47.176.57.117 (burbs.org)

burbs.org:4567

Connection Banner:

_​___ _ _ _​___ ( ) __ _ _ ___ __ ___ (_ _)/ (_/ )/ ___) \|/ / _) / ) / )/ o) / _) / __) / / / __ // _) / \\ / (_/ // \\/ / \\ (_ ) (_/ (_/ (_/(_​___) (_​___)(_​____/(_/\\_)(_​___)(___/ O O O O oOOoooOooOo /=​=========\|=​=========\\ oO8OoO@o@oOoOoOo \|O\|\|O\|\|O\|\|O\|\|O\|\|O\|\|O\| oOoO@Oo8oOoo@oOo8@OoO /=​==========\|=​=========\\ ooOo8oOoOoO@00OoO\*OoOoOo /=​============\|=​===========\\ oOo8oOo\*JeanDupree\*ooo8oO@OoOo -​------------------------------- oOoOoOo\*8OoOoOoOoO8OoOoOoOo8oOoO \*\|\|O\|\|O\|\|O\|\|O\|\|00\|\|O\|\|O\|\|O\|\|O\|\|\* \*ooOooOooOooOoo@\*ooOooO8oOooOoo\* \|\|\* \*\|\|\* \*\|\|\* \*\|\| Admin: O \*ooO x XXXX\*Oo\* @ \*o \|\| \|\| \*8v) \|\| \|\| anDrea Oo xXXXX\*oo \|\| =B^) \|\| \|\| =) \|\| David xXX@Xx \|\| \|\| \|\| \|\| Justin XXXX \|\|\|XXXXXXX\|\|::::::::\|\|XXXXXXX\|\|\| starfLyer xXXXXXXx \|\|\|XXXXXXX\|\|_​_______\|\|XXXXXXX\|\|\| Zaphod xxXXXXXXXXXXXXXx =​====================================================================== Copyright 1996 'Burbs Administration, all rights reserved. Please enter your name: Please enter a name:

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

21cbe4a25a62243a

This fingerprint is shared by 6 other servers.

Options offered by server: EOR

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "21cbe4a25a62243a",
    "fingerprint-data": {
      "offered-options": [
        "EOR"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Please enter a name:",
      "banner_before_return": "  ____  _   _  ____    ( ) __    _   _  ___   __    ___\r\n (_  _)/ (_/ )/ ___)   |/ / _)  / ) / )/  o) / _)  / __)\r\n  / / / __  // _)        /  \\  / (_/ //  \\/ /  \\  (_  )\r\n (_/ (_/ (_/(____)      (____)(_____/(_/\\_)(____)(___/   O O O O\r\n                                                 oOOoooOooOo \r\n       /==========|==========\\                oO8OoO@o@oOoOoOo\r\n        |O||O||O||O||O||O||O|               oOoO@Oo8oOoo@oOo8@OoO\r\n      /===========|==========\\             ooOo8oOoOoO@00OoO*OoOoOo\r\n    /=============|============\\         oOo8oOo*JeanDupree*ooo8oO@OoOo\r\n  --------------------------------    oOoOoOo*8OoOoOoOoO8OoOoOoOo8oOoO\r\n  *||O||O||O||O||00||O||O||O||O||*    *ooOooOooOooOoo@*ooOooO8oOooOoo*\r\n   ||*     *||*      *||*     *||  Admin: O  *ooO x XXXX*Oo*  @  *o\r\n   ||       ||  *8v)  ||       ||    anDrea    Oo  xXXXX*oo\r\n   || =B^)  ||        ||  =)   ||    David         xXX@Xx\r\n   ||       ||        ||       ||    Justin         XXXX\r\n  |||XXXXXXX||::::::::||XXXXXXX|||   starfLyer    xXXXXXXx\r\n  |||XXXXXXX||________||XXXXXXX|||   Zaphod    xxXXXXXXXXXXXXXx\r\n=======================================================================\r\nCopyright 1996 'Burbs Administration, all rights reserved.\r\nPlease enter your name:",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": false,
          "EOR": true
        },
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5079615116119385,
        "total": 5.164351463317871
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:11:11.495872+00:00",
      "host": "burbs.org",
      "ip": "47.176.57.117",
      "port": 4567
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug burbs.org 4567
Show Logfile
DEBUG client.py:965 Fingerprint client: host=burbs.org port=4567
INFO client_base.py:175 Connected to <Peer 47.176.57.117 4567>
DEBUG client_base.py:492 negotiation complete after 0.01s.
DEBUG stream_writer.py:707 recv IAC WILL EOR
DEBUG stream_writer.py:723 WILL EOR unsolicited
DEBUG stream_writer.py:1900 handle_will(EOR)
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 remote_option[EOR] = True
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT ECHO
DEBUG stream_writer.py:2025 handle_wont(ECHO)
DEBUG stream_writer.py:3174 remote_option[ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:1342 IAC EOR: End of Record (unhandled).
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint 21cbe4a25a62243a
INFO client_base.py:106 Connection closed to <Peer 47.176.57.117 4567>

resort.org:2323

Connection Banner:

