64.182.46.5 (cleftofdimension.com)

cleftofdimension.com:9000

Connection Banner:

Do you want ANSI color? [Y/n] Ansi enabled! _​______ _ _ _​____ _​___ _ _​____ _​____ _​______ \|__ __\| \| \| \| \| \| __/ / __ \\ \| \| \| __/ \| __/ \|__ __\| \| \| \| \|__\| \| \| \|__ / / \\/ \| \| \| \|__ \| \|__ \| \| \| \| \| __ \| \| __> ( ( \| \| \| __> \| __> \| \| \| \| \| \| \| \| \| \|__ \\ \\__/\\ \| \|__/\\ \| \|__ \| \| \| \| \\ / \|_\| \|_\| \|_​___\\ \\_​___/ \|_​____/ \|_​___\\ \|_\| \\ / V __ V o /\|\\ _​____ / \\ _/_ / \| \\ \| __/ _​___ \| '\|\\ /_ \\ \|\\ / \\ /\| \| \|__ \\ \\ \\___/ /\\/ O_ //\\ \| \| \| \| \| __> \\__ \\ / \| \\ \| \| \| \| \| \| \\\|_/__/ \\ \|_\|\\\|/ \|/ \\ / \\\| \| \| /// (___/ \\ \| / \\ / \\\\\\ \\\|/ V \\\|>> _​____ _ __ __ _​____ __ _ _​___ _ _​___ __ _ \| __ \\ \| \| \| \\ / \| \| __/ \| \\ \| \| / ___\| \| \| / \\ \| \\ \| \| \| \| \\ \| \| \| \| \\/ \| \| \|__ \| \\ \| \| \| \\__ \| \| \| /\\ \| \| \\ \| \| \| \| ( \| \| \| \| \|\\ /\| \| \| __> \| \|\\ \\\| \| \\__ \\ \| \| \| ( ) \| \| \|\\ \\\| \| \| \|__/ \| \| \| \| \| \\/ \| \| \| \|__ \| \| \\ \| ___\\ \| \| \| \| \\/ \| \| \| \\ \| \|_​____/ \|_\| \|_\| \|_\| \|_​___\\ \|_\| \\__\| \|_​___/ \|_\| \\_​___/ \|_\| \\__\| ROM Version 2.4 beta Original DikuMUD by Hans Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer Based on MERC 2.1 code by Hatchet, Furey, and Kahn ROM 2.4 copyright (c) 1993-1998 Russ Taylor There came a day upon which the Cleft of Dimension itself folded, leaving only the End of Time in its wake... Please redirect to port 4000 for the newest and improved version of this MUD that has been in development since early 2001! Take note that this MUD is no longer actively supported or supervised, but remains up for archival and nostalgia purposes. What do they call you?

