_option[MSSP] = False
DEBUG stream_writer.py:707 recv IAC WILL MXP
DEBUG stream_writer.py:1900 handle_will(MXP)
DEBUG stream_writer.py:924 skip DO MXP; pending_option = True
DEBUG stream_writer.py:3174 remote_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT ZMP
DEBUG stream_writer.py:2025 handle_wont(ZMP)
DEBUG stream_writer.py:3174 remote_option[ZMP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:737 new server fingerprint c75b6aeeae7b041b
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 1111>
Apothica (apothica.kozow.com:6464)
Connection Banner:
Server URLs
- Telnet: telnet://apothica.kozow.com:6464
- Website: https://azerethmud.weebly.com/
Server Info
Codebase: tbaMUD
Players online: 0 [1]
Uptime: 6 days
Created: 2009
Server Location: 🇩🇪 US (MSSP)
Language: English
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 54 other servers.
Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "2d1d3bcf28abae7b",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"ATCP",
"CHARSET",
"MXP",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nAttempting to Detect Client, Please Wait...\r\n\u001b[7z\r\n\u001b[H\u001b[J\u001b[38;5;214m[\u001b[38;5;208mClient\u001b[38;5;214m] \u001b[38;5;145mxterm-256color\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mColors\u001b[38;5;214m] \u001b[38;5;145m256\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMXP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMSDP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mATCP\u001b[38;5;214m] \u001b[38;5;145mNo\u001b[0;00m\r\n\r\n\r\r\n ________________\r\r\n /\\ /\\\r\r\n / \\____________/ \\\r\r\n / / \\ \\\r\r\n / / \\ \\\r\r\n / / Welcome to \\ \\ \r\r\n /___/ Apothica \\___\\\r\r\n \\ \\ / /\r\r\n \\ \\ ____________ / /\r\r\n \\ \\ \\##########/ / /\r\r\n ,--, \\ \\ \\########/ / / ,--,\r\r\n )\"\"( \\ \\ \\######/ / / )\"\"(\r\r\n / \\ \\ \\ \\####/ / / /.nn.\\\r\r\n / \\ \\ \\ \\##/ / / /$$$$$$\\\r\r\n . . \\ \\ \\/ / / .$$$$$$$$.\r\r\n |'-....-'| \\ \\ / / |\"*$$$$*\"|\r\r\n | | __ \\ \\/_ /_ _ | |\r\r\n | | / | ____ ___\\ / /_/ /_ (_)________ _ | |\r\r\n |'-....-'| / /| | / __ \\/ __ \\/ __/ __ \\/ / ___/ __ '/ |8n....n8|\r\r\n | | / ___ |/ /_/ / /_/ / /_/ / / / / /__/ /_/ / |$$$$$$$$|\r\r\n | | /_/ |_/ .___/\\____/\\__/_/ /_/_/\\___/\\__,_/ |$$$$$$$$|\r\r\n '-....-' mh /_/ \"*$$$$*\" \r\r\nBy what name do you wish to be known? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mssp": {
"CODEBASE": "tbaMUD",
"CONTACT": "colt.adams45@yahoo.com",
"CRAWL DELAY": "-1",
"CREATED": "2009",
"DBSIZE": "52950",
"HOSTNAME": "azereth.vineyard.haus",
"LANGUAGE": "English",
"LOCATION": "US",
"MINIMUM AGE": "16",
"MOBILES": "8790",
"NAME": "Apothica",
"OBJECTS": "10309",
"PLAYERS": "0",
"PORT": "8000",
"ROOMS": "33641",
"UPTIME": "1770566032",
"WEBSITE": "https://azerethmud.weebly.com/"
},
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"MSDP": true,
"MSP": true,
"MSSP": true
},
"server_requested": {
"ATCP": true,
"CHARSET": true,
"MXP": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.7223472595214844
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:43.555154+00:00",
"host": "apothica.kozow.com",
"ip": "176.9.151.147",
"port": 6464
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug apothica.kozow.com 6464
Show Logfile
DEBUG client.py:965 Fingerprint client: host=apothica.kozow.com port=6464
INFO client_base.py:175 Connected to <Peer 176.9.151.147 6464>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'Apothica'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'Apothica', 'PLAYERS': '0', 'UPTIME': '1770566032', 'CRAWL DELAY': '-1', 'HOSTNAME':
'azereth.vineyard.haus', 'PORT': '8000', 'CODEBASE': 'tbaMUD', 'CONTACT': 'colt.adams45@yahoo.com', 'CREATED': '2009',
'LANGUAGE': 'English', 'LOCATION': 'US', 'MINIMUM AGE': '16', 'WEBSITE': 'https://azerethmud.weebly.com/', 'MOBILES': '8790',
'OBJECTS': '10309', 'ROOMS': '33641', 'DBSIZE': '52950'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 6464>
INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b
Azereth (azereth.vineyard.haus:8000)
Connection Banner:
Server URLs
- Telnet: telnet://azereth.vineyard.haus:8000
- Website: https://azerethmud.weebly.com/
Server Info
Codebase: tbaMUD
Players online: 4 [2]
Uptime: 6 days
Created: 2009
Server Location: 🇩🇪 US (MSSP)
Language: English
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 54 other servers.
Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "2d1d3bcf28abae7b",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"ATCP",
"CHARSET",
"MXP",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nAttempting to Detect Client, Please Wait...\r\n\u001b[7z\r\n\u001b[H\u001b[J\u001b[38;5;214m[\u001b[38;5;208mClient\u001b[38;5;214m] \u001b[38;5;145mxterm-256color\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mColors\u001b[38;5;214m] \u001b[38;5;145m256\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMXP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMSDP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mATCP\u001b[38;5;214m] \u001b[38;5;145mNo\u001b[0;00m\r\n\r\n /===-_---~~~~~~~------___\r\r\n ,;'\\ Welcome to: //~\\\\ ~~~~'---.______,-'\r\r\n _.~;';','\\\\ **AZERETH** | | \\\\ _-~'\r\r\n __--~ ,-/ /'\\\\ | | '\\ ,'\r\r\n _-~ /' | \\\\ / / \\ /\r\r\n .' / | \\\\ /' / \\ /'\r\r\n / ____ / | \\\\ _.~~~*,,*~.__/' / \\/' \r\r\n /-'~ ~~~~~---__ | ~-/~ /' _-~'\r\r\n \\_| / __--_ ), __--~~ \r\r\n '~~--_/ _-~_>--<_\\ '-~\\\r\r\n {\\__--_/} / \\\\__>--<_\\ \\\r\r\n /' (_/ _-~ | |__>--<_| ;\r\r\n __ _____| _/) )_/ __/_/__ --___|___ ~_______ __ __ \r\r\n / \\ |____ / /~ ,_/___|| _ \\-| ____||__ __|| | | |\r\r\n / _ \\ /o-o _//|___ | |_| || |___ / | | | |___| | \r\r\n / /_\\ \\ / (^(~| ___| | _ /<| ___|' | | | ___ |\r\r\n / ___ \\ / ,/| | |____ | |-\\ \\/| |__-~ | | | |; | |\r\r\n /__/ \\__\\|,//('(\\||_______||__|--\\__\\|_______| |__| |__| _-|__|\\\r\r\n ( ( ')) |__>--<__| | Created Oct. /' /; ||\r\r\n '-)) )) ( \\__>--<__\\ \\ 8th, 2000 /' // /'\r\r\n ,/,'//( ( ~-__>--<_~-_ ~--____---~' _/'/\r\r\n ,( ( ((, )) ~-_~>--<_/-__ __-~ _/\r\r\n '~/ ) ) ,/| ~~-'_/_/ /~~~~~~~__--~\r\r\n ._-~//( )/ )) ~~~~~~~~~~\r\r\nType WHO to see who is playing or enter a name to join in the fun.",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mssp": {
"CODEBASE": "tbaMUD",
"CONTACT": "colt.adams45@yahoo.com",
"CRAWL DELAY": "-1",
"CREATED": "2009",
"DBSIZE": "52955",
"HOSTNAME": "azereth.vineyard.haus",
"LANGUAGE": "English",
"LOCATION": "US",
"MINIMUM AGE": "16",
"MOBILES": "8790",
"NAME": "Azereth",
"OBJECTS": "10309",
"PLAYERS": "4",
"PORT": "8000",
"ROOMS": "33641",
"UPTIME": "1770521584",
"WEBSITE": "https://azerethmud.weebly.com/"
},
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"MSDP": true,
"MSP": true,
"MSSP": true
},
"server_requested": {
"ATCP": true,
"CHARSET": true,
"MXP": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.6916098594665527
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:03.007428+00:00",
"host": "azereth.vineyard.haus",
"ip": "176.9.151.147",
"port": 8000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug azereth.vineyard.haus 8000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=azereth.vineyard.haus port=8000
INFO client_base.py:175 Connected to <Peer 176.9.151.147 8000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'Azereth'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'Azereth', 'PLAYERS': '4', 'UPTIME': '1770521584', 'CRAWL DELAY': '-1', 'HOSTNAME':
'azereth.vineyard.haus', 'PORT': '8000', 'CODEBASE': 'tbaMUD', 'CONTACT': 'colt.adams45@yahoo.com', 'CREATED': '2009',
'LANGUAGE': 'English', 'LOCATION': 'US', 'MINIMUM AGE': '16', 'WEBSITE': 'https://azerethmud.weebly.com/', 'MOBILES': '8790',
'OBJECTS': '10309', 'ROOMS': '33641', 'DBSIZE': '52955'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 8000>
INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b
colossus.vineyard.haus:10000
Connection Banner:
Server URLs
- Telnet: telnet://colossus.vineyard.haus:10000
- Website: uk-softworks.com
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 173 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\n\r __|__ \n\r | \n\r _ __ | __ __ __ __ \n\r / / \\| / \\(_ _)/ \\(_ \n\r \\__\\__/|__\\__/__) (__\\__/__)\n\r T H E D A R K A G E\n\r\n\r\n\r\n\r Original DikuMUD by Hans Staerfeldt, Katja Nyboe,\n\r Tom Madsen, Michael Seifert, and Sebastian Hammer\n\r Based on MERC 2.1 code by Hatchet, Furey, and Kahn\n\r ROM 2.4 copyright (c) 1993-1998 Russ Taylor\n\r Colossus (c) 2018-2025\n\r\n\r Positions Avaiable\n\r Web Developer | Content Developers | Quest Developer\n\r\n\r E:administrator@uk-softworks.com\n\r\n\r\n\n\rConnection from 64.227.40.173\n\n\rEnter thy name ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.615405797958374
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:25.384212+00:00",
"host": "colossus.vineyard.haus",
"ip": "176.9.151.147",
"port": 10000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug colossus.vineyard.haus 10000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=colossus.vineyard.haus port=10000
INFO client_base.py:175 Connected to <Peer 176.9.151.147 10000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 10000>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41
Cowboy Bebop: The Galactic Bounty (cowboybebop.vineyard.haus:4020)
Connection Banner:
Server URLs
- Telnet: telnet://cowboybebop.vineyard.haus:4020
- Website: cowboybebop.vineyard.haus
Server Info
Codebase: Bebop 1.02
Genre: Sci-Fi Anime
Gameplay: Casual
Players online: 0 [3]
Uptime: 3 days
Created: 10 Aug 2025
Status: Beta
Server Location: 🇩🇪 Germany (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Yes (MSSP)
MCCP: Yes (MSSP)
MCCP2: No
MXP: Yes (MSSP)
MSP: Yes (MSSP)
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 7 other servers.
Options offered by server: ECHO, MSDP, MSP, MSSP, MXP
Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "ba132668606f84be",
"fingerprint-data": {
"offered-options": [
"ECHO",
"MSDP",
"MSP",
"MSSP",
"MXP"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [
"ATCP",
"CHARSET",
"MXP",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u001b[36m\n\rIllegal account name\u001b[31m,\u001b[36m try another\u001b[31m.\u001b[36m\nName\u001b[31m:\u001b[36m ",
