71.56.69.213 (motm.kicks-ass.net)

motm.kicks-ass.net:2002

Connection Banner:

=. access granted .= _ __ ___ _​___ ..'',,,,''.. .,coddoddddddddddoddoc,. .;ldddl;'.. .';ldddl,. ,okdc'. .​...... .'cdko' ;xkl. .​.......... .lkx; ,xk:. .​............ .:kx' .lOl. .​............... .lOl. .xO, .​.... .​.... ,Ox. .xk' .​... .​... 'Ok. .dO' .​.... .​.... 'Od. cKc .​.... .​.... :Kc 888b cK d888 ...d88888b. 88888888888 888b d888 8888b d8888 ..d88 "Y88b "888.​... 8888b d8888 888 Y888P 888\`\`\`\`\`..888 888 888 .​....\`\`\`\`\`888 Y888P 888 888 Y8P 888''''...888 888 888 .​....''''888 Y8P 888 888 " 888 ...Y88b. "8P 888 .​.... 888 " 888 888 o0888 .​...."Y88888P" 888 .​.... 888 0o 888 o0, .​...... .​...... ,0o 'Ox. .​...... .​...... .xO' ;0o. .​.................................... .o0; :0o. .​.................................. .o0: ,kk' .​.............................. 'xk,\|~~\| .oOl. .lOo. \|__\|## 'dkl. .lkd \|_\| 'okd:. .;dko' ___ __ .;dxdl;. .;l.​---------------- .,codddol:;;;,,;;::lodddoc\| MotM: The Syndicate Wars .',:cloooooolc:;'. motm.kicks-ass.net 2002 http://motm.kicks-ass.net \| -​--------------' > _ connect <user> <password> to login connect guest guest to login as a guest __ _​___ ch <user> <password> to login hidden (Wizard only) \` \`\`\` help to get help QUIT to disconnect _​____ __ _ \* connect user pass logs in \* connect guest guest logs in as a guest \* ch user pass logs in hidden, if you are a wizard \* HELP Shows this help screen \* QUIT Disconnects

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

2bfcde31e3458de1

This fingerprint is shared by 5 other servers.

Options requested from client: CHARSET, NAWS, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "2bfcde31e3458de1",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "CHARSET",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": " \n* connect user pass\n  logs in\n \n* connect guest guest\n  logs in as a guest\n \n* ch user pass\n  logs in hidden, if you are a wizard\n \n* HELP\n  Shows this help screen\n \n* QUIT\n  Disconnects\n \n\n",
      "banner_before_return": "\n                            =. access granted .=                              \r\n                                                                              \r\n  _   __   ___   ____           ..'',,,,''..                                  \r\n                          .,coddoddddddddddoddoc,.                            \r\n                      .;ldddl;'..           .';ldddl,.                        \r\n                    ,okdc'.       .......        .'cdko'                      \r\n                  ;xkl.         ...........          .lkx;                    \r\n                ,xk:.          .............          .:kx'                   \r\n              .lOl.           ................           .lOl.                \r\n             .xO,            .....        .....            ,Ox.               \r\n            .xk'            ....            ....            'Ok.              \r\n           .dO'           .....              .....           'Od.             \r\n           cKc           .....                .....           :Kc             \r\n     888b  cK d888      ...d88888b.        88888888888       888b     d888    \r\n     8888b   d8888     ..d88   \"Y88b          \"888....       8888b   d8888    \r\n    888 Y888P 888`````..888     888           888 .....`````888 Y888P 888     \r\n    888  Y8P  888''''...888     888           888  .....''''888  Y8P  888     \r\n   888   \"   888    ...Y88b.   \"8P           888    .....  888   \"   888      \r\n   888     o0888   .....\"Y88888P\"            888     ..... 888 0o    888      \r\n           o0,    .......                           .......   ,0o             \r\n           'Ox.    .......                         .......   .xO'             \r\n            ;0o.    .....................................   .o0;              \r\n             :0o.    ...................................   .o0:               \r\n              ,kk'     ...............................    'xk,|~~|            \r\n               .oOl.                                    .lOo. |__|##          \r\n                 'dkl.                                .lkd      |_|           \r\n                   'okd:.                          .;dko'             ___ __  \r\n                     .;dxdl;.                  .;l.----------------            \r\n                        .,codddol:;;;,,;;::lodddoc| MotM: The Syndicate Wars   \r\n                             .',:cloooooolc:;'.     motm.kicks-ass.net 2002    \r\n                                                    http://motm.kicks-ass.net |\r\n                                                               ---------------'\r\n         > _\r\n           connect <user> <password>  to login\r\n           connect guest guest        to login as a guest\r\n  __ ____  ch <user> <password>       to login hidden (Wizard only)\r\n   `  ```  help                       to get help\r\n           QUIT                       to disconnect                 _____ __  _\r\n",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "0x56": false,
          "MSSP": false
        },
        "server_requested": {
          "CHARSET": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.35709238052368164,
        "total": 5.113609313964844
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:12:51.089118+00:00",
      "host": "motm.kicks-ass.net",
      "ip": "71.56.69.213",
      "port": 2002
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug motm.kicks-ass.net 2002
Show Logfile
DEBUG client.py:965 Fingerprint client: host=motm.kicks-ass.net port=2002
INFO client_base.py:175 Connected to <Peer 71.56.69.213 2002>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:723 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1900 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3174 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:950 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:2008 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT MSSP
DEBUG stream_writer.py:2025 handle_wont(MSSP)
DEBUG stream_writer.py:3174 remote_option[MSSP] = False
DEBUG stream_writer.py:707 recv IAC WONT MCCP2_COMPRESS
DEBUG stream_writer.py:2025 handle_wont(MCCP2_COMPRESS)
DEBUG stream_writer.py:3174 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT BINARY
DEBUG stream_writer.py:2025 handle_wont(BINARY)
DEBUG stream_writer.py:3174 remote_option[BINARY] = False
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:707 recv IAC WONT SGA
DEBUG stream_writer.py:2025 handle_wont(SGA)
DEBUG stream_writer.py:3174 remote_option[SGA] = False
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False
DEBUG stream_writer.py:707 recv IAC WONT ECHO
DEBUG stream_writer.py:2025 handle_wont(ECHO)
DEBUG stream_writer.py:3174 remote_option[ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC WONT GMCP
DEBUG stream_writer.py:2025 handle_wont(GMCP)
DEBUG stream_writer.py:3174 remote_option[GMCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:707 recv IAC WONT MSDP
DEBUG stream_writer.py:2025 handle_wont(MSDP)
DEBUG stream_writer.py:3174 remote_option[MSDP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WONT MSP
DEBUG stream_writer.py:2025 handle_wont(MSP)
DEBUG stream_writer.py:3174 remote_option[MSP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC WONT MXP
DEBUG stream_writer.py:2025 handle_wont(MXP)
DEBUG stream_writer.py:3174 remote_option[MXP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT ZMP
DEBUG stream_writer.py:2025 handle_wont(ZMP)
DEBUG stream_writer.py:3174 remote_option[ZMP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint 2bfcde31e3458de1
INFO client_base.py:106 Connection closed to <Peer 71.56.69.213 2002>