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

c2dd7d4e76383b41

This fingerprint is shared by 173 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u001b[0;35mAnsi enabled!\u001b[0m\n\r\n\r \n\r\u001b[0;36m  _______   _    _   _____    \u001b[0;35m      ____   _       _____  _____  _______\n\r\u001b[0;36m |__   __| | |  | | |  __/    \u001b[0;35m     / __ \\ | |     |  __/ |  __/ |__   __|\n\r\u001b[0;36m    | |    | |__| | | |__     \u001b[0;35m    / /  \\/ | |     | |__  | |__     | |\n\r\u001b[0;36m    | |    |  __  | |  __>    \u001b[0;35m   ( (      | |     |  __> |  __>    | |\n\r\u001b[0;36m    | |    | |  | | | |__     \u001b[0;35m    \\ \\__/\\ | |__/\\ | |__  | |       | |\n\r\u001b[0;36m    \\ /    |_|  |_| |____\\    \u001b[0;35m     \\____/ |_____/ |____\\ |_|       \\ /\n\r\u001b[0;36m     V                                                      \u001b[1;33m __   \u001b[0;35m  V\n\r\u001b[0m                 \u001b[1;33mo        \u001b[1;32m     /|\\    \u001b[0;33m  _____           \u001b[1;33m    /  \\\n\r\u001b[0m              \u001b[1;37m _\u001b[0;33m/\u001b[1;37m_        \u001b[1;32m   /  |  \\  \u001b[0;33m |  __/    \u001b[1;33m   ____    | \u001b[1;37m'\u001b[0;33m|\\\n\r\u001b[0m           \u001b[1;37m   /_  \\       \u001b[1;32m  |\\ / \\\u001b[0;32m /|\u001b[0;33m  | |__      \u001b[1;33m  \\ \\ \\___/ /\u001b[0;33m\\/\n\r\u001b[0m            \u001b[1;35m O\u001b[1;37m_   /\u001b[1;31m/\\     \u001b[1;32m  | |   |\u001b[0;32m | \u001b[0;33m |  __>    \u001b[1;33m    \\__      \\\n\r\u001b[0m            \u001b[1;37m  /   | \u001b[1;31m \\    \u001b[1;32m  | |   |\u001b[0;32m | \u001b[0;33m | |           \u001b[1;33m   \\|_/__/\n\r\u001b[0m             \u001b[1;37m \\ |_|\u001b[1;31m\\\u001b[0;31m|\u001b[1;31m/    \u001b[1;32m  |/ \\ / \u001b[0;32m\\\u001b[1;30m|\u001b[0;33m  | |       \u001b[0;33m        ///\n\r\u001b[0m             \u001b[1;37m (___/       \u001b[1;32m   \\  |\u001b[1;30m  /   \u001b[0;33m\\ /              \u001b[0;33m \\\\\\\n\r\u001b[0m                          \u001b[1;32m     \u001b[0;32m\\|\u001b[1;30m/   \u001b[0;33m   V               \u001b[0;33m \\\u001b[0;37m|>>\n\r\u001b[1;30m   _____    _ \u001b[0;37m  __    __   _____\u001b[1;37m  __    _ \u001b[0;37m   ____   _ \u001b[1;30m   ____    __    _\n\r\u001b[1;30m  |  __ \\  | |\u001b[0;37m |  \\  /  | |  __/\u001b[1;37m |  \\  | |\u001b[0;37m  / ___| | |\u001b[1;30m  /    \\  |  \\  | |\n\r\u001b[1;30m  | |  \\ | | |\u001b[0;37m |   \\/   | | |__ \u001b[1;37m |   \\ | |\u001b[0;37m | \\__   | |\u001b[1;30m |  /\\  | |   \\ | |\n\r\u001b[1;30m  | |  ( | | |\u001b[0;37m | |\\  /| | |  __>\u001b[1;37m | |\\ \\| |\u001b[0;37m  \\__ \\  | |\u001b[1;30m | (  ) | | |\\ \\| |\n\r\u001b[1;30m  | |__/ | | |\u001b[0;37m | | \\/ | | | |__ \u001b[1;37m | | \\   |\u001b[0;37m  ___\\ | | |\u001b[1;30m |  \\/  | | | \\   |\n\r\u001b[1;30m  |_____/  |_|\u001b[0;37m |_|    |_| |____\\\u001b[1;37m |_|  \\__|\u001b[0;37m |____/  |_|\u001b[1;30m  \\____/  |_|  \\__|\n\r \n\r\u001b[0;37m                           ROM Version 2.4 beta\n\r\u001b[0;37m             Original DikuMUD by Hans Staerfeldt, Katja Nyboe,\n\r\u001b[0;37m             Tom Madsen, Michael Seifert, and Sebastian Hammer\n\r\u001b[0;37m             Based on MERC 2.1 code by Hatchet, Furey, and Kahn\n\r\u001b[0;37m                ROM 2.4 copyright (c) 1993-1998 Russ Taylor\n\r \n\rThere came a day upon which the Cleft of Dimension itself folded, leaving\n\ronly the End of Time in its wake...\n\r \n\r\u001b[1;31mPlease redirect to port 4000 for the newest and improved version of this\n\rMUD that has been in development since early 2001!\u001b[0;37m\n\r \n\rTake note that this MUD is no longer actively supported or supervised, but\n\rremains up for archival and nostalgia purposes.\n\r \n\r\u001b[0;31mWhat do they call you?\u001b[0;37m \n\r",
      "banner_before_return": "\n\r\n\rDo you want ANSI color? [Y/n] ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 5.0928239822387695
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:10:23.174167+00:00",
      "host": "cleftofdimension.com",
      "ip": "64.182.46.5",
      "port": 9000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug cleftofdimension.com 9000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=cleftofdimension.com port=9000
INFO client_base.py:175 Connected to <Peer 64.182.46.5 9000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 64.182.46.5 9000>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41

