mud.mystic-adventure.org

Connection Banner:

Diku: Hans Henrik Staerfeldt, Tom Madsen, , , Katja Nyboe, Micheal Seifert, $, $, , Screen by: Sebastian Hammer "ss.$ss. .s' , .ss$$$$$$$$$$s, Row Founders: Sphynx,Keops,Cobra,Wimp. $.s$$$$$$$$$$$$$$\`$$Ss Tua Xiong "$$$$$$$$$$$$$$$$$$o$$$ , Pal s$$$$$$$$$$$$$$$$$$$$$$$$s, ,s s$$$$$$$$$"$$$$$$"​"""$$$$$$"$$$$$, s$$$$$$$$$$s""$$$$ssssss"$$$$$$$$" s$$$$$$$$$$' \`"""ss"$"$s"" s$$$$$$$$$$, \`"​""""$ .s$$s s$$$$$$$$$$$$s,... \`s$$' \` dMMMMMMMMb dMP dMP .dMMMb dMMMMMMP dMP .aMMMb$$$#​###s. .$$"$. , s- dMP"dMP"dMP dMP.dMP dMP" VP dMP amr dMP"VMP$$$$$#​####$$$$$$" $.$' dMP dMP dMP VMMMMP VMMMb dMP dMP dMP $$$$$$$$$#​###s"" .$$$\| dMP dMP dMP dA .dMP dP .dMP dMP dMP dMP.aMP $$$$$$$$$$$$$$##s .$$" $ dMP dMP dMP VMMMP" VMMMP" dMP dMP VMMMP" $$$$$$$$$$$$$$$$$$$$$$$$" \` $$" "$"$$$$$$$$$$$$$$$$$$$$S"​"""' .aMMMb dMMMMb dMP dMP dMMMMMP dMMMMb dMMMMMMP dMP dMP dMMMMb dMMMMMP dMP"dMP dMP VM dMP dMP dMP dMP dMP dMP dMP dMP dMP dMP dMP dMMMMMP dMP dMP dMP,dMP dMMMP dMP dMP dMP dMP dMP dMMMMK dMMMP dMP dMP dMP.aMP YMvAP" dMP dMP dMP dMP dMP.aMP dMP AMF dMP dMP dMP dMMMMP" VP" dMMMMMP dMP dMP dMP VMMMP" dMP dMP dMMMMMP "$$sS$$$$$$$$$$$$$$$$$$$$$$$$$$$#​#######" s$$$$$$$$$$$$$$$$$$$$$$$#​########""' What is thy name, adventurer? Illegal name, try another. Name:

Server URLs

Server Info

  • Server Location: 🇺🇸 United States (GeoIP)