ranmamuck.dyndns.org:1212

Connection Banner:

.:::. +​------------+ :::::: \| \| ... .. :::: \| Welcome to \| ::::: :::: :::: \| RanmaMUCK! \| .::.\`\`' ..::.::::::::::::::::. :::: \| \| :::: .:::::\`::::::::::::::::' :::: +​------------+ :::: .​....., .:::::' .​.....::::.​..... \`' ::::.;:::::::;, .::::;' :::::::::::::::::; :::::::::::::: +​------------+ :::::::'''':::; .::::::.. \`\`\`\`\`\`::::'''''' .​... \|Type "WHO" \| \`::::' :: .:::::;:::::. .::::::::::::. ,::::::::. \| to see who \| ... .; .:::::' '':::: .::::\`'::::\`:::; :::;\`'::::. \| is online. \| \`::::...;: :::::' ::::; :::::..:::: \`\`' \`'' ;:::' \| \| \`\`:::::: \`::' :::::..\`\`::::::::' ,::::' \|Type "QUIT" \| \`:::::::: \`\`'''' ASCII by ,::::;' \| in all caps\| \`\`'''' Tim Clapin .::::::'::::. \| to logout. \| \`:::::::::::' +​------------+ +​----------------------------------------------------------+ \|Type "connect <charactername> <password>" to login. \| \|Type "connect guest guest" if you don't have a character. \| +​----------------------------------------------------------+ \* connect user pass logs in \* connect guest guest logs in as a guest \* request <user> <email> <your name> requests a character \* ch user pass logs in hidden, if you are a wizard \* HELP Shows the help screen \* WHO Shows who's online \* QUIT Disconnects

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

2bfcde31e3458de1

This fingerprint is shared by 5 other servers.