"banner_before_return": "\u001b[1;30m \n ###### $$$$$ XXXXXX $# ## $###### \n ###### ##### ###### :# ## ##### \n #################$ ################## ################ ; ###### \n #####x ###### ##### ###### ###### ###### \n ##### ###### ##### #####x ################## ############ ###### \n ##### ###### #####$ ##### ###### ##### ############ \n $#### ###### #####. #### ###### ##### #####X ###### \n ##### ###### ##### ##### ###### ##### ###### ###### \n ##### ###### ###### #### ###### ##### ###### \n ##### ####### ####### ##### ###### ##### ###### \n ###### ;######## ############+ ###### ###### \n \n \u001b[36mC \u001b[0;36mO \u001b[1;36mW \u001b[0;36mB \u001b[1;36mO \u001b[0;36mY \u001b[1;36mB \u001b[0;36mE \u001b[1;36mB \u001b[0;36mO \u001b[1;36mP \u001b[0;34m: \u001b[1;31mT \u001b[0;31mH \u001b[1;31mE G \u001b[0;31mA \u001b[1;31mL \u001b[0;31mA \u001b[1;31mC \u001b[0;31mT \u001b[1;31mI \u001b[0;31mC \u001b[1;31mB \u001b[0;31mO \u001b[1;31mU \u001b[0;31mN \u001b[1;31mT \u001b[0;31mY \n\u001b[1;30m ## \n #######; ## ## ###### .## ## ################## # # \n ####### ## ## ;###### ## ## #####X#X # \n ####### $ ###### .;+;. ####### \n ####### ######### ###### ###### ####### \n ###################### ###### ###### ### ### #### +###### \n ############X ###### ###### ### ### #### ###### \n ####### ###### ##### ### ### #### ####### \n ####### ###### ###### #### x###### \n ####### ###### ###### ##### ####### \n #################### ###### #####: ###### ######## \n ################### ######$ ###### .############# ########### \n\n\u001b[0;36mEnter your account name\u001b[31m:\u001b[37m \u001b[7z",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mssp": {
"ANSI": "1",
"CODEBASE": "Bebop 1.02",
"CONTACT": "bebopmud24@cowboybebop.vineyard.haus",
"CRAWL DELAY": "-1",
"CREATED": "10 Aug 2025",
"GAMEPLAY": "Casual",
"GAMESYSTEM": "Custom",
"GENRE": "Sci-Fi Anime",
"GMCP": "0",
"HOSTNAME": "cowboybebop.vineyard.haus",
"MCCP": "1",
"MCP": "0",
"MSDP": "1",
"MSP": "1",
"MXP": "1",
"NAME": "Cowboy Bebop: The Galactic Bounty",
"PLAYERS": "0",
"PORT": "4020",
"PUEBLO": "0",
"STATUS": "Beta",
"SUBGENRE": "Cowboy Bebop",
"UPTIME": "1770779504",
"UTF-8": "1",
"VT100": "0",
"XTERM 256 COLORS": "1"
},
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"0x56": false,
"MSDP": true,
"MSP": true,
"MSSP": true
},
"server_requested": {
"ATCP": true,
"CHARSET": true,
"MXP": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5299298763275146,
"total": 5.6741533279418945
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:49.652872+00:00",
"host": "cowboybebop.vineyard.haus",
"ip": "176.9.151.147",
"port": 4020
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug cowboybebop.vineyard.haus 4020
Show Logfile
DEBUG client.py:965 Fingerprint client: host=cowboybebop.vineyard.haus port=4020
INFO client_base.py:175 Connected to <Peer 176.9.151.147 4020>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:723 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1900 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3174 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:950 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:2008 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:707 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:723 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1900 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:941 skip DONT MCCP2_COMPRESS; remote_option = False
WARNING stream_writer.py:2008 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'Cowboy Bebop: The Galactic Bounty'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'Cowboy Bebop: The Galactic Bounty', 'PLAYERS': '0', 'UPTIME': '1770779504', 'CRAWL
DELAY': '-1', 'HOSTNAME': 'cowboybebop.vineyard.haus', 'PORT': '4020', 'CODEBASE': 'Bebop 1.02', 'CONTACT':
'bebopmud24@cowboybebop.vineyard.haus', 'CREATED': '10 Aug 2025', 'GENRE': 'Sci-Fi Anime', 'GAMEPLAY': 'Casual', 'STATUS':
'Beta', 'GAMESYSTEM': 'Custom', 'SUBGENRE': 'Cowboy Bebop', 'ANSI': '1', 'GMCP': '0', 'MCCP': '1', 'MCP': '0', 'MSDP': '1',
'MSP': '1', 'MXP': '1', 'PUEBLO': '0', 'UTF-8': '1', 'VT100': '0', 'XTERM 256 COLORS': '1'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT b'\xfc'
DEBUG stream_writer.py:2025 handle_wont(WONT)
DEBUG stream_writer.py:3174 remote_option[WONT] = False
DEBUG stream_writer.py:3174 pending_option[DO + WONT] = False
DEBUG stream_writer.py:707 recv IAC WILL ECHO
DEBUG stream_writer.py:1900 handle_will(ECHO)
DEBUG stream_writer.py:924 skip DO ECHO; pending_option = True
DEBUG stream_writer.py:3174 remote_option[ECHO] = True
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC WONT GMCP
DEBUG stream_writer.py:2025 handle_wont(GMCP)
DEBUG stream_writer.py:3174 remote_option[GMCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MXP
DEBUG stream_writer.py:1900 handle_will(MXP)
DEBUG stream_writer.py:924 skip DO MXP; pending_option = True
DEBUG stream_writer.py:3174 remote_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT ZMP
DEBUG stream_writer.py:2025 handle_wont(ZMP)
DEBUG stream_writer.py:3174 remote_option[ZMP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint ba132668606f84be
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 4020>
darkeningsun.com:5678
Connection Banner:
Server URLs
- Telnet: telnet://darkeningsun.com:5678
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: No
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 2 other servers.
Options offered by server: MSP, MXP
Options requested from client: TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "f47a69bc1e28e701",
"fingerprint-data": {
"offered-options": [
"MSP",
