188.128.39.239 (bylins.su)
188.128.39.239:110
Connection Banner:
This banner is more than 100% similar to 7 other servers:
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 bylins.su:3389 (100% match)
Server URLs
- Telnet: telnet://188.128.39.239:110
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 99\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.720343112945557
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:13:45.187941+00:00",
"host": "188.128.39.239",
"ip": "188.128.39.239",
"port": 110
},
{
"connected": "2026-04-05T18:52:42.382174+00:00",
"host": "188.128.39.239",
"ip": "188.128.39.239",
"port": 110
},
{
"connected": "2026-04-07T07:10:21.289523+00:00",
"host": "188.128.39.239",
"ip": "188.128.39.239",
"port": 110
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 188.128.39.239 110
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=188.128.39.239 port=110
INFO client_base.py:190 Connected to <Peer 188.128.39.239 110>
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MCCP3_COMPRESS, WILL AARDWOLF, WILL MSSP, WILL MXP, WILL GMCP, WILL ATCP, WILL
MCCP2_COMPRESS, WILL MSP, WILL ZMP, WILL MSDP, DO MCCP3_COMPRESS, DO AARDWOLF, DO MSSP, DO MXP, DO GMCP, DO ATCP, DO MSP, DO
ZMP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 110>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:143
Connection Banner:
This banner is more than 100% similar to 9 other servers:
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
Server URLs
- Telnet: telnet://bylins.su:143
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 101\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.7036659717559814
}
}
},
"sessions": [
{
"connected": "2026-04-05T18:57:58.783877+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 143
},
{
"connected": "2026-04-07T06:46:43.481975+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 143
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 143
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=143
INFO client_base.py:190 Connected to <Peer 188.128.39.239 143>
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSDP, WILL GMCP, WILL MSSP, WILL AARDWOLF, WILL ZMP, WILL MCCP3_COMPRESS, WILL MXP,
WILL MSP, WILL ATCP, WILL MCCP2_COMPRESS, DO GMCP, DO MSSP, DO AARDWOLF, DO ZMP, DO MCCP3_COMPRESS, DO MXP, DO MSP, DO ATCP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 143>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:443
Connection Banner:
This banner is more than 100% similar to 11 other servers:
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 bylins.su:3389 (100% match)
Server URLs
- Telnet: telnet://bylins.su:443
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 98\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.724853992462158
}
}
},
"sessions": [
{
"connected": "2026-04-05T19:20:27.861058+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 443
},
{
"connected": "2026-04-07T07:12:09.965558+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 443
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 443
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=443
INFO client_base.py:190 Connected to <Peer 188.128.39.239 443>
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MXP, WILL MCCP2_COMPRESS, WILL ATCP, WILL MSSP, WILL AARDWOLF, WILL MCCP3_COMPRESS,
WILL MSP, WILL GMCP, WILL ZMP, WILL MSDP, DO MXP, DO ATCP, DO MSSP, DO AARDWOLF, DO MCCP3_COMPRESS, DO MSP, DO GMCP, DO ZMP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 443>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:463
Connection Banner:
This banner is more than 100% similar to 7 other servers:
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 bylins.su:3389 (100% match)
Server URLs
- Telnet: telnet://bylins.su:463
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 99\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.717076778411865
}
}
},
"sessions": [
{
"connected": "2026-04-05T19:23:33.461629+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 463
},
{
"connected": "2026-04-07T07:17:41.767884+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 463
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 463
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=463
INFO client_base.py:190 Connected to <Peer 188.128.39.239 463>
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.01s.
DEBUG client_base.py:540 failed-reply: 'WILL MCCP3_COMPRESS, WILL AARDWOLF, WILL MSDP, WILL MSSP, WILL GMCP, WILL MXP, WILL
MCCP2_COMPRESS, WILL MSP, WILL ATCP, WILL ZMP, DO MCCP3_COMPRESS, DO AARDWOLF, DO MSSP, DO GMCP, DO MXP, DO MSP, DO ATCP, DO
ZMP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 463>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:543
Connection Banner:
This banner is more than 100% similar to 9 other servers:
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3389 (100% match)
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
Server URLs
- Telnet: telnet://bylins.su:543
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 100\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.702707052230835
}
}
},
"sessions": [
{
"connected": "2026-04-05T18:51:31.510114+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 543
},
{
"connected": "2026-04-07T07:01:31.524548+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 543
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 543
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=543
INFO client_base.py:190 Connected to <Peer 188.128.39.239 543>
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL ZMP, WILL MSP, WILL GMCP, WILL AARDWOLF, WILL MXP, WILL MSDP, WILL MSSP, WILL
MCCP3_COMPRESS, WILL MCCP2_COMPRESS, WILL ATCP, DO ZMP, DO MSP, DO GMCP, DO AARDWOLF, DO MXP, DO MSSP, DO MCCP3_COMPRESS, DO