End of Time (eotmud.com:4000)

Connection Banner:

View End of Time in full (Y) or screen reader (N) mode? FULL MODE enabled!<VERSION>

Server URLs

Server Info

  • Codebase: Rom (EoT Custom)

  • Genre: Fantasy

  • Gameplay: Hack and Slash

  • Players online: 0 [1]

  • Uptime: 77 days

  • Created: 2005

  • Status: Live

  • Server Location: 🇺🇸 United States of America (MSSP)

  • Language: English

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation.

  • MSSP: Yes (MSSP)

  • GMCP: Yes (MSSP)

  • MSDP: Yes (MSSP)

  • MCCP: No

  • MCCP2: No

  • MXP: Yes (MSSP)

  • MSP: Yes (MSSP)

  • MCP: No

  • ZMP: No

Telnet Fingerprint

a4bdc4c986971b11

This fingerprint is shared by 1 other server.

Options offered by server: ECHO, GMCP, MSDP, MSP, MSSP, MXP

Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "a4bdc4c986971b11",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "ATCP",
        "CHARSET",
        "MXP",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u001b[38;5;051mFULL MODE enabled!\u001b[0;00m\u001b[1z<VERSION>\u001b[7z\r\n",
      "banner_before_return": "\r\nView End of Time in full (Y) or screen reader (N) mode? \u001b[7z",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "UTF-8",
      "mssp": {
        "ADULT MATERIAL": "0",
        "ANSI": "1",
        "AREAS": "183",
        "ATCP": "1",
        "CLASSES": "36",
        "CODEBASE": "Rom (EoT Custom)",
        "CRAWL DELAY": "-1",
        "CREATED": "2005",
        "EQUIPMENT SYSTEM": "Both",
        "EXITS": "92890",
        "EXTRA DESCRIPTIONS": "949",
        "FAMILY": "DikuMUD",
        "GAMEPLAY": "Hack and Slash",
        "GAMESYSTEM": "None",
        "GENRE": "Fantasy",
        "GMCP": "1",
        "HELPFILES": "1342",
        "HIRING BUILDERS": "1",
        "HIRING CODERS": "0",
        "HOSTNAME": "eotmud.com",
        "INTERMUD": "",
        "IP": "66.221.0.71",
        "LANGUAGE": "English",
        "LEVELS": "80",
        "LOCATION": "United States of America",
        "MCCP": "0",
        "MCP": "0",
        "MINIMUM AGE": "0",
        "MOBILES": "4362",
        "MSDP": "1",
        "MSP": "1",
        "MULTICLASSING": "0",
        "MULTIPLAYING": "Yes",
        "MXP": "1",
        "NAME": "End of Time",
        "NEWBIE FRIENDLY": "1",
        "OBJECTS": "7474",
        "PAY FOR PERKS": "0",
        "PAY TO PLAY": "0",
        "PLAYER CITIES": "0",
        "PLAYER CLANS": "1",
        "PLAYER CRAFTING": "1",
        "PLAYER GUILDS": "0",
        "PLAYERKILLING": "Restricted",
        "PLAYERS": "0",
        "PORT": "4000",
        "PUEBLO": "0",
        "QUEST SYSTEM": "Immortal Run, Integrated",
        "RACES": "9",
        "RESETS": "8415",
        "ROLEPLAYING": "Accepted",
        "ROOMS": "16987",
        "SKILLS": "224",
        "SSL": "0",
        "STATUS": "Live",
        "SUBGENRE": "Final Fantasy",
        "TRAINING SYSTEM": "Both",
        "UPTIME": "1764366783",
        "UTF-8": "1",
        "VT100": "0",
        "WEBSITE": "http://www.eotmud.com",
        "WORLD ORIGINALITY": "All Original",
        "XTERM 256 COLORS": "1",
        "ZMP": "0"
      },
      "mxp": [
        "activated"
      ],
      "option_states": {
        "server_offered": {
          "GMCP": true,
          "MSDP": true,
          "MSP": true,
