mud.nemesis.de

mud.nemesis.de:2000

Telnet Fingerprint

89d11e6aa6390ea0…

This fingerprint is shared by 5 other servers.

Options requested from client: TTYPE

Data source: 89d11e6aa6390ea0/b753a038dfe47f48.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "89d11e6aa6390ea0",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AUTHENTICATION",
        "BINARY",
        "BM",
        "CHARSET",
        "COM_PORT",
        "DET",
        "ECHO",
        "ENCRYPT",
        "EOR",
        "FORWARD_X",
        "KERMIT",
        "NAMS",
        "NAOCRD",
        "NAOFFD",
        "NAOHTD",
        "NAOHTS",
        "NAOL",
        "NAOLFD",
        "NAOP",
        "NAOVTD",
        "NAOVTS",
        "PRAGMA_HEARTBEAT",
        "PRAGMA_LOGON",
        "RCP",
        "RCTE",
        "RSP",
        "SEND_URL",
        "SGA",
        "SSPI_LOGON",
        "STATUS",
        "SUPDUP",
        "SUPDUPOUTPUT",
        "SUPPRESS_LOCAL_ECHO",
        "TLS",
        "TN3270E",
        "TTYLOC",
        "VT3270REGIME",
        "X3PAD",
        "XAUTH"
      ],
      "requested-options": [
        "TTYPE"
      ]
    },
    "session_data": {
      "banner_after_return": " ## XX       ## \r\n       #   ##     ## ##   XXX   X .## .## .##  XX       ##  XX        ##\r\n        ## #       ###      XXXX   #   #   #    XXX   ##     XXX     ##\r\n         ##                                          #             ##\r\n                           Prepare to die.                        #\r\nPlease use \"guest\" if you're just being curious.\r\nNemesis at Munich, Germany, is currently running version 03.01.02.\r\nContact Data (Impressum): https://nemesis.de/contact/\r\nPlease tell us your name: ",
      "banner_before_return": "    You have touched the world of ..........\r\n                             .... ||| __-- ....\r\n                          ... '  |||   --__--  ...\r\n                        ..  '' |   || __--  ||||  ..\r\n                      .. '' '   | __ --____  |||||  ..\r\n                     . ''  '  '  - __---- __  |||  `` .\r\n                    . '   ||| _--     ---  __  || ```  .\r\n                   . ''      -- ||  ---   __   |     `` .\r\n                   . '  ###    ||   -_  ---- -     ``  `.\r\n         ###       . |.##  ~ |||||       --_ |  || ```  .\r\n            ###    .  .##   |||||||||  ~  -   |||  ```` .     XX \r\n           ### ##   . ##  ~  ||||||||| ~~   ~  `  ```  .        X\r\n           ###  ##   .## ~      ||    ###  ##         .              .\r\n           ###  ##   ###   XXXXX  ## ## ### ##  XXXX .####    XX  ####<\r\n           ###   ##  ###. XX    X   ##  ##  ## XX  . ##      XX  ##\r\n       #   ###   ##  ###  .XXX      ##  ##  ##  XXX    ###   XX   ###\r\n        #  ###    ## ###  XX . .   ##  ##  ## .XX       ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "timing": {
        "probe": 0.5079796314239502,
        "total": 1.0088698863983154
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T06:01:27.518083+00:00",
      "host": "mud.nemesis.de",
      "ip": "81.92.172.208",
      "port": 2000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=mud.nemesis.de port=2000
INFO client_base.py:174 Connected to <Peer 81.92.172.208 2000>
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB TTYPE'
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 81.92.172.208 2000>
INFO fingerprinting.py:746 connection for server fingerprint 6f760814123baeb7

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug mud.nemesis.de 2000