"MXP"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSSP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u001b[0;31m |> \u001b[0;37mBased on:\n\r\u001b[0;31m /\u001b[1;30mi\u001b[0;31m\\ \u001b[1;37mWelcome to \u001b[0;37mDiku by Hans, Katya,\n\r\u001b[0;31m\\ /#'`\\ \u001b[1;37mThe Darkening Sun \u001b[0;37mTom, Michael and Sebastian\n\r\u001b[0;31m`\\ /#' `\\ /\\ \u001b[0;37mMerc 2.1 by Hatchet,\n\r\u001b[0;31m `\\ /#'-. `\\/ `\\ |> \u001b[0;37mFurey and Kahn\n\r\u001b[0;31m `\\ /#'-._ `\\ `\\ \u001b[1;30m| \u001b[0;37mRom 2.4 \udca91993-1996 by Russ\n\r\u001b[0;31m `\\ /#'-.___ `\\ `\\ /\u001b[1;30m'\u001b[0;31m\\ \u001b[0;37mOblivion 2.0 \udca91996-1997\n\r\u001b[0;31m___--' '--.._____..--' `\\/# `\\ \u001b[0;37mby Wes Wagner\n\r,\u001b[1;30m','| \u001b[1;37m|-\u001b[0;37m _ _-\u001b[1;30m=|\u001b[0;31m_.- /# `\\ \u001b[0;37mThe Dawn of Time v1.69s\n\r _-\u001b[1;30m=} \u001b[1;37m|-\u001b[0;37m {_} _-\u001b[1;30m=|. \u001b[0;31m/#`- `\\ \u001b[0;37m\udca91997-2010 by Michael Garratt\n\r -_\u001b[1;30m=| \u001b[1;37m|-\u001b[0;37m________-\u001b[1;30m=| \u001b[0;31m/#`-._ `\\ \u001b[0;37mThe Darkening Sun \udca92000-2022\n\r []\u001b[1;30m=|\u001b[0;35m_.-._ \u001b[1;37m\\,\u001b[0;37m_._.\u001b[1;30m_._./\u001b[0;37m_ \u001b[0;31m/#`-.___ `\\ \u001b[0;37mby Marc Garrett \n\r -\u001b[1;30m=\u001b[0;35m/* `\\\u001b[0;37m \u001b[1;37m|-.\u001b[0;37m _-\u001b[1;30m=| \u001b[0;31m'--.._____..--' \u001b[0;34m+ \u001b[1;33m___ \n\r\u001b[0;37m .-\u001b[0;35m(-.._..-)\u001b[0;37m\u001b[1;37m|- \u001b[0;37m, _-\u001b[1;30m=| ()\u001b[1;37m|\u001b[0;37m- \u001b[0;33m___..---.\u001b[1;30m| \u001b[0;34m.--.|__, \u001b[1;33m.-' `-.\n\r\u001b[0;37mMMMMM. ,MMMMM\u001b[1;30m. - | . \u001b[1;37m| \u001b[0;33m/ / // \\ \u001b[0;34m>'---.,___\\ \u001b[1;33m.-' `-.\n\r\u001b[0;37m ][`l--Ml][ `\u001b[1;30m] \u001b[0;37m,wwwwww\u001b[0;33m// / / \u001b[0;37m{}\u001b[0;33m \\\u001b[0;37m | l \u001b[1;33m/ \\\n\r\u001b[0;37m][ ]I,_MI' ][ \u001b[1;30m] \u001b[0;37m/__...-\u001b[0;33m'\u001b[0;37m|\u001b[0;33m\"\"\"\"\u001b[1;37m_.- \u001b[0;37m,-===- ,===\u001b[1;30m.\u001b[0;37m | \u001b[1;33m/ \\\n\r\u001b[0;37mn ][ ][ ][ \"\u001b[1;30mi] \u001b[0;37m!\u001b[0;36m_______\u001b[0;37m| \u001b[1;37m| `I\u001b[0;37m[ '|_\u001b[1;30m[ |\u001b[0;37m | \u001b[1;33m|\u001b[0;37m _ ,----,\u001b[1;30m _ \u001b[1;33m| \n\r\u001b[0;37m][__][__][__]\u001b[1;30m[ ]\u001b[0;36m /^ , /\\ \u001b[1;37m| ] ___ \u001b[1;30m] \u001b[0;37m| ,-' || |l\u001b[1;30m |\u001b[1;33m |\n\r\u001b[0;37m____/,./----\u001b[1;30m--/ \u001b[0;36m/ ^ ^ ;/ \\\u001b[0;33m/=\u001b[1;37mL ,.\u001b[0;37m=-p q===\u001b[1;30m,__J \u001b[0;37m|\u001b[1;30m-_\u001b[1;37m| *\u001b[0;37m* __ **\u001b[1;30m | \u001b[0;33m|\n\r\u001b[0;37m- _ -=##\u001b[1;30mY \u001b[0;36m/______/ \u001b[1;30m\"\"\u001b[0;36m \\ \u001b[1;37m`\\L\u001b[0;37mt _-\u001b[1;30m=J/\u001b[0;37m | \u001b[1;37m|,,=\u001b[0;37m=p' q==\u001b[1;30m,J \u001b[0;33m/\n\r\u001b[0;37m[] .- -=#\u001b[1;30ml\u001b[1;37m##_##\u001b[0;37m_ \u001b[1;30m\" \u001b[0;37m| \u001b[1;30m\" \"\u001b[0;37m |\u001b[0;33m---\u001b[1;37m|-\u001b[0;37m ^. _-\u001b[1;30m=|\u001b[1;37m\"-\u001b[0;37m\"-!-.-.\u001b[1;30m-\u001b[1;37mY\u001b[0;37m-' _\u001b[1;30m=| \u001b[0;33m/\n\r\u001b[0;37m - -=#\u001b[1;30ml\u001b[1;37m, \u001b[0;37m##-##_--.-.-\u001b[1;30m.\u001b[1;37m|-\u001b[0;37m / \\\\_-\u001b[1;30m=|\u001b[1;37m .\u001b[0;37m. , .-\u001b[1;30m=\u001b[1;37m|\u001b[0;37m- /\\\u001b[1;30m=| \u001b[0;33m.-' \n\r\u001b[0;37m_ - _;=#\u001b[1;30ml\u001b[1;37m:.\u001b[0;37m ; . \u001b[1;30m:\u001b[1;37m|-\u001b[0;37m |_LI_-\u001b[1;30m=|\u001b[1;37m.\u001b[0;37m. . . .-\u001b[1;30m=\u001b[1;37m|\u001b[0;37m- LJ\u001b[1;30m=|\u001b[0;33m.-' \n\r\u001b[0;37m,.,,, __-=#\u001b[1;30ml\u001b[1;37m:. \u001b[0;37m . : : :::\u001b[1;30m:\u001b[1;37m|-\u001b[0;37m _-\u001b[1;30m=| \u001b[0;37m. .__. -\u001b[1;30m=\u001b[1;37m|\u001b[0;37m- _\u001b[1;30m=| \n\r===.,\u001b[0;37m,__-=\u001b[1;30m#l\u001b[1;37m:.:\u001b[0;37m: ::: , ::::'\u001b[1;30m:\u001b[1;37m|-\u001b[0;37m _-\u001b[1;30m=|\u001b[0;37m, ./ \\\\. \u001b[1;30m=\u001b[1;37m|\u001b[0;37m- _\u001b[1;30m=| \n\r\u001b[0;33m||||\u001b[0;37m'\u001b[1;30m.\u001b[0;37m,_-=\u001b[1;30m#l\u001b[1;37m:: :\u001b[0;37m:: . : ;::,::\u001b[1;30m::\u001b[1;37m|-\u001b[0;37m __ _\u001b[1;30m-=|\u001b[0;37m .| |I \u001b[1;30m=|\u001b[0;37m-_, \u001b[0;32m%\u001b[0;36m#\u001b[0;32m*\u001b[1;30m!\u001b[0;32m-._\n\r\u001b[0;33m|||||\u001b[0;37m'\u001b[1;30m.\u001b[0;37m,-=\u001b[1;30m#l\u001b[1;37m. \u001b[0;37m ::: :;: ,:\u001b[1;30m::\u001b[1;37m|-\u001b[0;37m __ _\u001b[1;30m__-=|\u001b[1;37m.\u001b[0;37m | -_|I\u001b[0;32m@,' `-_\n\r\u001b[0;33m!!!!!\u001b[0;37m{}\u001b[1;30m,\u001b[0;37m-=\u001b[1;30m#l\u001b[1;37m:.\u001b[0;37m . ;: , :\u001b[1;30m:\u001b[0;32m#\u001b[1;30m:\u001b[1;37m|-\u001b[0;37m ., \u001b[1;30m__-=| \u001b[0;32m@\u001b[0;37m| \"'\u001b[0;32m-\u001b[0;33m,\u001b[0;32m_ . \n\r\u001b[0;33m|||||\u001b[0;37m{}\u001b[1;30m,\u001b[0;37m-=\u001b[1;30m#l\u001b[1;37m:.\u001b[0;37m: ' : \u001b[0;32m##_.-\u001b[1;37m!-\u001b[0;37m_ /\u001b[1;30m!\u001b[0;32m%'`, `-,_\n\r\u001b[0;33m|||||\u001b[0;37m{}\u001b[1;30m.\u001b[0;37m-=\u001b[1;30m#l\u001b[1;37m:.\u001b[0;37m .' : \u001b[0;32m#_.-' \u001b[0;36m\u001b[0;32m %# v @ `-. `-,_\n\r\u001b[1;37mWhat is thy name, Brave Traveller? \u001b[0;37m(Type '\u001b[1;36mnew\u001b[0;37m' to create a new character)<USER>",
"banner_before_return": "\r\n\u001b[1z<VERSION>\u001b[6z",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"0x55": false,
"0x56": false,
"MSP": true,
"MXP": true
},
"server_requested": {
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5163455009460449,
"total": 5.16019868850708
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:02.450442+00:00",
"host": "darkeningsun.com",
"ip": "176.9.151.147",
"port": 5678
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug darkeningsun.com 5678
Show Logfile
DEBUG client.py:965 Fingerprint client: host=darkeningsun.com port=5678
INFO client_base.py:175 Connected to <Peer 176.9.151.147 5678>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WILL MXP
DEBUG stream_writer.py:723 WILL MXP unsolicited
DEBUG stream_writer.py:1900 handle_will(MXP)
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 remote_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:723 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1900 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3174 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:950 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:2008 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:707 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:723 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:1900 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3174 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:950 send IAC DONT MCCP_COMPRESS