ATCP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 543>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:563
Connection Banner:
This banner is more than 100% similar to 9 other servers:
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
Server URLs
- Telnet: telnet://bylins.su:563
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 101\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.725141286849976
}
}
},
"sessions": [
{
"connected": "2026-04-05T19:11:05.583429+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 563
},
{
"connected": "2026-04-07T06:52:37.002947+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 563
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 563
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=563
INFO client_base.py:190 Connected to <Peer 188.128.39.239 563>
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSSP, WILL MXP, WILL ZMP, WILL MSDP, WILL ATCP, WILL MCCP2_COMPRESS, WILL MSP, WILL
MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, DO MSSP, DO MXP, DO ZMP, DO ATCP, DO MSP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 563>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:3128
Connection Banner:
This banner is more than 100% similar to 9 other servers:
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3389 (100% match)
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
Server URLs
- Telnet: telnet://bylins.su:3128
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 100\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.71582555770874
}
}
},
"sessions": [
{
"connected": "2026-04-05T18:48:30.102927+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 3128
},
{
"connected": "2026-04-07T06:54:50.527037+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 3128
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 3128
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=3128
INFO client_base.py:190 Connected to <Peer 188.128.39.239 3128>
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSDP, WILL ZMP, WILL ATCP, WILL GMCP, WILL MSP, WILL AARDWOLF, WILL MCCP3_COMPRESS,
WILL MXP, WILL MCCP2_COMPRESS, WILL MSSP, DO ZMP, DO ATCP, DO GMCP, DO MSP, DO AARDWOLF, DO MCCP3_COMPRESS, DO MXP, DO MSSP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 3128>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:3389
Connection Banner:
This banner is more than 100% similar to 9 other servers:
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
Server URLs
- Telnet: telnet://bylins.su:3389
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 101\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.695455551147461
}
}
},
"sessions": [
{
"connected": "2026-04-05T19:05:19.181622+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 3389
},
{
"connected": "2026-04-07T06:49:02.688158+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 3389
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 3389
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=3389
INFO client_base.py:190 Connected to <Peer 188.128.39.239 3389>
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSDP, WILL MSSP, WILL MXP, WILL ZMP, WILL ATCP, WILL MSP, WILL AARDWOLF, WILL
MCCP3_COMPRESS, WILL GMCP, WILL MCCP2_COMPRESS, DO MSSP, DO MXP, DO ZMP, DO ATCP, DO MSP, DO AARDWOLF, DO MCCP3_COMPRESS, DO
GMCP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 3389>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:4000
Connection Banner:
This banner is more than 100% similar to 7 other servers:
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 bylins.su:3389 (100% match)
Server URLs
- Telnet: telnet://bylins.su:4000
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 99\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.708893299102783
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:20:07.228855+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 4000
},
{
"connected": "2026-04-05T18:39:19.264322+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 4000
},
{
"connected": "2026-04-07T07:04:41.213417+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 4000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 4000
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=4000
INFO client_base.py:190 Connected to <Peer 188.128.39.239 4000>
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSSP, WILL GMCP, WILL MXP, WILL ATCP, WILL ZMP, WILL MSP, WILL MCCP3_COMPRESS, WILL
MSDP, WILL AARDWOLF, WILL MCCP2_COMPRESS, DO MSSP, DO GMCP, DO MXP, DO ATCP, DO ZMP, DO MSP, DO MCCP3_COMPRESS, DO AARDWOLF'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 4000>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:5190
Connection Banner:
This banner is more than 100% similar to 7 other servers:
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 bylins.su:3389 (100% match)
Server URLs
- Telnet: telnet://bylins.su:5190
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 99\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.702232360839844
}
}
},
"sessions": [
{
"connected": "2026-04-05T19:09:37.105612+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 5190
},
{
"connected": "2026-04-07T07:16:37.162161+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 5190
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 5190
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=5190
INFO client_base.py:190 Connected to <Peer 188.128.39.239 5190>
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSDP, WILL MSP, WILL MXP, WILL GMCP, WILL ATCP, WILL AARDWOLF, WILL MCCP3_COMPRESS,
WILL ZMP, WILL MSSP, WILL MCCP2_COMPRESS, DO MSP, DO MXP, DO GMCP, DO ATCP, DO AARDWOLF, DO MCCP3_COMPRESS, DO ZMP, DO MSSP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 5190>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:7000
Connection Banner:
