mozartmud.net
\
\______/
/\____/\
/ /\__/\ \ You have entered...
__/_/_/\/\_\___ __ _
\ \ \/*/ /| \/ | ___ ____ __ _ _ __ | |_
\ \/_|\/ | |\/| | / _ \ |_ / / _` | | '__| | __|
\/__|_\/| | | | | (_) | / / | (_| | | | | |_
/ | \|_| |_| \___/ /___| \__,_| |_| \__| M U D
/ |'
http://www.mozartmud.net |
|
Based on Diku and Silly MUD code. |
See the 'credits' online for more information. |
/ | \
Refer any questions to: mozartmud@gmail.com ;..-^-..;
\._/{ }\_./
\.._/{ }\_../
\./<...>\./
'''
By what nam
e do you wish to be known?Telnet Fingerprint
This fingerprint is shared by 5 other servers.
Options requested from client: TTYPE
Data source: 89d11e6aa6390ea0/107707c02f1e6708.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "89d11e6aa6390ea0",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"CHARSET",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": [
"TTYPE"
]
},
"session_data": {
"banner_after_return": "e do you wish to be known? ",
"banner_before_return": " \\\n\r \\______/\n\r /\\____/\\\n\r / /\\__/\\ \\ You have entered...\n\r__/_/_/\\/\\_\\___ __ _\n\r \\ \\ \\/*/ /| \\/ | ___ ____ __ _ _ __ | |_\n\r \\ \\/_|\\/ | |\\/| | / _ \\ |_ / / _` | | '__| | __|\n\r \\/__|_\\/| | | | | (_) | / / | (_| | | | | |_\n\r / | \\|_| |_| \\___/ /___| \\__,_| |_| \\__| M U D\n\r / |'\n\r http://www.mozartmud.net |\n\r |\n\r Based on Diku and Silly MUD code. |\n\r See the 'credits' online for more information. |\n\r / | \\\n\r Refer any questions to: mozartmud@gmail.com ;..-^-..;\n\r \\._/{ }\\_./\n\r \\.._/{ }\\_../\n\r \\./<...>\\./\n\r '''\n\rBy what nam",
"encoding": "ascii",
"option_states": {
"server_offered": {
"0x56": false,
"0x5a": false,
"0x5b": false,
"ECHO": false
},
"server_requested": {
"TTYPE": true
}
},
"timing": {
"probe": 0.5080602169036865,
"total": 1.0097157955169678
}
}
},
"sessions": [
{
"connected": "2026-02-08T06:34:44.785837+00:00",
"host": "mozartmud.net",
"ip": "193.10.203.23",
"port": 4500
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=mozartmud.net port=4500
INFO client_base.py:174 Connected to <Peer 193.10.203.23 4500>
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:692 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:708 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1863 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:3030 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:933 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:1968 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:692 recv IAC WILL MXP
DEBUG stream_writer.py:708 WILL MXP unsolicited
DEBUG stream_writer.py:1863 handle_will(MXP)
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 remote_option[MXP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = False
DEBUG stream_writer.py:692 recv IAC WILL MSP
DEBUG stream_writer.py:708 WILL MSP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSP)
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 remote_option[MSP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = False
DEBUG stream_writer.py:692 recv IAC WONT ECHO
DEBUG stream_writer.py:1985 handle_wont(ECHO)
DEBUG stream_writer.py:3030 remote_option[ECHO] = False
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 193.10.203.23 4500>
INFO fingerprinting.py:746 connection for server fingerprint 6f760814123baeb7
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug mozartmud.net 4500