WARNING stream_writer.py:2008 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint f47a69bc1e28e701
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 5678>
dibrovamud.com:9000
Connection Banner:
Server URLs
- Telnet: telnet://dibrovamud.com:9000
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 173 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\n\r\n ,/ `,\r\n _________{( })_________\r\n /.-------./`` DIBROVA /`.-------.``\r\n /@@@@@@@/@@`` ) ( /@@``@@@@@@@``\r\n /@@@@@@@/@@@@>>/ A Fantasy `<<@@@@``@@@@@@@``\r\n /O@O@O@O/@O@O/ Roleplaying Game ``O@O@``O@O@O@O``\r\n /OOOOOOOO/OOOO|| ` / ||OOOO``OOOOOOOO``\r\n /O%O%O%O%/O%O%O%`` ))(( /%O%O%O``%O%O%O%O``\r\n||%%%%%%%%/' `%%%%`` / \\ /%%%%' ```%%%%%%%||\r\n((%%%%%%%(( %%%%%`` (( )) /%%%%% ))%%%%%%))\r\n `:::' `::`` `:::::`` `)~~(/ /:::::' /::' `:::/\r\n )' `;)' (` ` `` `<@ @>' / / ' ') `(;' `(\r\n ( '`` )^^( / / )\r\n ) ``oo/ (\r\n _ ' `' / _\r\n (@)'________oOo_________'__^__/_________oOo__________ (@)\r\n |-| VVV VVV `|-|\r\n | | Brought to you by | |\r\n |-| Opie - Rodger - Kaan - Vedic |-|\r\n | | Based on CircleMUD created by Jeremy Elson | |\r\n |-| A derivative of DikuMUD created by |-|\r\n | | Hans Henrik Staerfeldt, Katja Nyboe, | |\r\n |-| Tom Madsen, Michael Seifert, and Sebastian Hammer |-|\r\n |_|`________________________________________________ | |\r\n (@) ` ,/ `_____/ `` ~`/~ ``|-|\r\n ~ ___/^~ `____/`` (@)\r\n <<< ` __ <____/|| ~\r\n <-- ` <___/||\r\n || <___/\r\n ` `/__/\r\n ~----~\r\n\r\nBy what name do you wish to be known? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.6157641410827637
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:23.377173+00:00",
"host": "dibrovamud.com",
"ip": "176.9.151.147",
"port": 9000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug dibrovamud.com 9000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=dibrovamud.com port=9000
INFO client_base.py:175 Connected to <Peer 176.9.151.147 9000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 9000>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41
tbaMUD (infiniumgame.com:6060)
Connection Banner:
Server URLs
- Telnet: telnet://infiniumgame.com:6060
Server Info
Players online: 1 [4]
Uptime: 2 days
Server Location: 🇩🇪 Germany (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 54 other servers.
Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "2d1d3bcf28abae7b",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"ATCP",
"CHARSET",
"MXP",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\u001b[7z\r\n\u001b[H\u001b[J \u001b[38;5;051m __ __ __ ______ __ __ __ __ __ __ __ __\r\n \u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;033m\\ \u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;051m\"-.\u001b[38;5;033m\\ \u001b[38;5;033m\\ \u001b[38;5;024m/\u001b[38;5;033m\\ ___\u001b[38;5;033m\\\u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;033m\\ \u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;051m\"-.\u001b[38;5;033m\\ \u001b[38;5;033m\\ \u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;033m\\ \u001b[38;5;024m/\u001b[38;5;033m\\\u001b[38;5;033m \\\u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;033m\\ \u001b[38;5;024m/\u001b[38;5;033m\\ \u001b[38;5;051m\"-.\u001b[38;5;024m/ \u001b[38;5;033m\\\r\n \u001b[38;5;024m\\ \u001b[38;5;033m\\ \u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\ \u001b[38;5;033m\\-. \\\u001b[38;5;024m\\ \u001b[38;5;033m\\ __\u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\ \u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\ \u001b[38;5;033m\\-. \u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\ \u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\\u001b[38;5;033m \\_\u001b[38;5;033m\\ \u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\ \u001b[38;5;033m\\-./\u001b[38;5;033m\\ \u001b[38;5;033m\\\r\n \u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\\u001b[38;5;033m\\\"\\_\\\u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\ \u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\\u001b[38;5;033m\\\"\u001b[38;5;033m\\_\u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\\u001b[38;5;024m\\ \u001b[38;5;033m\\_____\\\u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\ \u001b[38;5;024m\\ \u001b[38;5;033m\\_\u001b[38;5;033m\\\r\n \u001b[38;5;024m\\/_/ \\/_/ \\/_/ \\/_/ \\/_/ \\/_/ \\/_/ \\/_/ \\/_____/ \\/_/ \\/_/\u001b[0;00m\r\n \r\n \u001b[38;5;231mA Unique Multi-User Dimension (MUD) Experience\u001b[0;00m\r\n \u001b[38;5;059mOriginal DikuMUD by Hans Staerfeldt, Katja Nyboe\r\n Tom Madsen, Michael Seifert, and Sebastian Hammer\u001b[0;00m\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n \u001b[38;5;214m(/((((///\r\n ((((((((((((((\u001b[38;5;088m,***\u001b[38;5;196m//[\r\n \u001b[38;5;214m((((((((((/\u001b[38;5;088m*,. \u001b[38;5;196m....\u001b[38;5;226m.\u001b[38;5;231m,\u001b[38;5;226m.\u001b[38;5;145m,\u001b[38;5;231m,,\u001b[38;5;226m,*,.\u001b[38;5;231m.*\r\n ( \u001b[38;5;214m((((((((\u001b[38;5;088m/,.\u001b[38;5;196m.,.\u001b[38;5;226m,,\u001b[38;5;231m,.\u001b[38;5;226m**\u001b[38;5;231m**,**\u001b[38;5;226m***\u001b[38;5;231m*\u001b[38;5;226m**\u001b[38;5;231m,,*\u001b[38;5;226m* *\u001b[38;5;231m*\r\n ( \u001b[38;5;214m((((/\u001b[38;5;088m.\u001b[38;5;196m..,\u001b[38;5;226m,,\u001b[38;5;231m,\u001b[38;5;226m,*,/***,/*\u001b[38;5;231m*/***//*\u001b[38;5;145m,*\u001b[38;5;226m**\u001b[38;5;231m*\u001b[38;5;226m*/ /\u001b[38;5;231m/\r\n \u001b[38;5;214m((/(/\u001b[38;5;088m,.\u001b[38;5;196m,.,\u001b[38;5;226m,*,\u001b[38;5;231m*,\u001b[38;5;226m**/*/,,\u001b[38;5;145m,/*\u001b[38;5;231m**\u001b[38;5;226m*\u001b[38;5;145m*\u001b[38;5;226m*/*/(/*\u001b[38;5;226m*//\u001b[38;5;231m//\u001b[38;5;145m/ *\u001b[38;5;226m*,\r\n \u001b[38;5;214m((,\u001b[38;5;088m..