kobramud.org
Connection Banner:
Server URLs
- Telnet: telnet://kobramud.org:1138
Server Info
Server Location: 🇩🇪 Germany (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 219 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "What is your name: ",
"banner_before_return": "\r\n\r\nWelcome to KoBra Star Wars Mud.\r\nPlease login as 'guest' if just looking around.\r\n\r\n************* IMPORTANT ****************************************************\r\nIf you have a password more than 8 characters long and have trouble logging\r\nin, then please attempt to login with ONLY the first 8 characters.\r\n\r\nOnce you have successfully logged in, consider changing your password.\r\n****************************************************************************\r\n\r\nAdditional commands at this login prompt: who, uptime, quit\r\n\r\nWhat is your name: ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {
"SGA": false,
"TTYPE": false
},
"server_requested": {
"TTYPE": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5049178600311279,
"total": 5.059760808944702
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:37.307865+00:00",
"host": "kobramud.org",
"ip": "5.45.108.133",
"port": 1138
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug kobramud.org 1138
Show Logfile
DEBUG client.py:965 Fingerprint client: host=kobramud.org port=1138
INFO client_base.py:175 Connected to <Peer 5.45.108.133 1138>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WONT SGA
DEBUG stream_writer.py:2025 handle_wont(SGA)
DEBUG stream_writer.py:3174 remote_option[SGA] = False
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False
DEBUG stream_writer.py:707 recv IAC WONT TTYPE
DEBUG stream_writer.py:2025 handle_wont(TTYPE)
DEBUG stream_writer.py:3174 remote_option[TTYPE] = False
DEBUG stream_writer.py:3174 pending_option[DO + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DONT TTYPE
DEBUG stream_writer.py:1863 handle_dont(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:3174 local_option[TTYPE] = False
DEBUG stream_writer.py:707 recv IAC WONT TM
DEBUG stream_writer.py:2025 handle_wont(TM)
WARNING client_base.py:527 File "/home/jquast/telnetlib3/telnetlib3/client_base.py", line 431, in _process_chunk
WARNING client_base.py:527 recv_inband = writer.feed_byte(_ONE_BYTE[b])
WARNING client_base.py:527 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
WARNING client_base.py:527 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 740, in feed_byte
WARNING client_base.py:527 self.handle_wont(opt)
WARNING client_base.py:527 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 2027, in handle_wont
WARNING client_base.py:527 raise ValueError("WONT TM received but DO TM was not sent")
WARNING client_base.py:527 ValueError: WONT TM received but DO TM was not sent
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 5.45.108.133 1138>