kotl.org
b ,,,, ,d 8b, ,(()(()), ,ad8P d888b,_ ,(((""""))), ,d8888b, 88 `"Ya,_ ,(()<@ @>(() _a8P" `888b Y8ba,a `"Ya,_ (()( .. ))( _aP" ad88888b `8888P `"Ya,_ ())(\ -- /(() ,aP' `Y8888 Y88P' `""Ya,_ )(())`--'()) ,adP' ,@, Y88P `Y8' ,@, ""Y((()'| |`()aP"' @@@ ,8P' `Ybaad @@@ /' `\ `@' ad8' 8P" `@' / / \ \ Y8, dP' / /( | \ \ b, b `8 d' d ,P / /| `--' `--/'\ \ `8, YP dP 8, YP ,d" | /' | / | | `Ya,__,dP' `Yb,__,a8P | | | ,' | | `88888P' "Y88888ba | | ) . ( | | d888P" _ _ `"Y888' | | / \ | | `8P" ( | / ) `"Yb, | | ( `. / \ ,8" \|/ /' `Ya / \ ( \|/\ \ b8" |\ . ,_ ,_ _ / _ ,_ _ ,' `b / /\|`. `\ \ || `8, (_| \_)_/_/ (_(_/_(_/_(_)_/ ( (_/_)_ 8 || 8\ `\ \ 8b, _ /__________ 8 8 `\ \ \ 888, (_//\ dP 8 `\ \ ), dP'`8b, _ |/ ,d88 ,P `\ \ )Y, ,d" 888, (_)_/| ,d8' 8, ,P' `\ )/ `Yd" 8'`b, -----|\ ,dP'8 `Y,,,aP" ,) ) `Y, 8' `b \/ d" " `8' // / `Y, 8, _/_ /_ _ d' ,@, 8 /'/ / `b ,@, `b _/__/ (_(/, d' @@@ ,P _,' ( / 8 @@@ 8, _ 8, a `@' ,P' | ( / 8 `@' `b ( | `b 8 aP' | /| / Y, 8 | _|_ 8 `b ,d" | / ) / `Ya, a, 8 | _ , / 8 ,8a,aP' \/ ,' ( "Ya,`P ,8 _|____)_/(_)_/_)_/(____ 8a888P' ( \ "Y8b,,d8 ( ) 888P' `\ \ "Y888P 8P' `\ | Y8P' P `' P' _ ( | _ /\ _ Email the owners at: \|/ ) || ( | Chalgyr Vokel |\ _ || _, |_ . Chalgyr@yahoo.com (_| \_(_(_/\_(_,_/ (_/__ Gillian Verity ) ) Herberkids3@yahoo.com _,.-'-'-.,__,.-'-'-.,__,.-'-'-.,__,.-'-'-.,__,.-'-'-.,__,.-'-'-.,_ Kingdoms of the Lost is based on: Original DikuMUD by Hans Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer Based on MERC 2.1 code by Hatchet, Furey, and Kahn ROM 2.4 copyright (c) 1993-1996 Russ Taylor _,.-'-'-.,__,.-'-'-.,__,.-'-'-.,__,.-'-'-.,__,.-'-'-.,__,.-'-'-.,_ [Press Return to continue] ________________---===) Kingdoms of the Lost (===---________________ [1] Logon to KoTL [5] Disconnect [2] Who is Online [6] Create a Character [3] Change player password [7] Announcements [4] Read the story of KoTL [8] Toggle color on/off _________________---===) Game Status: Open (===---_________________
Telnet Fingerprint
This fingerprint is shared by 102 other servers.