          "MSSP": true
        },
        "server_requested": {
          "ATCP": true,
          "CHARSET": true,
          "MXP": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5210084915161133,
        "total": 5.391800165176392
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:09:28.744904+00:00",
      "host": "eotmud.com",
      "ip": "64.182.46.5",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug eotmud.com 4000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=eotmud.com port=4000
INFO client_base.py:175 Connected to <Peer 64.182.46.5 4000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:707 recv IAC WILL GMCP
DEBUG stream_writer.py:723 WILL GMCP unsolicited
DEBUG stream_writer.py:1900 handle_will(GMCP)
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 remote_option[GMCP] = True
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'End of Time'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'End of Time', 'PLAYERS': '0', 'UPTIME': '1764366783', 'CRAWL DELAY': '-1', 'HOSTNAME':
    'eotmud.com', 'PORT': '4000', 'CODEBASE': 'Rom (EoT Custom)', 'CREATED': '2005', 'IP': '66.221.0.71', 'LANGUAGE': 'English',
    'LOCATION': 'United States of America', 'MINIMUM AGE': '0', 'WEBSITE': 'http://www.eotmud.com', 'FAMILY': 'DikuMUD', 'GENRE':
    'Fantasy', 'GAMEPLAY': 'Hack and Slash', 'STATUS': 'Live', 'GAMESYSTEM': 'None', 'INTERMUD': '', 'SUBGENRE': 'Final Fantasy',
    'AREAS': '183', 'HELPFILES': '1342', 'MOBILES': '4362', 'OBJECTS': '7474', 'ROOMS': '16987', 'CLASSES': '36', 'LEVELS': '80',
    'RACES': '9', 'SKILLS': '224', 'ANSI': '1', 'GMCP': '1', 'MCCP': '0', 'MCP': '0', 'MSDP': '1', 'MSP': '1', 'MXP': '1',
    'PUEBLO': '0', 'UTF-8': '1', 'VT100': '0', 'XTERM 256 COLORS': '1', 'PAY TO PLAY': '0', 'PAY FOR PERKS': '0', 'HIRING
    BUILDERS': '1', 'HIRING CODERS': '0', 'EXITS': '92890', 'EXTRA DESCRIPTIONS': '949', 'RESETS': '8415', 'ADULT MATERIAL': '0',
    'MULTICLASSING': '0', 'NEWBIE FRIENDLY': '1', 'PLAYER CITIES': '0', 'PLAYER CLANS': '1', 'PLAYER CRAFTING': '1', 'PLAYER
    GUILDS': '0', 'EQUIPMENT SYSTEM': 'Both', 'MULTIPLAYING': 'Yes', 'PLAYERKILLING': 'Restricted', 'QUEST SYSTEM': 'Immortal Run,
    Integrated', 'ROLEPLAYING': 'Accepted', 'TRAINING SYSTEM': 'Both', 'WORLD ORIGINALITY': 'All Original', 'ATCP': '1', 'SSL':
    '0', 'ZMP': '0'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT b'\xfc'
DEBUG stream_writer.py:2025 handle_wont(WONT)
DEBUG stream_writer.py:3174 remote_option[WONT] = False
DEBUG stream_writer.py:3174 pending_option[DO + WONT] = False
DEBUG stream_writer.py:707 recv IAC WILL ECHO
DEBUG stream_writer.py:1900 handle_will(ECHO)
DEBUG stream_writer.py:924 skip DO ECHO; pending_option = True
DEBUG stream_writer.py:3174 remote_option[ECHO] = True
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC WILL MXP
DEBUG stream_writer.py:1900 handle_will(MXP)
DEBUG stream_writer.py:924 skip DO MXP; pending_option = True
DEBUG stream_writer.py:3174 remote_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT ZMP
DEBUG stream_writer.py:2025 handle_wont(ZMP)
DEBUG stream_writer.py:3174 remote_option[ZMP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:737 new server fingerprint a4bdc4c986971b11
INFO client_base.py:106 Connection closed to <Peer 64.182.46.5 4000>