Options requested from client: CHARSET, NAWS, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "2bfcde31e3458de1",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "CHARSET",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": " \n* connect user pass\n  logs in\n \n* connect guest guest\n  logs in as a guest\n \n* request <user> <email> <your name>\n  requests a character\n \n* ch user pass\n  logs in hidden, if you are a wizard\n \n* HELP\n  Shows the help screen\n \n* WHO\n  Shows who's online\n \n* QUIT\n  Disconnects\n \n\n",
      "banner_before_return": "\n                                                     .:::.      +------------+\r\n                                                    ::::::      |            |\r\n     ...                             ..               ::::      | Welcome to |\r\n    :::::                           ::::              ::::      | RanmaMUCK! |\r\n .::.``'                 ..::.::::::::::::::::.       ::::      |            |\r\n ::::                  .:::::`::::::::::::::::'       ::::      +------------+\r\n ::::  ......,       .:::::'  ......::::......         `'\r\n ::::.;:::::::;,   .::::;'   :::::::::::::::::;  :::::::::::::: +------------+\r\n :::::::'''':::; .::::::..    ``````::::''''''        ....      |Type \"WHO\"  |\r\n `::::'     :: .:::::;:::::.  .::::::::::::.       ,::::::::.   | to see who |\r\n  ...     .; .:::::'  '':::: .::::`'::::`:::;      :::;`'::::.  | is online. |\r\n `::::...;: :::::'     ::::; :::::..::::  ``'      `''   ;:::'  |            |\r\n   ``:::::: `::'      :::::..``::::::::'               ,::::'   |Type \"QUIT\" |\r\n                      `:::::::: ``'''' ASCII by      ,::::;'    | in all caps|\r\n                        ``''''         Tim Clapin .::::::'::::. | to logout. |\r\n                                                  `:::::::::::' +------------+\r\n  +----------------------------------------------------------+\r\n  |Type \"connect <charactername> <password>\" to login.       |\r\n  |Type \"connect guest guest\" if you don't have a character. | \r\n  +----------------------------------------------------------+\r\n",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "0x56": false,
          "MSSP": false
        },
        "server_requested": {
          "CHARSET": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.3198361396789551,
        "total": 5.068910121917725
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:10:17.729904+00:00",
      "host": "ranmamuck.dyndns.org",
      "ip": "71.56.69.213",
      "port": 1212
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug ranmamuck.dyndns.org 1212
Show Logfile
DEBUG client.py:965 Fingerprint client: host=ranmamuck.dyndns.org port=1212
INFO client_base.py:175 Connected to <Peer 71.56.69.213 1212>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WILL MSSP
DEBUG stream_writer.py:723 WILL MSSP unsolicited
DEBUG stream_writer.py:1900 handle_will(MSSP)
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 remote_option[MSSP] = True
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:707 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:723 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1900 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3174 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:950 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:2008 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:707 recv IAC DO CHARSET
DEBUG stream_writer.py:1770 handle_do(CHARSET)
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:950 send IAC WILL CHARSET
DEBUG stream_writer.py:3174 local_option[CHARSET] = True
DEBUG stream_writer.py:3174 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT MSSP
DEBUG stream_writer.py:2025 handle_wont(MSSP)
DEBUG stream_writer.py:3174 remote_option[MSSP] = False
DEBUG stream_writer.py:707 recv IAC WONT MCCP2_COMPRESS
DEBUG stream_writer.py:2025 handle_wont(MCCP2_COMPRESS)
DEBUG stream_writer.py:3174 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2065 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
DEBUG stream_writer.py:707 recv IAC WONT BINARY
DEBUG stream_writer.py:2025 handle_wont(BINARY)
DEBUG stream_writer.py:3174 remote_option[BINARY] = False
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:707 recv IAC WONT SGA
DEBUG stream_writer.py:2025 handle_wont(SGA)
DEBUG stream_writer.py:3174 remote_option[SGA] = False
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False
DEBUG stream_writer.py:707 recv IAC WONT ECHO
DEBUG stream_writer.py:2025 handle_wont(ECHO)
DEBUG stream_writer.py:3174 remote_option[ECHO] = False
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:707 recv IAC WONT STATUS
DEBUG stream_writer.py:2025 handle_wont(STATUS)
DEBUG stream_writer.py:3174 remote_option[STATUS] = False
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:707 recv IAC WONT CHARSET
DEBUG stream_writer.py:2025 handle_wont(CHARSET)
DEBUG stream_writer.py:3174 remote_option[CHARSET] = False
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:707 recv IAC WONT EOR
DEBUG stream_writer.py:2025 handle_wont(EOR)
DEBUG stream_writer.py:3174 remote_option[EOR] = False
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = False
DEBUG stream_writer.py:707 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2025 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3174 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:707 recv IAC WONT GMCP
DEBUG stream_writer.py:2025 handle_wont(GMCP)
DEBUG stream_writer.py:3174 remote_option[GMCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:707 recv IAC WONT MSDP
DEBUG stream_writer.py:2025 handle_wont(MSDP)
DEBUG stream_writer.py:3174 remote_option[MSDP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:707 recv IAC WONT MSP
DEBUG stream_writer.py:2025 handle_wont(MSP)
DEBUG stream_writer.py:3174 remote_option[MSP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = False
DEBUG stream_writer.py:707 recv IAC WONT MXP
DEBUG stream_writer.py:2025 handle_wont(MXP)
DEBUG stream_writer.py:3174 remote_option[MXP] = False
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = False
DEBUG stream_writer.py:707 recv IAC WONT ZMP
DEBUG stream_writer.py:2025 handle_wont(ZMP)
DEBUG stream_writer.py:3174 remote_option[ZMP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:707 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2025 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3174 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:707 recv IAC WONT ATCP
DEBUG stream_writer.py:2025 handle_wont(ATCP)
DEBUG stream_writer.py:3174 remote_option[ATCP] = False
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint 2bfcde31e3458de1
INFO client_base.py:106 Connection closed to <Peer 71.56.69.213 1212>