\u001b[38;5;196m.,,,\u001b[38;5;226m,*\u001b[38;5;231m*\u001b[38;5;226m**,*\u001b[38;5;226m**//*\u001b[38;5;226m*//\u001b[38;5;145m*/,((//**/\u001b[38;5;145m*((\u001b[38;5;226m((/*(\u001b[38;5;226m/\u001b[38;5;145m* (\u001b[38;5;231m(\u001b[38;5;226m//\r\n \u001b[38;5;214m(((\u001b[38;5;088m(..\u001b[38;5;196m.,,*\u001b[38;5;226m*,*\u001b[38;5;231m*,\u001b[38;5;226m*,*/\u001b[38;5;145m**\u001b[38;5;226m**/\u001b[38;5;145m/\u001b[38;5;226m////\u001b[38;5;226m//*(//\u001b[38;5;226m(/\u001b[38;5;231m((\u001b[38;5;145m((\u001b[38;5;226m//\u001b[38;5;226m/* // ///\u001b[38;5;226m/(/\r\n \u001b[38;5;214m((((\u001b[38;5;088m,.,\u001b[38;5;196m,,,*\u001b[38;5;226m*\u001b[38;5;145m*\u001b[38;5;231m/,\u001b[38;5;226m*/\u001b[38;5;231m*\u001b[38;5;145m/*(/\u001b[38;5;231m/*/ \u001b[38;5;145m***//\u001b[38;5;145m*(\u001b[38;5;226m*/( */\u001b[38;5;145m( *//(/(\u001b[38;5;145m*(/ / (*((/\r\n \u001b[38;5;214m((/\u001b[38;5;088m..,\u001b[38;5;196m,*,,*\u001b[38;5;226m**\u001b[38;5;231m*/\u001b[38;5;226m***\u001b[38;5;231m*/*\u001b[38;5;226m**\u001b[38;5;231m*\u001b[38;5;145m((/*\u001b[38;5;231m*/(\u001b[38;5;226m(// (\u001b[38;5;226m((*\u001b[38;5;231m*\u001b[38;5;145m**/(\u001b[38;5;226m(/\u001b[38;5;231m/ /(\u001b[38;5;226m/ \u001b[38;5;231m// (/(\u001b[38;5;226m*\u001b[38;5;231m*\r\n \u001b[38;5;214m((*\u001b[38;5;088m.\u001b[38;5;196m,,,*,/*\u001b[38;5;226m/*\u001b[38;5;231m**\u001b[38;5;226m(//(/(*/\u001b[38;5;145m (*(\u001b[38;5;226m*(\u001b[38;5;231m ((\u001b[38;5;145m(\u001b[38;5;226m((/*/\u001b[38;5;226m//(*//(((\u001b[38;5;226m//\u001b[38;5;231m/\u001b[38;5;145m((*/\u001b[38;5;226m(( (*\u001b[38;5;231m*( /\r\n \u001b[38;5;214m ((**.\u001b[38;5;088m.,,*\u001b[38;5;196m**,\u001b[38;5;226m**\u001b[38;5;231m*(\u001b[38;5;226m/**/,\u001b[38;5;226m(*/\u001b[38;5;145m((/( / \u001b[38;5;145m((*( ((\u001b[38;5;226m((/ /(/* ( //(*(/(((*/* *(/\r\n \u001b[38;5;214m((*\u001b[38;5;088m.,,\u001b[38;5;196m*,/**\u001b[38;5;226m,/\u001b[38;5;231m/*\u001b[38;5;226m*(*\u001b[38;5;145m\u001b[38;5;226m**/ /\u001b[38;5;145m*(\u001b[38;5;231m((\u001b[38;5;226m(*( */(\u001b[38;5;226m /*\u001b[38;5;231m/*((/(\u001b[38;5;226m(/ \u001b[38;5;145m/\u001b[38;5;145m//*/\u001b[38;5;226m/*/\u001b[38;5;145m(( \u001b[38;5;226m((( /(/ *.%\r\n \u001b[38;5;214m((\u001b[38;5;088m,,.\u001b[38;5;196m,,,/\u001b[38;5;226m*\u001b[38;5;145m*\u001b[38;5;231m (*\u001b[38;5;226m/(//\u001b[38;5;226m/*//\u001b[38;5;226m// *//\u001b[38;5;226m(/ ( (/\u001b[38;5;226m( **/\u001b[38;5;226m*(\u001b[38;5;145m/ *((\u001b[38;5;226m*//(( \u001b[38;5;226m/ (/\u001b[38;5;226m(** / /\u001b[38;5;145m/ ((\r\n\u001b[0;00m[Login]",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mssp": {
"CRAWL DELAY": "-1",
"NAME": "tbaMUD",
"PLAYERS": "1",
"UPTIME": "1770913413"
},
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"MSDP": true,
"MSP": true,
"MSSP": true
},
"server_requested": {
"ATCP": true,
"CHARSET": true,
"MXP": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.3354127407073975
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:09:59.187265+00:00",
"host": "infiniumgame.com",
"ip": "176.9.151.147",
"port": 6060
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug infiniumgame.com 6060
Show Logfile
DEBUG client.py:965 Fingerprint client: host=infiniumgame.com port=6060
INFO client_base.py:175 Connected to <Peer 176.9.151.147 6060>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'tbaMUD'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'tbaMUD', 'PLAYERS': '1', 'UPTIME': '1770913413', 'CRAWL DELAY': '-1'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 6060>
INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b
kotl.org:2221
Connection Banner:
Server URLs
- Telnet: telnet://kotl.org:2221
- Website: yahoo.com
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 219 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u001b[2J\n\r\n\r \u001b[1;30m________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mKingdoms of the Lost \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---________________\u001b[0;37m\u001b[0;37m\n\r\n\r \u001b[0;37m[\u001b[1;36m1\u001b[0;37m] \u001b[0;36m\u001b[0;36mLogon to KoTL \u001b[0;37m[\u001b[1;36m5\u001b[0;37m] \u001b[0;36m\u001b[0;36mDisconnect \n\r\n\r \u001b[0;37m[\u001b[1;36m2\u001b[0;37m] \u001b[0;36m\u001b[0;36mWho is Online \u001b[0;37m[\u001b[1;36m6\u001b[0;37m] \u001b[0;36m\u001b[0;36mCreate a Character \n\r\n\r \u001b[0;37m[\u001b[1;36m3\u001b[0;37m] \u001b[0;36m\u001b[0;36mChange player password \u001b[0;37m[\u001b[1;36m7\u001b[0;37m] \u001b[0;36m\u001b[0;36mAnnouncements \n\r\n\r \u001b[0;37m[\u001b[1;36m4\u001b[0;37m] \u001b[0;36m\u001b[0;36mRead the story of KoTL \u001b[0;37m[\u001b[1;36m8\u001b[0;37m] \u001b[0;36m\u001b[0;36mToggle color on/off \n\r\n\r\n\r \u001b[1;30m_________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mGame Status: Open \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---_________________\u001b[0;37m\u001b[0;37m\n\r\n\r\u001b[2J\n\r\n\r \u001b[1;30m________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mKingdoms of the Lost \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---________________\u001b[0;37m\u001b[0;37m\n\r\n\r \u001b[0;37m[\u001b[1;36m1\u001b[0;37m] \u001b[0;36m\u001b[0;36mLogon to KoTL \u001b[0;37m[\u001b[1;36m5\u001b[0;37m] \u001b[0;36m\u001b[0;36mDisconnect \n\r\n\r \u001b[0;37m[\u001b[1;36m2\u001b[0;37m] \u001b[0;36m\u001b[0;36mWho is Online \u001b[0;37m[\u001b[1;36m6\u001b[0;37m] \u001b[0;36m\u001b[0;36mCreate a Character \n\r\n\r \u001b[0;37m[\u001b[1;36m3\u001b[0;37m] \u001b[0;36m\u001b[0;36mChange player password \u001b[0;37m[\u001b[1;36m7\u001b[0;37m] \u001b[0;36m\u001b[0;36mAnnouncements \n\r\n\r \u001b[0;37m[\u001b[1;36m4\u001b[0;37m] \u001b[0;36m\u001b[0;36mRead the story of KoTL \u001b[0;37m[\u001b[1;36m8\u001b[0;37m] \u001b[0;36m\u001b[0;36mToggle color on/off \n\r\n\r\n\r \u001b[1;30m_________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mGame Status: Open \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---_________________\u001b[0;37m\u001b[0;37m\n\r\n\r",
