kotl.org

kotl.org:2221

Telnet Fingerprint

8230b57f2279de84…

This fingerprint is shared by 102 other servers.

Data source: 8230b57f2279de84/1559a0abe63d5c3f.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8230b57f2279de84",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "SGA",
        "STATUS"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u001b[2J\n\r\n\r    \u001b[1;30m________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mKingdoms of the Lost \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---________________\u001b[0;37m\u001b[0;37m\n\r\n\r      \u001b[0;37m[\u001b[1;36m1\u001b[0;37m] \u001b[0;36m\u001b[0;36mLogon to KoTL              \u001b[0;37m[\u001b[1;36m5\u001b[0;37m] \u001b[0;36m\u001b[0;36mDisconnect                 \n\r\n\r      \u001b[0;37m[\u001b[1;36m2\u001b[0;37m] \u001b[0;36m\u001b[0;36mWho is Online              \u001b[0;37m[\u001b[1;36m6\u001b[0;37m] \u001b[0;36m\u001b[0;36mCreate a Character         \n\r\n\r      \u001b[0;37m[\u001b[1;36m3\u001b[0;37m] \u001b[0;36m\u001b[0;36mChange player password     \u001b[0;37m[\u001b[1;36m7\u001b[0;37m] \u001b[0;36m\u001b[0;36mAnnouncements              \n\r\n\r      \u001b[0;37m[\u001b[1;36m4\u001b[0;37m] \u001b[0;36m\u001b[0;36mRead the story of KoTL     \u001b[0;37m[\u001b[1;36m8\u001b[0;37m] \u001b[0;36m\u001b[0;36mToggle color on/off        \n\r\n\r\n\r    \u001b[1;30m_________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mGame Status: Open \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---_________________\u001b[0;37m\u001b[0;37m\n\r\n\r",
      "banner_before_return": "\n\r\u001b[0;34m      b                           \u001b[1;33m ,,,,\u001b[0;34m                    ,d\n\r\u001b[0;34m      8b,\u001b[1;33m                       ,(()(()),\u001b[0;34m               ,ad8P\n\r  \u001b[0;34m   d888b,_ \u001b[1;33m                  ,(((\"\"\"\"))), \u001b[0;34m          ,d8888b,\n\r  \u001b[0;34m   88   `\"Ya,_\u001b[1;33m              ,(()\u001b[0;36m<\u001b[1;36m@  @\u001b[0;36m>\u001b[1;33m(()\u001b[0;34m        _a8P\"  `888b\n\r  \u001b[0;34m   Y8ba,a   `\"Ya,_          \u001b[1;33m(()(  \u001b[0;33m..\u001b[1;33m  ))( \u001b[0;34m     _aP\"   ad88888b\n\r  \u001b[1;34m   `8888P       `\"Ya,_\u001b[1;33m      ())(\u001b[0;33m\\ \u001b[1;31m--\u001b[0;33m /\u001b[1;33m(()\u001b[1;34m    ,aP'       `Y8888\n\r\u001b[1;34m      Y88P'           `\"\"Ya,\u001b[0;33m_\u001b[1;33m )(())\u001b[0;33m`--'\u001b[1;33m())\u001b[1;34m  ,adP'   \u001b[0;36m,@,\u001b[1;34m     Y88P\n\r\u001b[1;34m      `Y8'       \u001b[0;36m,@,\u001b[1;34m       \"\"Y\u001b[1;33m((()'\u001b[0;33m|  |\u001b[1;33m`()\u001b[1;34maP\"'      \u001b[1;36m@@@\u001b[1;34m     ,8P'\n\r\u001b[1;34m       `Ybaad\u001b[1;36m    @@@        \u001b[0;33m/'            `\\\u001b[0;36m        `@'\u001b[1;34m   ad8'\n\r\u001b[1;34m         8P\"     \u001b[0;36m`@'\u001b[0;33m       /    /        \\  \\\u001b[1;34m              Y8,\n\r\u001b[1;35m        dP'\u001b[0;33m               /    /(    |    \\  \\\u001b[1;35m     b,    