72.14.179.114 (dcastle.org)

dcastle.org:23

Connection Banner:

Based on DIKUMUD by M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe (o)=​========================================================================(o) \|/\| .​.... .​.... .​..................... .​..... .. \|=\| \|=\| .​.... .​... .​....... ... .​.......... .. .. . \|/\| \|/\|.​... .​.... ... d Y88888888888P b .​... ... . \|=\| \|=\| .. .​... d8888 Y888888888P 8888b .​... \|/\| \|/\| ,-. d888888a888888888a888888b ... __ \\ \| \|=\| \|=\| (<@) )_ 88P' \`Y888888888P' \`Y88 .. \| \| _ \`\| __\| \| / \|/\| \|/\| \\ / ; ) ,,~​~~. Y8888888P Y88 . \| \| ( \| \| < \|=\| \|=\| /\`\`-\*==' ,''8 '~~~ 8888888~~''\`\`. 888 .. _​___/ \\__,_\|_\| _\|\\_\\ \|/\| \|/\| \`--'}\`~~' 888&aaaaaaa88P'8\`Y88aaaaaa\`.888 ... \|=\| \|=\| __ Y8888888888P 8 Y88888888;8P ___\| \| \| \|/\| \|/\| ;-.\\__ 888bod8bod888 ; ... \| _ \`\| __\| __\| \| _ \\ \|=\| \|=\| \|'@) ; \`, ,~​~~~d8888888888888b ' ... \| ( \|\\__ \\ \| \| __/ \|/\| \|/\| ,\`/_.' \|==~''##a. 888 \`.888 888 ... \\_​___\\__,_\|_​___/\\__\|_\|\\___\| \|=\| \|=\| \`.__\\_/ \` \*#a. \`. .​... ; .​.... \|/\| (o)=​==========================\`.​======,;=​===================================(o) \|=\| \`~~a~'' \|/\| \|/\| a# www.dcastle.org \|=\| \|=\| #\* \|/\| \|/\| dcastle.org telnet ports: 23, 6969 \|=\| \|=\| SSL/TSL port: 6970 \|/\| (o)=​========================================================================(o) What name for the roster? Empty name. Disconnecting...

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

c2dd7d4e76383b41

This fingerprint is shared by 111 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Empty name.  Disconnecting...",
      "banner_before_return": "\r\n   Based on DIKUMUD by M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r(o)=========================================================================(o)\n\r|/|   ..... ..... ...................... ...... ..                          |=|\n\r|=|  .....  .... ........ ...  ........... .. .. .                          |/|\n\r|/|....   .....  ... d Y88888888888P b  .... ... .                          |=|\n\r|=|      .. ....  d8888 Y888888888P 8888b    ....                           |/|\n\r|/|   ,-.        d888888a888888888a888888b  ...     __ \\             |      |=|\n\r|=| (<@) )_     88P'   `Y888888888P'   `Y88   ..    |   |  _ `|  __| |  /   |/|\n\r|/| \\ /  ; )   ,,~~~.    Y8888888P       Y88 .      |   | (   | |      <    |=|\n\r|=| /``-*==' ,''8    '~~~ 8888888~~''``.  888 ..   ____/ \\__,_|_|   _|\\_\\   |/|\n\r|/| `--'}`~~' 888&aaaaaaa88P'8`Y88aaaaaa`.888  ...                          |=|\n\r|=|   __       Y8888888888P  8  Y88888888;8P      ___|           |   |      |/|\n\r|/|  ;-.\\__            888bod8bod888     ;  ...  |     _ `|  __| __| |  _ \\ |=|\n\r|=| |'@) ; `,    ,~~~~d8888888888888b   '  ...   |    (   |\\__ \\ |   |  __/ |/|\n\r|/| ,`/_.' |==~''##a. 888 `.888   888       ... \\____\\__,_|____/\\__|_|\\___| |=|\n\r|=| `.__\\_/ `     *#a.      `.  ....    ; .....                             |/|\n\r(o)===========================`.======,;====================================(o)\n\r|=|                             `~~a~''                                     |/|\n\r|/|                                a#             www.dcastle.org           |=|\n\r|=|                                 #*                                      |/|\n\r|/|                           dcastle.org  telnet ports: 23, 6969           |=|\n\r|=|                                        SSL/TSL port: 6970               |/|\n\r(o)=========================================================================(o)\n\r\n\rWhat name for the roster? ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 5.55775785446167
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:00:27.338046+00:00",
      "host": "dcastle.org",
      "ip": "72.14.179.114",
      "port": 23
    },
    {
      "connected": "2026-04-07T06:57:38.988472+00:00",
      "host": "dcastle.org",
      "ip": "72.14.179.114",
      "port": 23
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug dcastle.org 23
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=dcastle.org port=23
INFO client_base.py:190 Connected to <Peer 72.14.179.114 23>
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:1451 IAC GA: Go-Ahead (unhandled).
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MXP, WILL AARDWOLF, WILL MCCP3_COMPRESS, WILL ATCP, WILL GMCP, WILL MCCP2_COMPRESS,
    WILL ZMP, WILL MSSP, WILL MSP, WILL MSDP, DO MXP, DO AARDWOLF, DO MCCP3_COMPRESS, DO ATCP, DO GMCP, DO MCCP2_COMPRESS, DO ZMP,
    DO MSSP, DO MSP, DO MSDP'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 72.14.179.114 23>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41

dcastle.org:6666

Connection Banner:

Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe (o)=​========================================================================(o) \|/\| .​.... .​.... .​..................... .​..... ..A Shit-Kicking MUD from \|=\| \|=\| .​.... .​... .​....... ... .​.......... .. .. .the legendary Dark Castle \|/\| \|/\|.​... .​.... ... d Y88888888888P b .​... ... .Online Gaming code team. \|=\| \|=\| .. .​... d8888 Y888888888P 8888b .​... \|/\| \|/\| ,-. d888888a888888888a888888b ... __ \\ \| \|=\| \|=\| (<@) )_ 88P' \`Y888888888P' \`Y88 .. \| \| _ \`\| __\| \| / \|/\| \|/\| \\ / ; ) ,,~​~~. Y8888888P Y88 . \| \| ( \| \| < \|=\| \|=\| /\`\`-\*==' ,''8 '~~~ 8888888~~''\`\`. 888 .. _​___/ \\__,_\|_\| _\|\\_\\ \|/\| \|/\| \`--'}\`~~' 888&aaaaaaa88P'8\`Y88aaaaaa\`.888 ... \|=\| \|=\| __ Y8888888888P 8 Y88888888;8P ___\| \| \| \|/\| \|/\| ;-.\\__ 888bod8bod888 ; ... \| _ \`\| __\| __\| \| _ \\ \|=\| \|=\| \|'@) ; \`, ,~​~~~d8888888888888b ' ... \| ( \|\\__ \\ \| \| __/ \|/\| \|/\| ,\`/_.' \|==~''##a. 888 \`.888 888 ... \\_​___\\__,_\|_​___/\\__\|_\|\\___\| \|=\| \|=\| \`.__\\_/ \` \*#a. \`. .​... ; .​.... \|/\| (o)=​==========================\`.​======,;=​===================================(o) \|=\| \`~~a~'' \|/\| \|/\| a# www.dcastle.org \|=\| \|=\| #\* \|/\| \|/\| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS \|=\| \|=\| port at 6670. The new Dark Castle is on port 23, 6969, 6970. \|/\| (o)=​========================================================================(o) What name for the roster? Empty name. Disconnecting...

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

c2dd7d4e76383b41

This fingerprint is shared by 111 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "c2dd7d4e76383b41",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Empty name.  Disconnecting...",
      "banner_before_return": "\r\n    Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r(o)=========================================================================(o)\n\r|/|   ..... ..... ...................... ...... ..A Shit-Kicking MUD from   |=|\n\r|=|  .....  .... ........ ...  ........... .. .. .the legendary Dark Castle |/|\n\r|/|....   .....  ... d Y88888888888P b  .... ... .Online Gaming code team.  |=|\n\r|=|      .. ....  d8888 Y888888888P 8888b    ....                           |/|\n\r|/|   ,-.        d888888a888888888a888888b  ...     __ \\             |      |=|\n\r|=| (<@) )_     88P'   `Y888888888P'   `Y88   ..    |   |  _ `|  __| |  /   |/|\n\r|/| \\ /  ; )   ,,~~~.    Y8888888P       Y88 .      |   | (   | |      <    |=|\n\r|=| /``-*==' ,''8    '~~~ 8888888~~''``.  888 ..   ____/ \\__,_|_|   _|\\_\\   |/|\n\r|/| `--'}`~~' 888&aaaaaaa88P'8`Y88aaaaaa`.888  ...                          |=|\n\r|=|   __       Y8888888888P  8  Y88888888;8P      ___|           |   |      |/|\n\r|/|  ;-.\\__            888bod8bod888     ;  ...  |     _ `|  __| __| |  _ \\ |=|\n\r|=| |'@) ; `,    ,~~~~d8888888888888b   '  ...   |    (   |\\__ \\ |   |  __/ |/|\n\r|/| ,`/_.' |==~''##a. 888 `.888   888       ... \\____\\__,_|____/\\__|_|\\___| |=|\n\r|=| `.__\\_/ `     *#a.      `.  ....    ; .....                             |/|\n\r(o)===========================`.======,;====================================(o)\n\r|=|                             `~~a~''                                     |/|\n\r|/|                                a#             www.dcastle.org           |=|\n\r|=|                                 #*                                      |/|\n\r|/| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS |=|\n\r|=|           port at 6670. The new Dark Castle is on port 23, 6969, 6970.  |/|\n\r(o)=========================================================================(o)\n\r\n\rWhat name for the roster? ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 5.5598344802856445
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:19:45.581340+00:00",
      "host": "dcastle.org",
      "ip": "72.14.179.114",
      "port": 6666
    },
    {
      "connected": "2026-04-05T19:01:45.519554+00:00",
      "host": "dcastle.org",
      "ip": "72.14.179.114",
      "port": 6666
    },
    {
      "connected": "2026-04-07T07:21:22.132324+00:00",
      "host": "dcastle.org",
      "ip": "72.14.179.114",
      "port": 6666
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug dcastle.org 6666
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=dcastle.org port=6666
INFO client_base.py:190 Connected to <Peer 72.14.179.114 6666>
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:1451 IAC GA: Go-Ahead (unhandled).
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL AARDWOLF, WILL MCCP2_COMPRESS, WILL ATCP, WILL MSSP, WILL MSP, WILL MCCP3_COMPRESS,
    WILL MXP, WILL GMCP, WILL MSDP, WILL ZMP, DO AARDWOLF, DO MCCP2_COMPRESS, DO ATCP, DO MSSP, DO MSP, DO MCCP3_COMPRESS, DO MXP,
    DO GMCP, DO MSDP, DO ZMP'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 72.14.179.114 6666>
DEBUG fingerprinting.py:849 connection for server fingerprint c2dd7d4e76383b41