"banner_before_return": "\n\r\u001b[1;35m _ _\n\r\u001b[1;35m ( | / )\n\r\u001b[1;35m \\|/ /'\n\r\u001b[1;35m |\\ . ,_ ,_ _ / _ ,_ _ ,'\n\r\u001b[1;35m (_| \\_)_/_/ (_(_/_(_/_(_)_/ ( (_/_)_\n\r\u001b[1;35m _ /__________\n\r\u001b[1;30m /\\\u001b[1;35m (_/ \u001b[1;30mEmail the owners at:\n\r\u001b[1;30m |/ _/_ /_ _ \u001b[1;31mChalgyr Vokel\u001b[1;30m\n\r\u001b[1;30m (_)_/| _/__/ (_(/ \u001b[0;36mChalgyr@yahoo.com \u001b[1;30m\n\r\u001b[1;30m -----|\\ \u001b[1;32mGillian Verity\u001b[1;30m\n\r\u001b[1;35m _ \u001b[1;30m \\/ \u001b[0;36mHerberkids3@yahoo.com \u001b[1;30m\n\r\u001b[1;35m ( | \n\r\u001b[1;35m | _|_ \n\r\u001b[1;35m \u001b[1;35m| _ , /\n\r\u001b[1;35m \u001b[1;35m _|____)_/(_)_/_)_/(____\n\r\u001b[1;35m \u001b[1;35m( )\n\r\u001b[0;35m ____\n\r\u001b[0;35m .'\u001b[1;33m* *\u001b[0;35m.'\n\r\u001b[0;35m __/_\u001b[1;33m*\u001b[0;35m_\u001b[1;33m*\u001b[0;35m(_\n\r\u001b[0;35m / _______ \\\n\r\u001b[0;35m _\\_)\u001b[0;37m/___\\\u001b[0;35m(_/_\n\r\u001b[0;35m /\u001b[1;33m*\u001b[0;35m_\u001b[0;37m((\\\u001b[1;34m- -\u001b[0;37m/))\u001b[0;35m_\u001b[1;33m*\u001b[0;35m\\\n\r\u001b[0;35m \\\u001b[1;33m*\u001b[0;35m\\\u001b[0;37m())(\u001b[1;31m-\u001b[0;37m)(()\u001b[0;35m/\u001b[1;33m*\u001b[0;35m/\n\r\u001b[0;35m '\u001b[1;33m*\u001b[0;35m\\\u001b[0;37m(((()))\u001b[0;35m/\u001b[1;33m*\u001b[0;35m'\n\r\u001b[0;35m / '\u001b[1;33m*\u001b[0;35m\\\u001b[0;37m)).))\u001b[0;35m/\u001b[1;33m*\u001b[0;35m' \\\n\r\u001b[0;35m / _ \u001b[1;36m\\\u001b[0;35m - \u001b[1;36m|\u001b[0;35m -\u001b[1;36m /\u001b[0;35m_ \\\n\r\u001b[0;35m ( ( \u001b[1;36m.;''';.\u001b[0;35m .' )\n\r\u001b[1;36m _\u001b[0;35m\\\"\u001b[1;36m__ / \u001b[1;37m)\u001b[1;36m\\ __\u001b[0;35m\"/\u001b[1;36m_\n\r\u001b[0;35m \\/ \u001b[1;36m\\ \u001b[1;37m' \u001b[1;36m/\u001b[0;35m \\/\n\r\u001b[0;35m .' \u001b[1;36m'...'\u001b[0;35m ' )\n\r\u001b[0;35m / \u001b[1;36m/ \u001b[1;33m*\u001b[1;36m|\u001b[1;33m*\u001b[1;36m \\\u001b[0;35m \\\n\r\u001b[0;35m / \u001b[0;36m. \u001b[1;33m* \u001b[0;36m.\u001b[1;33m *\u001b[0;36m .\u001b[0;35m \\\n\r\u001b[0;35m / \u001b[0;36m.\u001b[1;33m * \u001b[0;36m. \u001b[1;33m*\u001b[0;35m \\\n\r\u001b[0;35m / \u001b[1;33m*\u001b[0;35m / \u001b[1;33m* \u001b[0;35m| \u001b[1;33m* \u001b[0;35m\\ \u001b[1;33m*\u001b[0;35m \\\n\r\u001b[0;35m .' \u001b[1;33m* \u001b[0;35m/ \u001b[1;33m* \u001b[1;35mb\u001b[1;33m *\u001b[0;35m '. '.\n\r\u001b[0;35m _.-' \u001b[1;33m*\u001b[0;35m / \u001b[1;33m* \u001b[1;35mBb\u001b[1;33m *\u001b[0;35m '-. '-._\n\r\u001b[0;35m _.-' \u001b[1;33m*\u001b[0;35m | \u001b[1;33m* \u001b[1;35mBBb\u001b[1;33m *\u001b[0;35m '-. '-.\n\r\u001b[0;35m (________\u001b[1;35mmrf\u001b[0;35m\\____\u001b[1;35m.dBBBb.\u001b[0;35m________)____)\n\r\u001b[0;35m _,.-'-'-.,_\u001b[1;35m_,.-'-'-.,_\u001b[1;37m_,.-'-'-.,__,.-'-'-.,_\u001b[1;35m_,.-'-'-.,_\u001b[0;35m_,.-'-'-.,_\n\r\u001b[1;35m Kingdoms \u001b[1;30mof the \u001b[1;35mLost \u001b[1;30mis based on:\n\r\u001b[0;37m\n\r Original DikuMUD by Hans Staerfeldt, Katja Nyboe,\n\r Tom Madsen, Michael Seifert, and Sebastian Hammer\n\r Based on MERC 2.1 code by Hatchet, Furey, and Kahn\n\r ROM 2.4 copyright (c) 1993-1996 Russ Taylor\n\r\u001b[1;37m _,.-'-'-.,_\u001b[1;35m_,.-'-'-.,_\u001b[0;35m_,.-'-'-.,__,.-'-'-.,_\u001b[1;35m_,.-'-'-.,_\u001b[1;37m_,.-'-'-.,_\u001b[0;37m\n\r \n\r\u001b[1;30m[\u001b[0;36mPress \u001b[1;36mReturn\u001b[0;36m to continue\u001b[1;30m]\u001b[0;37m\n\r \n\r",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5400264263153076,
"total": 7.457608699798584
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:05.313929+00:00",
"host": "kotl.org",
"ip": "176.9.151.147",
"port": 2221
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug kotl.org 2221
Show Logfile
DEBUG client.py:965 Fingerprint client: host=kotl.org port=2221
INFO client_base.py:175 Connected to <Peer 176.9.151.147 2221>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 2221>
mud.darkrisings.org:1313
Connection Banner:
Server URLs
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 173 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\n\r/\\--------------------------------------------------------------\\__/\\\n\r\\@\\ \\-\\/\n\r |@@\\--------------------------------------------------------------\\\n\r \\_| |\n\r | You are floating in the nameless void and before you shines |\n\r | a bright light. As the light gets closer you feel a presence |\n\r | surrounding you. The light shines brighter and you become |\n\r | blinded. A voice from the light begins speaking, shaking you |\n\r | to your very foundations. \"Welcome soul,\" it says, \"Dost |\n\r | thou wish to enter the realm of mortal men?\" You nod your |\n\r | head and try to speak when appearing before you is a dark- |\n\r | robed figure. He pulls a large leather-bound book from his |\n\r | robes, opens it, and in his fingers appears a large |\n\r | feather-quill pen. |\n\r | |\n\r | \"I am the chronicler of the gods,\" the figure says. \"Before |\n\r | thou art able to continue, soul, I doth need thy name for my |\n\r | records.\" He puts the pen to the book and looks at you |\n\r | expectantly. The figure speaks again and you know you must |\n\r | answer..... |\n\r | |\n\r | \"What is thy name soul?\" ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.6568868160247803
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:11:34.549240+00:00",
"host": "mud.darkrisings.org",
"ip": "176.9.151.147",
"port": 1313
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug mud.darkrisings.org 1313
Show Logfile
DEBUG client.py:965 Fingerprint client: host=mud.darkrisings.org port=1313
INFO client_base.py:175 Connected to <Peer 176.9.151.147 1313>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 1313>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41
tbaMUD (tbamud.com:9091)
Connection Banner:
Server URLs
- Telnet: telnet://tbamud.com:9091
- Website: tbamud.com
Server Info
Players online: 0 [5]
Uptime: 7 days
Server Location: 🇩🇪 Germany (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 54 other servers.
Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "2d1d3bcf28abae7b",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"ATCP",
"CHARSET",
"MXP",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nAttempting to Detect Client, Please Wait...\r\n\u001b[7z\r\n\u001b[H\u001b[J\u001b[38;5;214m[\u001b[38;5;208mClient\u001b[38;5;214m] \u001b[38;5;145mxterm-256color\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mColors\u001b[38;5;214m] \u001b[38;5;145m256\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMXP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMSDP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mATCP\u001b[38;5;214m] \u001b[38;5;145mNo\u001b[0;00m\r\n\r\nWELCOME TO THE:\r\n \r\n **** * * *\r\n * * * *\r\n **** * * * * *** ** * **\r\n * * * * * * * * * ** ** \r\n * * * * * * * * ** * \r\n **** *** * * **** *** *\r\n\r\n * * \r\n * * *\r\n * * *** *** *** ** * * * *\r\n ***** * * * * * * ** ** ** * *\r\n * * * * * * * ** * * * * *\r\n * * *** **** **** *** * * * ***\r\n *\r\n **\r\n Based on CircleMUD by Jeremy Elson and DikuMUD by Hans-Henrik Staerfeldt,\r\n Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n email: rumble@tbamud.com \r\n\r\nBy what name do you wish to be known? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mssp": {
"CRAWL DELAY": "-1",
"NAME": "tbaMUD",
"PLAYERS": "0",
"UPTIME": "1770480094"
},
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"MSDP": true,
"MSP": true,
"MSSP": true
},
"server_requested": {
"ATCP": true,
"CHARSET": true,
"MXP": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.7215371131896973
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:09:54.551235+00:00",
"host": "tbamud.com",
"ip": "176.9.151.147",
"port": 9091
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug tbamud.com 9091
Show Logfile
DEBUG client.py:965 Fingerprint client: host=tbamud.com port=9091
INFO client_base.py:175 Connected to <Peer 176.9.151.147 9091>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'tbaMUD'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'tbaMUD', 'PLAYERS': '0', 'UPTIME': '1770480094', 'CRAWL DELAY': '-1'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 9091>
INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b
tbaMUD (timeslost.duckdns.org:4000)
Connection Banner:
Server URLs
Server Info
Players online: 0 [6]
Uptime: 7 days
Server Location: 🇩🇪 Germany (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: Negotiated
MSP: Negotiated
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 54 other servers.
Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "2d1d3bcf28abae7b",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"ATCP",
"CHARSET",
"MXP",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nAttempting to Detect Client, Please Wait...\r\n\u001b[7z\r\n\u001b[H\u001b[J\u001b[38;5;214m[\u001b[38;5;208mClient\u001b[38;5;214m] \u001b[38;5;145mxterm-256color\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mColors\u001b[38;5;214m] \u001b[38;5;145m256\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMXP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mMSDP\u001b[38;5;214m] \u001b[38;5;145mYes\u001b[0;00m | \u001b[38;5;214m[\u001b[38;5;208mATCP\u001b[38;5;214m] \u001b[38;5;145mNo\u001b[0;00m\r\n\r\n T B A M U D\r\n 2 0 2 5 \r\n\r\n Based on CircleMUD by Jeremy Elson and DikuMUD by Hans-Henrik Staerfeldt,\r\n Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer\r\n\r\nBy what name do you wish to be known? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "UTF-8",
"mssp": {
"CRAWL DELAY": "-1",
"NAME": "tbaMUD",
"PLAYERS": "0",
"UPTIME": "1770480395"
},
"mxp": [
"activated"
],
"option_states": {
"server_offered": {
"MSDP": true,
"MSP": true,
"MSSP": true
},
"server_requested": {
"ATCP": true,
"CHARSET": true,
"MXP": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.7174055576324463
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:09:39.315735+00:00",
"host": "timeslost.duckdns.org",
"ip": "176.9.151.147",
"port": 4000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug timeslost.duckdns.org 4000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=timeslost.duckdns.org port=4000
INFO client_base.py:175 Connected to <Peer 176.9.151.147 4000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'tbaMUD'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'tbaMUD', 'PLAYERS': '0', 'UPTIME': '1770480395', 'CRAWL DELAY': '-1'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 4000>
INFO fingerprinting.py:737 new server fingerprint 2d1d3bcf28abae7b
www.darkrisings.org:1313
Connection Banner:
Server URLs
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 173 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\n\r/\\--------------------------------------------------------------\\__/\\\n\r\\@\\ \\-\\/\n\r |@@\\--------------------------------------------------------------\\\n\r \\_| |\n\r | You are floating in the nameless void and before you shines |\n\r | a bright light. As the light gets closer you feel a presence |\n\r | surrounding you. The light shines brighter and you become |\n\r | blinded. A voice from the light begins speaking, shaking you |\n\r | to your very foundations. \"Welcome soul,\" it says, \"Dost |\n\r | thou wish to enter the realm of mortal men?\" You nod your |\n\r | head and try to speak when appearing before you is a dark- |\n\r | robed figure. He pulls a large leather-bound book from his |\n\r | robes, opens it, and in his fingers appears a large |\n\r | feather-quill pen. |\n\r | |\n\r | \"I am the chronicler of the gods,\" the figure says. \"Before |\n\r | thou art able to continue, soul, I doth need thy name for my |\n\r | records.\" He puts the pen to the book and looks at you |\n\r | expectantly. The figure speaks again and you know you must |\n\r | answer..... |\n\r | |\n\r | \"What is thy name soul?\" ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.607677936553955
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:09:17.641427+00:00",
"host": "www.darkrisings.org",
"ip": "176.9.151.147",
"port": 1313
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug www.darkrisings.org 1313
Show Logfile
DEBUG client.py:965 Fingerprint client: host=www.darkrisings.org port=1313
INFO client_base.py:175 Connected to <Peer 176.9.151.147 1313>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 176.9.151.147 1313>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41