StockMUD [ROM] (stockmud.com:5000)

Connection Banner:

Do you want ANSI? (Y/n) <VERSION> Ansi enabled! Welcome To... \*\*\*\*\*\*\*\* \*\* \*\* \*\*\*\* \*\*\*\* \*\* \*\* \*\*\*\*\*\*\* \*\*////// /\*\* /\*\* /\*\*/\*\* \*\*/\*\*/\*\* /\*\*/\*\*////\*\* /\*\* \*\*\*\*\*\* \*\*\*\*\*\* \*\*\*\*\* /\*\* \*\*/\*\*//\*\* \*\* /\*\*/\*\* /\*\*/\*\* /\*\* /\*\*\*\*\*\*\*\*\*///\*\*/ \*\*////\*\* \*\*///\*\*/\*\* \*\* /\*\* //\*\*\* /\*\*/\*\* /\*\*/\*\* /\*\* ////////\*\* /\*\* /\*\* /\*\*/\*\* // /\*\*\*\* /\*\* //\* /\*\*/\*\* /\*\*/\*\* /\*\* /\*\* /\*\* /\*\* /\*\*/\*\* \*\*/\*\*/\*\* /\*\* / /\*\*/\*\* /\*\*/\*\* \*\* \*\*\*\*\*\*\*\* //\*\* //\*\*\*\*\*\* //\*\*\*\*\* /\*\*//\*\*/\*\* /\*\*//\*\*\*\*\*\*\* /\*\*\*\*\*\*\* //////// // ////// ///// // // // // /////// /////// _​_____ _​____ _​______ \|_​____/ \| \| \| \| \| \| \\_ \|_​____\| \| \| \| -​------------------------------------------------------------------------- Original DikuMUD by Hans Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer Based on MERC 2.1 code by Hatchet, Furey & Kahn ROM 2.4 copyright (c) 1993-1998 Russ Taylor By what name do you wish to be known?

Server URLs

Server Info

  • Codebase: ROM 2.4

  • Genre: Fantasy

  • Gameplay: Hack and Slash

  • Players online: 0 [2]

  • Uptime: 23 days

  • Created: 2019

  • Status: Live

  • Server Location: 🇺🇸 United States of America (MSSP)

  • Language: English

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation.

  • MSSP: Yes (MSSP)

  • GMCP: Yes (MSSP)

  • MSDP: Yes (MSSP)

  • MCCP: No

  • MCCP2: No

  • MXP: Yes (MSSP)

  • MSP: Yes (MSSP)

  • MCP: No

  • ZMP: No

Telnet Fingerprint

a4bdc4c986971b11

This fingerprint is shared by 1 other server.