This banner is more than 100% similar to 7 other servers:
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:543 (100% match)
🇷🇺 bylins.su:8080 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3128 (100% match)
🇷🇺 bylins.su:3389 (100% match)
Server URLs
- Telnet: telnet://bylins.su:7000
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 99\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.710432767868042
}
}
},
"sessions": [
{
"connected": "2026-04-05T18:50:23.505129+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 7000
},
{
"connected": "2026-04-07T07:16:55.248094+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 7000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 7000
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=7000
INFO client_base.py:190 Connected to <Peer 188.128.39.239 7000>
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL ZMP, WILL MXP, WILL MCCP3_COMPRESS, WILL GMCP, WILL MSP, WILL MCCP2_COMPRESS, WILL
MSSP, WILL MSDP, WILL AARDWOLF, WILL ATCP, DO ZMP, DO MXP, DO MCCP3_COMPRESS, DO GMCP, DO MSP, DO MSSP, DO AARDWOLF, DO ATCP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 7000>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41
bylins.su:8080
Connection Banner:
This banner is more than 100% similar to 9 other servers:
🇷🇺 bylins.su:143 (100% match)
🇷🇺 bylins.su:563 (100% match)
🇷🇺 bylins.su:3389 (100% match)
🇷🇺 188.128.39.239:110 (100% match)
🇷🇺 bylins.su:463 (100% match)
🇷🇺 bylins.su:4000 (100% match)
🇷🇺 bylins.su:443 (100% match)
🇷🇺 bylins.su:7000 (100% match)
🇷🇺 bylins.su:5190 (100% match)
Server URLs
- Telnet: telnet://bylins.su:8080
- Website: bylins.su
Server Info
Server Location: 🇷🇺 Russia (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 111 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nOnline: 100\r\n\r\nUsing keytable\r\n 0) Koi-8\r\n 1) Alt\r\n 2) Windows(JMC,MMC)\r\n 3) Windows(zMUD)\r\n 4) Windows(zMUD 'z')\r\n 5) UTF-8\r\n 6) Windows(zMUD <6.39)\r\n 9) TECT...\r\nSelect one : ----------------------------------------------------------------------------- \r\n Based On CircleMUD v3.0 Created by Jeremy Elson, \r\n DikuMUD Gamma 0.0 by Sebastian Hammer, Michael Seifert, \r\n Hans Henrik Staerfeldt, Tom Madsen, Katja Nyboe\r\n _____________________________________________________________________________\r\n\r\n #######\r\n ## \r\n ## #### #### #### #### #### #### #### #### ####\r\n ####### ###### ## ## ## ## #### ## ## ###### ##\r\n ## ## ## ## ## ## ## #### ## ######## ## ## ##\r\n ## ## ## ## ## ## ## ### ## ## ## ## ## ##\r\n ####### ####### #### ### ### #### #### #### #### ####### ####\r\n\r\n \u041f\u041e \u041f\u0420\u0415\u0414\u0410\u041d\u0418\u042f\u041c \u0420\u0423\u0421\u0421\u041a\u0418\u0425 \u041d\u0410\u0420\u041e\u0414\u041d\u042b\u0425 \u0421\u041a\u0410\u0417\u041e\u041a \u0418 \u0411\u042b\u041b\u0418\u041d.\r\n\r\n \u041f\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0421\u0442\u0440\u0438\u0431\u043e\u0433\u043e\u043c\r\n e-mail: stribog@bylins.su\r\n\r\n \u041f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \u043d\u0430\u0448 \u0441\u0430\u0439\u0442: www.bylins.su\r\n \u0414\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u043e\u0441\u0435\u0442\u0438\u0442\u0435 \r\n https://wiki.bylins.su\r\n\r\n\u0412\u0432\u0435\u0434\u0438\u0442\u0435 \u0438\u043c\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u0436\u0430 (\u0438\u043b\u0438 \"\u043d\u043e\u0432\u044b\u0439\" \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043d\u043e\u0432\u043e\u0433\u043e): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "utf-8",
"option_states": {
"server_offered": {
"0x55": false,
"MCCP2": true,
"MSDP": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.70479416847229
}
}
},
"sessions": [
{
"connected": "2026-04-05T18:54:21.463298+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 8080
},
{
"connected": "2026-04-07T06:57:34.007271+00:00",
"host": "bylins.su",
"ip": "188.128.39.239",
"port": 8080
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bylins.su 8080
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=bylins.su port=8080
INFO client_base.py:190 Connected to <Peer 188.128.39.239 8080>
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:773 recv IAC WILL MSDP
DEBUG stream_writer.py:2045 handle_will(MSDP)
DEBUG stream_writer.py:998 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MSDP] = True
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:2045 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:998 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3384 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:773 recv IAC WILL MCCP_COMPRESS
DEBUG stream_writer.py:789 WILL MCCP_COMPRESS unsolicited
DEBUG stream_writer.py:2045 handle_will(MCCP_COMPRESS)
DEBUG stream_writer.py:3384 remote_option[MCCP_COMPRESS] = False
DEBUG stream_writer.py:1024 send IAC DONT MCCP_COMPRESS
DEBUG stream_writer.py:2182 Unhandled: WILL MCCP_COMPRESS.
DEBUG stream_writer.py:767 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:754 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2238 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3232 MCCP2 activated
DEBUG client_base.py:483 MCCP2 decompression started (server→client)
DEBUG client_base.py:534 negotiation failed after 4.01s.
DEBUG client_base.py:540 failed-reply: 'WILL MXP, WILL MSP, WILL MCCP3_COMPRESS, WILL AARDWOLF, WILL ATCP, WILL MCCP2_COMPRESS,
WILL MSDP, WILL MSSP, WILL ZMP, WILL GMCP, DO MXP, DO MSP, DO MCCP3_COMPRESS, DO AARDWOLF, DO ATCP, DO MSSP, DO ZMP, DO GMCP'
DEBUG server_fingerprinting.py:1245 inline UTF-8 menu response: b'5\r\n'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 188.128.39.239 8080>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41