b\u001b[1;34m  `8\n\r\u001b[1;35m       d'  d     ,P      \u001b[0;33m/   /|  `--' `--/'\\  \\\u001b[1;35m    `8,  YP  dP\n\r\u001b[1;35m       8,  YP  ,d\"\u001b[0;33m      |  /' |         /   | |\u001b[1;35m     `Ya,__,dP'\n\r\u001b[1;35m       `Yb,__,a8P\u001b[0;33m       | |   |       ,'    | |\u001b[1;35m      `88888P'\n\r\u001b[1;35m         \"Y88888ba\u001b[0;33m      | |   )     . (     | |\u001b[0;35m      d8\u001b[1;35m88P\"\u001b[1;31m      _   _\n\r\u001b[1;35m           `\"Y88\u001b[0;35m8'\u001b[0;33m      | |  /         \\    | |\u001b[0;35m      `8P\"\u001b[1;31m       ( | / )\n\r\u001b[0;35m              `\"Yb,\u001b[0;33m     | | (           `.  / \\\u001b[0;35m      ,8\"\u001b[1;31m         \\|/                  /'\n\r\u001b[0;35m                 `Ya\u001b[0;33m    / \\ (             \\|/\\ \\\u001b[0;35m    b8\"\u001b[1;31m           |\\     . ,_  ,_  _ / _  ,_ _   ,'\n\r\u001b[0;35m                   `b\u001b[0;33m  / /\\|`.       `\\    \\  ||\u001b[0;35m    `8,\u001b[1;31m         (_| \\_)_/_/ (_(_/_(_/_(_)_/ ( (_/_)_\n\r\u001b[0;35m                    8  \u001b[0;33m||\u001b[0;35m    8\u001b[0;33m\\        `\\   \\        \u001b[0;31m8\u001b[0;35mb,\u001b[1;31m                     _ /__________\n\r\u001b[0;35m                    8        \u001b[0;31m8\u001b[0;33m `\\        \\   \\\u001b[0;31m       88\u001b[0;35m8,\u001b[1;31m                   (_/\u001b[0;31m/\\\n\r\u001b[0;35m                   d\u001b[0;31mP        8\u001b[0;33m   `\\       \\   )\u001b[0;31m,    dP'`8\u001b[0;35mb,\u001b[0;31m                 _  |/\n\r\u001b[0;31m                 ,d88       ,P\u001b[0;33m     `\\      \\  )\u001b[0;31mY, ,d\"   888,               (_)_/|\n\r\u001b[0;31m               ,d8' 8,     ,P'\u001b[0;33m       `\\     )/\u001b[0;31m `Yd\"     8'`b,              -----|\\\n\r\u001b[0;31m             ,dP'8  `Y,,,aP\"\u001b[0;33m          ,)    )\u001b[0;31m   `Y,    8'  `b                   \\/\n\r\u001b[0;31m            d\"   \"    `8'\u001b[0;33m            //    /\u001b[0;31m     `Y,        8,\u001b[0;35m           _/_ /_  _\n\r\u001b[0;31m           d'\u001b[0;36m  ,@,\u001b[0;31m     8\u001b[0;33m           /'/    /\u001b[0;31m       `b\u001b[0;36m   ,@,\u001b[0;31m  `b\u001b[0;35m          _/__/ (_(/,\n\r\u001b[0;31m          d'\u001b[1;36m   @@@\u001b[1;31m    ,P\u001b[0;33m        _,' (    /\u001b[1;31m         8\u001b[1;36m   @@@\u001b[0;31m   8,\u001b[1;35m      _\n\r\u001b[0;31m          8, \u001b[1;31ma \u001b[0;36m`@'\u001b[1;31m   ,P'\u001b[0;33m       |   (    /\u001b[1;31m          8\u001b[0;36m   `@'\u001b[0;31m   `b\u001b[1;35m     ( |\n\r\u001b[0;31m          `b\u001b[1;31m 8      aP'\u001b[0;33m        |  /|   /\u001b[1;31m           Y,         8\u001b[1;35m       |               _|_\n\r\u001b[1;31m           8 `b   ,d\"\u001b[0;33m          | / )  /\u001b[1;31m            `Ya,  a,   8\u001b[1;35m       |        _   ,   /\n\r\u001b[1;31m           8 ,8a,aP'           \u001b[0;33m\\/ ,' (\u001b[1;31m               \"Ya,`P  ,8\u001b[1;35m      _|____)_/(_)_/_)_/(____\n\r\u001b[1;31m           8a888P'\u001b[0;33m                (   \\\u001b[1;31m                \"Y8b,,d8\u001b[1;35m     (                       )\n\r\u001b[1;31m           888P'\u001b[0;33m                   `\\  \\\u001b[1;31m                 \"Y888P\n\r\u001b[1;31m           8P'\u001b[0;33m                       `\\ |\u001b[1;31m                  Y8P'\n\r\u001b[1;31m           P                           \u001b[0;33m`'\u001b[1;31m                   P'\n\r\u001b[0;34m                  _\n\r\u001b[1;34m                 ( | _     /\\     _                   \u001b[1;30mEmail the owners at:\u001b[0;37m\n\r\u001b[1;35m                  \\|/ )    ||    ( |                  \u001b[1;31mChalgyr Vokel\u001b[0;37m\n\r\u001b[0;35m                   |\\   _  ||  _,  |_  .              \u001b[0;36mChalgyr@yahoo.com    \u001b[0;37m\n\r\u001b[0;31m                 (_| \\_(_(_/\\_(_,_/ (_/__             \u001b[1;32mGillian Verity\u001b[0;37m\n\r\u001b[1;31m                      )                   )           \u001b[0;36mHerberkids3@yahoo.com \u001b[0;37m\n\r\u001b[0;37m\n\r\u001b[1;31m_,.-'-'-.,_\u001b[0;31m_,.-'-'-.,_\u001b[1;35m_,.-'-'-.,__,.-'-'-.,_\u001b[0;34m_,.-'-'-.,_\u001b[1;34m_,.-'-'-.,_\u001b[0;37m\n\r\u001b[1;37m            Kingdoms of the Lost is based on:\n\r         Original DikuMUD by Hans Staerfeldt, Katja Nyboe,\n\r         Tom Madsen, Michael Seifert, and Sebastian Hammer\n\r         Based on MERC 2.1 code by Hatchet, Furey, and Kahn\n\r         ROM 2.4 copyright (c) 1993-1996 Russ Taylor\n\r\u001b[1;34m_,.-'-'-.,_\u001b[0;34m_,.-'-'-.,_\u001b[1;35m_,.-'-'-.,__,.-'-'-.,_\u001b[0;31m_,.-'-'-.,_\u001b[1;31m_,.-'-'-.,_\u001b[0;37m\n\r \n\r\u001b[1;30m[\u001b[0;36mPress \u001b[1;36mReturn\u001b[0;36m to continue\u001b[1;30m]\u001b[0;37m\n\r \n\r",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5034151077270508,
        "total": 3.3129684925079346
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T16:14:57.100226+00:00",
      "host": "kotl.org",
      "ip": "176.9.151.147",
      "port": 2221
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:773 Fingerprint client: host=kotl.org port=2221
INFO client_base.py:174 Connected to <Peer 176.9.151.147 2221>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:896 send IAC DO BINARY
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = True
DEBUG stream_writer.py:896 send IAC DO SGA
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:896 send IAC DO ECHO
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:896 send IAC DO STATUS
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:896 send IAC DO CHARSET
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = True
DEBUG stream_writer.py:896 send IAC DO EOR
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:896 send IAC DO COM_PORT_OPTION
INFO fingerprinting.py:736 connection for server fingerprint 8230b57f2279de84
INFO client_base.py:105 Connection closed to <Peer 176.9.151.147 2221>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug kotl.org 2221