Options offered by server: ECHO, GMCP, MSDP, MSP, MSSP, MXP

Options requested from client: ATCP, CHARSET, MXP, NAWS, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "a4bdc4c986971b11",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "ATCP",
        "CHARSET",
        "MXP",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u001b[1z<VERSION>\u001b[7z\r\n\u001b[38;5;102mAnsi enabled!\u001b[0;00m\r\n\u001b[38;5;188m \n\r\u001b[38;5;188m Welcome To...\n\r\u001b[38;5;188m \n\r\u001b[38;5;231m  ********   **                    **     ****     **** **     ** *******\u001b[38;5;188m\n\r\u001b[38;5;231m **\u001b[0;00m\u001b[38;5;241m//////   /\u001b[38;5;231m**                   \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**   **\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m////\u001b[38;5;231m**\u001b[38;5;188m\n\r\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**        ******  ******   ***** \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**  **\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m** ** \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[38;5;188m\n\r\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m*********\u001b[0;00m\u001b[38;5;241m///\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/  \u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m////\u001b[38;5;231m** **\u001b[0;00m\u001b[38;5;241m///\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m** ** \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m** \u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m***  \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[38;5;188m\n\r\u001b[0;00m\u001b[38;5;241m////////\u001b[38;5;231m**  \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**  \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**   \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**  \u001b[0;00m\u001b[38;5;241m// /\u001b[38;5;231m****  \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**  \u001b[38;5;102m//\u001b[38;5;231m*   \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[38;5;188m\n\r\u001b[0;00m\u001b[38;5;241m       /\u001b[38;5;231m**  \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**  \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**   \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**   **\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m** \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**   \u001b[0;00m\u001b[38;5;241m/    /\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**    **\u001b[38;5;188m\n\r\u001b[38;5;231m ********   \u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m** \u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m****** \u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m***** \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**        \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m**\u001b[0;00m\u001b[38;5;241m//\u001b[38;5;231m******* \u001b[0;00m\u001b[38;5;241m/\u001b[38;5;231m*******\u001b[38;5;188m\n\r\u001b[0;00m\u001b[38;5;241m////////     //   //////   /////  //  // //         //  ///////  ///////\u001b[38;5;188m\n\r\u001b[38;5;046m                                                 ______  _____  _______\u001b[38;5;188m\n\r\u001b[38;5;046m                                                |_____/ |     | |  |  |\u001b[38;5;188m\n\r\u001b[38;5;046m                                                |    \\_ |_____| |  |  |\u001b[38;5;188m\n\r\u001b[0;00m\u001b[38;5;241m --------------------------------------------------------------------------\u001b[38;5;188m\n\r\u001b[38;5;188m             Original DikuMUD by Hans Staerfeldt, Katja Nyboe,\n\r\u001b[38;5;188m             Tom Madsen, Michael Seifert, and Sebastian Hammer\n\r\u001b[38;5;188m              Based on MERC 2.1 code by Hatchet, Furey & Kahn\n\r\u001b[38;5;188m                ROM 2.4 copyright (c) 1993-1998 Russ Taylor\n\r\u001b[38;5;188m \n\r\u001b[38;5;188mBy what name do you wish to be known? \n\r",
      "banner_before_return": "Do you want ANSI? (Y/n) \u001b[7z",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "UTF-8",
      "mssp": {
        "ANSI": "1",
        "AREAS": "49",
        "CLASSES": "4",
        "CODEBASE": "ROM 2.4",
        "CRAWL DELAY": "-1",
        "CREATED": "2019",
        "FAMILY": "DikuMUD",
        "GAMEPLAY": "Hack and Slash",
        "GAMESYSTEM": "None",
        "GENRE": "Fantasy",
        "GMCP": "1",
        "HELPFILES": "274",
        "HIRING BUILDERS": "0",
        "HIRING CODERS": "0",
        "HOSTNAME": "stockmud.com",
        "INTERMUD": "",
        "IP": "66.221.0.71",
        "LANGUAGE": "English",
        "LEVELS": "51",
        "LOCATION": "United States of America",
        "MCCP": "0",
        "MCP": "0",
        "MINIMUM AGE": "0",
        "MOBILES": "986",
        "MSDP": "1",
        "MSP": "1",
        "MXP": "1",
        "NAME": "StockMUD [ROM]",
        "OBJECTS": "1268",
