kobramud.org

Connection Banner:

Welcome to KoBra Star Wars Mud. Please login as 'guest' if just looking around. \*\*\*\*\*\*\*\*\*\*\*\*\* IMPORTANT \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* If you have a password more than 8 characters long and have trouble logging in, then please attempt to login with ONLY the first 8 characters. Once you have successfully logged in, consider changing your password. \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* Additional commands at this login prompt: who, uptime, quit What is your name:

Server URLs

Server Info

  • Server Location: 🇩🇪 Germany (GeoIP)

Telnet Fingerprint

a8a260cc4662430c

This fingerprint is shared by 219 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "a8a260cc4662430c",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "What is your name: ",
      "banner_before_return": "\r\n\r\nWelcome to KoBra Star Wars Mud.\r\nPlease login as 'guest' if just looking around.\r\n\r\n************* IMPORTANT ****************************************************\r\nIf you have a password more than 8 characters long and have trouble logging\r\nin, then please attempt to login with ONLY the first 8 characters.\r\n\r\nOnce you have successfully logged in, consider changing your password.\r\n****************************************************************************\r\n\r\nAdditional commands at this login prompt: who, uptime, quit\r\n\r\nWhat is your name: ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "SGA": false,
          "TTYPE": false
        },
        "server_requested": {
          "TTYPE": false
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5049178600311279,
        "total": 5.059760808944702
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:12:37.307865+00:00",
      "host": "kobramud.org",
      "ip": "5.45.108.133",
      "port": 1138
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug kobramud.org 1138
Show Logfile
DEBUG client.py:965 Fingerprint client: host=kobramud.org port=1138
INFO client_base.py:175 Connected to <Peer 5.45.108.133 1138>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC WONT SGA
DEBUG stream_writer.py:2025 handle_wont(SGA)
DEBUG stream_writer.py:3174 remote_option[SGA] = False
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = False
DEBUG stream_writer.py:707 recv IAC WONT TTYPE
DEBUG stream_writer.py:2025 handle_wont(TTYPE)
DEBUG stream_writer.py:3174 remote_option[TTYPE] = False
DEBUG stream_writer.py:3174 pending_option[DO + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DONT TTYPE
DEBUG stream_writer.py:1863 handle_dont(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:3174 local_option[TTYPE] = False
DEBUG stream_writer.py:707 recv IAC WONT TM
DEBUG stream_writer.py:2025 handle_wont(TM)
WARNING client_base.py:527   File "/home/jquast/telnetlib3/telnetlib3/client_base.py", line 431, in _process_chunk
WARNING client_base.py:527     recv_inband = writer.feed_byte(_ONE_BYTE[b])
WARNING client_base.py:527                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
WARNING client_base.py:527   File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 740, in feed_byte
WARNING client_base.py:527     self.handle_wont(opt)
WARNING client_base.py:527   File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 2027, in handle_wont
WARNING client_base.py:527     raise ValueError("WONT TM received but DO TM was not sent")
WARNING client_base.py:527 ValueError: WONT TM received but DO TM was not sent
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:106 Connection closed to <Peer 5.45.108.133 1138>