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 291 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "Illegal name, try another.\n\rName: ",
      "banner_before_return": "\n\r\u001b[1;34mDiku: Hans Henrik Staerfeldt, Tom Madsen,\u001b[0m\u001b[31m\u001b[1;37m   ,   ,\n\r\u001b[1;34m      Katja Nyboe, Micheal Seifert,\u001b[0m\u001b[31m    \u001b[1;37m     $\u001b[0m\u001b[31m,\u001b[1;37m  $\u001b[0m\u001b[31m,    \u001b[1;37m , \u001b[1;34m           Screen by:\n\r\u001b[1;34m      Sebastian Hammer  \u001b[0m\u001b[31m                    \"ss.$ss. .\u001b[1;37ms'\u001b[34m\n\r                             \u001b[1;37m       ,\u001b[0m\u001b[31m     .ss$$$$$$$$$$s,         \u001b[1;34m         Row\n\r\u001b[1;36mFounders: Sphynx,Keops,Cobra,Wimp. \u001b[1;37m $\u001b[0m\u001b[31m.s$$$$$$$$$$$$$$\u001b[1;37m`\u001b[0m\u001b[31m$$Ss\u001b[1;34m           Tua Xiong\n\r\u001b[1;36m                              \u001b[0m\u001b[31m     \"$$$$$$$$$$$$$$$$$$o$$$ \u001b[1;37m ,\u001b[1;34m        Pal\n\r          \u001b[0m\u001b[31m                         s$$$$$$$$$$$$$$$$$$$$$$$$s,  ,\u001b[1;37ms\n\r\u001b[1;34m                                 \u001b[0m\u001b[31m s$$$$$$$$$\"$$$$$$\"\"\"\"$$$$$$\"$$$$$,\n\r\u001b[1;34m                                  \u001b[0m\u001b[31m s$$$$$$$$$$s\"\"$$$$ssssss\"$$$$$$$$\"\n\r\u001b[1;34m                             \u001b[0m\u001b[31m      s$$$$$$$$$$'  `\"\"\"ss\"$\"$s\"\"\n\r\u001b[1;34m                               \u001b[0m\u001b[31m  s$$$$$$$$$$,              `\"\"\"\"\"\u001b[1;37m$ \u001b[0m\u001b[31m .s$$s\n\r                                 s$$$$$$$$$$$$s,...               \u001b[1;37m`\u001b[0m\u001b[31ms$$'  \u001b[1;37m`\n\r\u001b[1;32m    dMMMMMMMMb  dMP dMP .dMMMb dMMMMMMP dMP .aMMMb\u001b[0m\u001b[31m$$$\u001b[1;37m####\u001b[0m\u001b[31ms.     .$$\"$\u001b[1;37m.\u001b[0m\u001b[31m   ,  s\u001b[1;37m-\n\r\u001b[1;32m   dMP\"dMP\"dMP dMP.dMP dMP\" VP   dMP   amr dMP\"VMP\u001b[0m\u001b[31m$$$$$\u001b[1;37m#####\u001b[0m\u001b[31m$$$$$$\"     $.$'\n\r\u001b[1;32m  dMP dMP dMP  VMMMMP  VMMMb    dMP   dMP dMP    \u001b[0m\u001b[31m$$$$$$$$$\u001b[1;37m####\u001b[0m\u001b[31ms\"\"     .$$$|\n\r\u001b[1;32m dMP dMP dMP dA .dMP dP .dMP   dMP   dMP dMP.aMP \u001b[0m\u001b[31m$$$$$$$$$$$$$$\u001b[1;37m##\u001b[0m\u001b[31ms    .$$\" $\n\r\u001b[1;32mdMP dMP dMP  VMMMP\"  VMMMP\"   dMP   dMP  VMMMP\"\u001b[0m\u001b[31m $$$$$$$$$$$$$$$$$$$$$$$$\"   \u001b[1;37m`\u001b[0m\u001b[31m\n\r                                      $$\"  \"$\"$$$$$$$$$$$$$$$$$$$$S\"\"\"\"'\n\r\u001b[1;32m    .aMMMb  dMMMMb  dMP dMP dMMMMMP dMMMMb dMMMMMMP dMP dMP dMMMMb  dMMMMMP\n\r\u001b[1;32m   dMP\"dMP dMP VM  dMP dMP dMP     dMP dMP   dMP   dMP dMP dMP dMP dMP\n\r\u001b[1;32m  dMMMMMP dMP dMP dMP,dMP dMMMP   dMP dMP   dMP   dMP dMP dMMMMK  dMMMP\n\r\u001b[1;32m dMP dMP dMP.aMP  YMvAP\" dMP     dMP dMP   dMP   dMP.aMP dMP AMF dMP\n\r\u001b[1;32mdMP dMP dMMMMP\"    VP\"  dMMMMMP dMP dMP   dMP    VMMMP\" dMP dMP dMMMMMP\n\r        \u001b[0m       \u001b[31m     \"$$sS$$$$$$$$$$$$$$$$$$$$$$$$$$$\u001b[1;37m########\u001b[0m\u001b[31m\"\n\r\u001b[1;34m              \u001b[0m \u001b[31m  s$$$$$$$$$$$$$$$$$$$$$$$\u001b[1;37m#########\u001b[0m\u001b[31m\"\"'\n\r\n\r\u001b[1;35mWhat is thy name, adventurer? \u001b[0m",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5044732093811035,
        "total": 12.220788955688477
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:01:26.249119+00:00",
      "host": "mud.mystic-adventure.org",
      "ip": "64.225.2.15",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug mud.mystic-adventure.org 4000
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=mud.mystic-adventure.org port=4000
INFO client_base.py:186 Connected to <Peer 64.225.2.15 4000>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
    WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
    DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:118 Connection closed to <Peer 64.225.2.15 4000>