        "PAY FOR PERKS": "0",
        "PAY TO PLAY": "0",
        "PLAYERS": "0",
        "PORT": "5000",
        "PUEBLO": "0",
        "RACES": "4",
        "ROOMS": "3130",
        "SKILLS": "134",
        "STATUS": "Live",
        "SUBGENRE": "",
        "UPTIME": "1769052381",
        "UTF-8": "1",
        "VT100": "0",
        "WEBSITE": "http://www.stockmud.com",
        "XTERM 256 COLORS": "1"
      },
      "mxp": [
        "activated"
      ],
      "option_states": {
        "server_offered": {
          "GMCP": true,
          "MSDP": true,
          "MSP": true,
          "MSSP": true
        },
        "server_requested": {
          "ATCP": true,
          "CHARSET": true,
          "MXP": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.506894588470459,
        "total": 8.017112731933594
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:12:29.153037+00:00",
      "host": "stockmud.com",
      "ip": "64.182.46.5",
      "port": 5000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug stockmud.com 5000
Show Logfile
DEBUG client.py:965 Fingerprint client: host=stockmud.com port=5000
INFO client_base.py:175 Connected to <Peer 64.182.46.5 5000>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WILL MSDP
DEBUG stream_writer.py:723 WILL MSDP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSDP)
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 remote_option[MSDP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC DO ATCP
DEBUG stream_writer.py:1770 handle_do(ATCP)
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:950 send IAC WILL ATCP
DEBUG stream_writer.py:3174 local_option[ATCP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:707 recv IAC WILL MSP
DEBUG stream_writer.py:723 WILL MSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 remote_option[MSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC DO MXP
DEBUG stream_writer.py:1770 handle_do(MXP)
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:950 send IAC WILL MXP
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 local_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:707 recv IAC WILL GMCP
DEBUG stream_writer.py:723 WILL GMCP unsolicited
DEBUG stream_writer.py:1900 handle_will(GMCP)
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 remote_option[GMCP] = True
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:686 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2065 [SB + CHARSET] unsolicited
DEBUG client.py:304 encoding negotiated: UTF-8
DEBUG stream_writer.py:2149 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:686 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1669 MSDP: {'SERVER_ID': 'StockMUD [ROM]'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:686 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2065 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1673 MSSP: {'NAME': 'StockMUD [ROM]', 'PLAYERS': '0', 'UPTIME': '1769052381', 'CRAWL DELAY': '-1',
    'HOSTNAME': 'stockmud.com', 'PORT': '5000', 'CODEBASE': 'ROM 2.4', 'CREATED': '2019', 'IP': '66.221.0.71', 'LANGUAGE':
    'English', 'LOCATION': 'United States of America', 'MINIMUM AGE': '0', 'WEBSITE': 'http://www.stockmud.com', 'FAMILY':
    'DikuMUD', 'GENRE': 'Fantasy', 'GAMEPLAY': 'Hack and Slash', 'STATUS': 'Live', 'GAMESYSTEM': 'None', 'INTERMUD': '',
    'SUBGENRE': '', 'AREAS': '49', 'HELPFILES': '274', 'MOBILES': '986', 'OBJECTS': '1268', 'ROOMS': '3130', 'CLASSES': '4',
    'LEVELS': '51', 'RACES': '4', 'SKILLS': '134', 'ANSI': '1', 'GMCP': '1', 'MCCP': '0', 'MCP': '0', 'MSDP': '1', 'MSP': '1',
    'MXP': '1', 'PUEBLO': '0', 'UTF-8': '1', 'VT100': '0', 'XTERM 256 COLORS': '1', 'PAY TO PLAY': '0', 'PAY FOR PERKS': '0',
    'HIRING BUILDERS': '0', 'HIRING CODERS': '0'}
DEBUG stream_writer.py:699 begin sub-negotiation SB MXP
DEBUG stream_writer.py:686 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = False
DEBUG stream_writer.py:1682 MXP: b''
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT b'\xfc'
DEBUG stream_writer.py:2025 handle_wont(WONT)
DEBUG stream_writer.py:3174 remote_option[WONT] = False
DEBUG stream_writer.py:3174 pending_option[DO + WONT] = False
DEBUG stream_writer.py:707 recv IAC WILL ECHO
DEBUG stream_writer.py:1900 handle_will(ECHO)
DEBUG stream_writer.py:924 skip DO ECHO; pending_option = True
DEBUG stream_writer.py:3174 remote_option[ECHO] = True
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC WILL MXP
DEBUG stream_writer.py:1900 handle_will(MXP)
DEBUG stream_writer.py:924 skip DO MXP; pending_option = True
DEBUG stream_writer.py:3174 remote_option[MXP] = True
DEBUG stream_writer.py:3174 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT ZMP
DEBUG stream_writer.py:2025 handle_wont(ZMP)
DEBUG stream_writer.py:3174 remote_option[ZMP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint a4bdc4c986971b11
INFO client_base.py:106 Connection closed to <Peer 64.182.46.5 5000>