[resort.org 2323] :::::::::::: A 24-hour multi-user chat program :::::::::::: ::::::::::::::::::::::':::::''::::::::::::::::::::::::::::::::::::::::::::::: ::::::::::: '',@@ooo,@@o,,''':::::::::',oo,,':::::::::::! !::::::::: :::::',oooo \`@@@@@@@@@@@@@@ooooooooo@@@@@@@o,'::::::::! !::::',,,, ::',o@@@@@@ !o, }@@P \`"@@@@@P' @@@' \`"@@o,'' '! ''',o@@@@ ',o@@@@@@@@ !" ,@P' ,, \`@@@P @' , \`@@' ! !@@@@@@@ -​---------- ! <-- - --- ,-- --- -- dk! -​-------- !#​######### !, '#, \`#​#"####"' ### \`#' ## ##, \`Y#​###### !#​######### !#, \`##, \`### ,###k ,d## ###, !#​###### !#​#########____!#​#_____###x,__,x#​##__,,x#​#####x,___,x#​###____#####x,_​_####### !Heckler".:::',F.:::',".:::::::',#".:::.\`#​###".::::::.\`##,:::.\`###':::.\`#​#### !#​####".:::',F.:::',#'.:::','' #​#".:::::.\`## ::::::::::.\`#,:::.\`##.'::::.\`### !#​##".:::','.:::',#'.:::',"​""""""\`,,'::::.\`# ::::'##,':::.\`,':::."#,':::::'## !#".::::,'.:::',#​#".::::/:::::::' ## ::::: " ::::.​"## ::::.\`,':::.\`#,'::::.\`" ".::::,'.::::: }#".:::::\\x".:::',### ::::::: ':::::...:::::.",':::::.: '::::: ::::',.::::::',## ::::::..::::',#​### ':::::: ,'::::::::::::: ##,'::::::."'::: ::',##F.::::',### ::::::::::' x#​####x,'::::: # Admin: Biff, phantom & David. : x#F.:::::',#​###x '::::::' ,#​########x,'''' # Based on EW-Too by S. Marsh... The Resort is intended for mature users. Parental discretion is advised. Please enter your name: Thats a bit short, try something longer. Please enter a name:

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

142bd2b43b236d82

This fingerprint is unique to this server.

Options offered by server: EOR

Options requested from client: TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "142bd2b43b236d82",
    "fingerprint-data": {
      "offered-options": [
        "EOR"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": " Thats a bit short, try something longer.\r\n\r\nPlease enter a name:",
      "banner_before_return": "[resort.org 2323] :::::::::::: A 24-hour multi-user chat program ::::::::::::\r\n::::::::::::::::::::::':::::'':::::::::::::::::::::::::::::::::::::::::::::::\r\n:::::::::::        '',@@ooo,@@o,,''':::::::::',oo,,':::::::::::!   !:::::::::\r\n:::::',oooo          `@@@@@@@@@@@@@@ooooooooo@@@@@@@o,'::::::::!   !::::',,,,\r\n::',o@@@@@@    !o,    }@@P     `\"@@@@@P'   @@@'    `\"@@o,''   '!    ''',o@@@@\r\n',o@@@@@@@@    !\"    ,@P'   ,,   `@@@P     @'    ,    `@@'     !     !@@@@@@@\r\n-----------    !    <--    -      ---    ,--    ---    --    dk!    ---------\r\n!##########    !,    '#,   `##\"####\"'    ###    `#'    ##    ##,    `Y#######\r\n!##########    !#,   `##,      `###     ,###k        ,d##    ###,    !#######\r\n!##########____!##_____###x,__,x###__,,x######x,___,x####____#####x,__#######\r\n!Heckler\".:::',F.:::',\".:::::::',#\".:::.`####\".::::::.`##,:::.`###':::.`#####\r\n!#####\".:::',F.:::',#'.:::','' ##\".:::::.`## ::::::::::.`#,:::.`##.'::::.`###\r\n!###\".:::','.:::',#'.:::',\"\"\"\"\"\"\"`,,'::::.`# ::::'##,':::.`,':::.\"#,':::::'##\r\n!#\".::::,'.:::',##\".::::/:::::::' ## ::::: \" ::::.\"## ::::.`,':::.`#,'::::.`\"\r\n\".::::,'.::::: }#\".:::::\\x\".:::',### ::::::: ':::::...:::::.\",':::::.: ':::::\r\n::::',.::::::',## ::::::..::::',#### ':::::: ,'::::::::::::: ##,'::::::.\"':::\r\n::',##F.::::',### ::::::::::' x#####x,'::::: # Admin: Biff, phantom & David.\r\n: x#F.:::::',####x '::::::' ,#########x,'''' # Based on EW-Too by S. Marsh...\r\n\r\n  The Resort is intended for mature users. Parental discretion is advised.\r\n\r\nPlease enter your name:\u0019",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "EOR": true
        },
        "server_requested": {
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5097944736480713,
        "total": 5.167112588882446
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:10:06.591786+00:00",
      "host": "resort.org",
      "ip": "47.176.57.117",
      "port": 2323
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug resort.org 2323
Show Logfile
DEBUG client.py:965 Fingerprint client: host=resort.org port=2323
INFO client_base.py:175 Connected to <Peer 47.176.57.117 2323>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC WILL EOR
DEBUG stream_writer.py:723 WILL EOR unsolicited
DEBUG stream_writer.py:1900 handle_will(EOR)
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 remote_option[EOR] = True
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:664 IAC EOR: not a legal 2-byte cmd, treating as data
DEBUG stream_writer.py:1342 IAC EOR: End of Record (unhandled).
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:737 new server fingerprint 142bd2b43b236d82
INFO client_base.py:106 Connection closed to <Peer 47.176.57.117 2323>