Data source: 8230b57f2279de84/1559a0abe63d5c3f.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "8230b57f2279de84",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"SGA",
"STATUS"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u001b[2J\n\r\n\r \u001b[1;30m________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mKingdoms of the Lost \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---________________\u001b[0;37m\u001b[0;37m\n\r\n\r \u001b[0;37m[\u001b[1;36m1\u001b[0;37m] \u001b[0;36m\u001b[0;36mLogon to KoTL \u001b[0;37m[\u001b[1;36m5\u001b[0;37m] \u001b[0;36m\u001b[0;36mDisconnect \n\r\n\r \u001b[0;37m[\u001b[1;36m2\u001b[0;37m] \u001b[0;36m\u001b[0;36mWho is Online \u001b[0;37m[\u001b[1;36m6\u001b[0;37m] \u001b[0;36m\u001b[0;36mCreate a Character \n\r\n\r \u001b[0;37m[\u001b[1;36m3\u001b[0;37m] \u001b[0;36m\u001b[0;36mChange player password \u001b[0;37m[\u001b[1;36m7\u001b[0;37m] \u001b[0;36m\u001b[0;36mAnnouncements \n\r\n\r \u001b[0;37m[\u001b[1;36m4\u001b[0;37m] \u001b[0;36m\u001b[0;36mRead the story of KoTL \u001b[0;37m[\u001b[1;36m8\u001b[0;37m] \u001b[0;36m\u001b[0;36mToggle color on/off \n\r\n\r\n\r \u001b[1;30m_________________---\u001b[0;37m===\u001b[1;36m) \u001b[1;37mGame Status: Open \u001b[1;36m(\u001b[0;37m===\u001b[1;30m---_________________\u001b[0;37m\u001b[0;37m\n\r\n\r",
"banner_before_return": "\n\r\u001b[0;34m b \u001b[1;33m ,,,,\u001b[0;34m ,d\n\r\u001b[0;34m 8b,\u001b[1;33m ,(()(()),\u001b[0;34m ,ad8P\n\r \u001b[0;34m d888b,_ \u001b[1;33m ,(((\"\"\"\"))), \u001b[0;34m ,d8888b,\n\r \u001b[0;34m 88 `\"Ya,_\u001b[1;33m ,(()\u001b[0;36m<\u001b[1;36m@ @\u001b[0;36m>\u001b[1;33m(()\u001b[0;34m _a8P\" `888b\n\r \u001b[0;34m Y8ba,a `\"Ya,_ \u001b[1;33m(()( \u001b[0;33m..\u001b[1;33m ))( \u001b[0;34m _aP\" ad88888b\n\r \u001b[1;34m `8888P `\"Ya,_\u001b[1;33m ())(\u001b[0;33m\\ \u001b[1;31m--\u001b[0;33m /\u001b[1;33m(()\u001b[1;34m ,aP' `Y8888\n\r\u001b[1;34m Y88P' `\"\"Ya,\u001b[0;33m_\u001b[1;33m )(())\u001b[0;33m`--'\u001b[1;33m())\u001b[1;34m ,adP' \u001b[0;36m,@,\u001b[1;34m Y88P\n\r\u001b[1;34m `Y8' \u001b[0;36m,@,\u001b[1;34m \"\"Y\u001b[1;33m((()'\u001b[0;33m| |\u001b[1;33m`()\u001b[1;34maP\"' \u001b[1;36m@@@\u001b[1;34m ,8P'\n\r\u001b[1;34m `Ybaad\u001b[1;36m @@@ \u001b[0;33m/' `\\\u001b[0;36m `@'\u001b[1;34m ad8'\n\r\u001b[1;34m 8P\" \u001b[0;36m`@'\u001b[0;33m / / \\ \\\u001b[1;34m Y8,\n\r\u001b[1;35m dP'\u001b[0;33m / /( | \\ \\\u001b[1;35m b, b\u001b[1;34m `8\n\r\u001b[1;35m d' d ,P \u001b[0;33m/ /| `--' `--/'\\ \\\u001b[1;35m `8, YP dP\n\r\u001b[1;35m 8, YP ,d\"\u001b[0;33m | /' | / | |\u001b[1;35m `Ya,__,dP'\n\r\u001b[1;35m `Yb,__,a8P\u001b[0;33m | | | ,' | |\u001b[1;35m `88888P'\n\r\u001b[1;35m \"Y88888ba\u001b[0;33m | | ) . ( | |\u001b[0;35m d8\u001b[1;35m88P\"\u001b[1;31m _ _\n\r\u001b[1;35m `\"Y88\u001b[0;35m8'\u001b[0;33m | | / \\ | |\u001b[0;35m `8P\"\u001b[1;31m ( | / )\n\r\u001b[0;35m `\"Yb,\u001b[0;33m | | ( `. / \\\u001b[0;35m ,8\"\u001b[1;31m \\|/ /'\n\r\u001b[0;35m `Ya\u001b[0;33m / \\ ( \\|/\\ \\\u001b[0;35m b8\"\u001b[1;31m |\\ . ,_ ,_ _ / _ ,_ _ ,'\n\r\u001b[0;35m `b\u001b[0;33m / /\\|`. `\\ \\ ||\u001b[0;35m `8,\u001b[1;31m (_| \\_)_/_/ (_(_/_(_/_(_)_/ ( (_/_)_\n\r\u001b[0;35m 8 \u001b[0;33m||\u001b[0;35m 8\u001b[0;33m\\ `\\ \\ \u001b[0;31m8\u001b[0;35mb,\u001b[1;31m _ /__________\n\r\u001b[0;35m 8 \u001b[0;31m8\u001b[0;33m `\\ \\ \\\u001b[0;31m 88\u001b[0;35m8,\u001b[1;31m (_/\u001b[0;31m/\\\n\r\u001b[0;35m d\u001b[0;31mP 8\u001b[0;33m `\\ \\ )\u001b[0;31m, dP'`8\u001b[0;35mb,\u001b[0;31m _ |/\n\r\u001b[0;31m ,d88 ,P\u001b[0;33m `\\ \\ )\u001b[0;31mY, ,d\" 888, (_)_/|\n\r\u001b[0;31m ,d8' 8, ,P'\u001b[0;33m `\\ )/\u001b[0;31m `Yd\" 8'`b, -----|\\\n\r\u001b[0;31m ,dP'8 `Y,,,aP\"\u001b[0;33m ,) )\u001b[0;31m `Y, 8' `b \\/\n\r\u001b[0;31m d\" \" `8'\u001b[0;33m // /\u001b[0;31m `Y, 8,\u001b[0;35m _/_ /_ _\n\r\u001b[0;31m d'\u001b[0;36m ,@,\u001b[0;31m 8\u001b[0;33m /'/ /\u001b[0;31m `b\u001b[0;36m ,@,\u001b[0;31m `b\u001b[0;35m _/__/ (_(/,\n\r\u001b[0;31m d'\u001b[1;36m @@@\u001b[1;31m ,P\u001b[0;33m _,' ( /\u001b[1;31m 8\u001b[1;36m @@@\u001b[0;31m 8,\u001b[1;35m _\n\r\u001b[0;31m 8, \u001b[1;31ma \u001b[0;36m`@'\u001b[1;31m ,P'\u001b[0;33m | ( /\u001b[1;31m 8\u001b[0;36m `@'\u001b[0;31m `b\u001b[1;35m ( |\n\r\u001b[0;31m `b\u001b[1;31m 8 aP'\u001b[0;33m | /| /\u001b[1;31m Y, 8\u001b[1;35m | _|_\n\r\u001b[1;31m 8 `b ,d\"\u001b[0;33m | / ) /\u001b[1;31m `Ya, a, 8\u001b[1;35m | _ , /\n\r\u001b[1;31m 8 ,8a,aP' \u001b[0;33m\\/ ,' (\u001b[1;31m \"Ya,`P ,8\u001b[1;35m _|____)_/(_)_/_)_/(____\n\r\u001b[1;31m 8a888P'\u001b[0;33m ( \\\u001b[1;31m \"Y8b,,d8\u001b[1;35m ( )\n\r\u001b[1;31m 888P'\u001b[0;33m `\\ \\\u001b[1;31m \"Y888P\n\r\u001b[1;31m 8P'\u001b[0;33m `\\ |\u001b[1;31m Y8P'\n\r\u001b[1;31m P \u001b[0;33m`'\u001b[1;31m P'\n\r\u001b[0;34m _\n\r\u001b[1;34m ( | _ /\\ _ \u001b[1;30mEmail the owners at:\u001b[0;37m\n\r\u001b[1;35m \\|/ ) || ( | \u001b[1;31mChalgyr Vokel\u001b[0;37m\n\r\u001b[0;35m |\\ _ || _, |_ . \u001b[0;36mChalgyr@yahoo.com \u001b[0;37m\n\r\u001b[0;31m (_| \\_(_(_/\\_(_,_/ (_/__ \u001b[1;32mGillian Verity\u001b[0;37m\n\r\u001b[1;31m ) ) \u001b[0;36mHerberkids3@yahoo.com \u001b[0;37m\n\r\u001b[0;37m\n\r\u001b[1;31m_,.-'-'-.,_\u001b[0;31m_,.-'-'-.,_\u001b[1;35m_,.-'-'-.,__,.-'-'-.,_\u001b[0;34m_,.-'-'-.,_\u001b[1;34m_,.-'-'-.,_\u001b[0;37m\n\r\u001b[1;37m Kingdoms of the Lost is based on:\n\r Original DikuMUD by Hans Staerfeldt, Katja Nyboe,\n\r Tom Madsen, Michael Seifert, and Sebastian Hammer\n\r Based on MERC 2.1 code by Hatchet, Furey, and Kahn\n\r ROM 2.4 copyright (c) 1993-1996 Russ Taylor\n\r\u001b[1;34m_,.-'-'-.,_\u001b[0;34m_,.-'-'-.,_\u001b[1;35m_,.-'-'-.,__,.-'-'-.,_\u001b[0;31m_,.-'-'-.,_\u001b[1;31m_,.-'-'-.,_\u001b[0;37m\n\r \n\r\u001b[1;30m[\u001b[0;36mPress \u001b[1;36mReturn\u001b[0;36m to continue\u001b[1;30m]\u001b[0;37m\n\r \n\r",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5034151077270508,
"total": 3.3129684925079346
}
}
},
"sessions": [
{
"connected": "2026-02-08T16:14:57.100226+00:00",
"host": "kotl.org",
"ip": "176.9.151.147",
"port": 2221
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:773 Fingerprint client: host=kotl.org port=2221
INFO client_base.py:174 Connected to <Peer 176.9.151.147 2221>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:896 send IAC DO BINARY
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = True
DEBUG stream_writer.py:896 send IAC DO SGA
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:896 send IAC DO ECHO
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:896 send IAC DO STATUS
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:896 send IAC DO CHARSET
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = True
DEBUG stream_writer.py:896 send IAC DO EOR
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:896 send IAC DO COM_PORT_OPTION
INFO fingerprinting.py:736 connection for server fingerprint 8230b57f2279de84
INFO client_base.py:105 Connection closed to <Peer 176.9.151.147 2221>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug kotl.org 2221