mud.valheru.com

mud.valheru.com:4242

Telnet Fingerprint

8d9ec9f191ea1be9…

This fingerprint is shared by 110 other servers.

Data source: 8d9ec9f191ea1be9/7748f39c05f901b1.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8d9ec9f191ea1be9",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AUTHENTICATION",
        "BINARY",
        "BM",
        "CHARSET",
        "COM_PORT",
        "DET",
        "ECHO",
        "ENCRYPT",
        "EOR",
        "FORWARD_X",
        "KERMIT",
        "NAMS",
        "NAOCRD",
        "NAOFFD",
        "NAOHTD",
        "NAOHTS",
        "NAOL",
        "NAOLFD",
        "NAOP",
        "NAOVTD",
        "NAOVTS",
        "PRAGMA_HEARTBEAT",
        "PRAGMA_LOGON",
        "RCP",
        "RCTE",
        "RSP",
        "SEND_URL",
        "SGA",
        "SSPI_LOGON",
        "STATUS",
        "SUPDUP",
        "SUPDUPOUTPUT",
        "SUPPRESS_LOCAL_ECHO",
        "TLS",
        "TN3270E",
        "TTYLOC",
        "VT3270REGIME",
        "X3PAD",
        "XAUTH"
      ],
      "requested-options": []
    },
    "session_data": {
      "banner_after_return": " for a password immediately it means that the name is\n\r\ralready taken\u001b[0;37m\u001b[40m, so pick another one. Certain names may not be accepted, please \n\r\rread more at http://www.valheru.com/rules.html.\n\r\r\nVME (Valhalla Mud Engine) V.2.0.0  Business License - Copyright 1997-1999\n\rLicensed to: Valheru MUD\n\r\n\rBy what name do they call you? ",
      "banner_before_return": "\n\r\n\r\r\n\r\r                              \u001b[1;31mW\u001b[0;31m\u001b[40melcome \u001b[1;31mt\u001b[0;31m\u001b[40mo \u001b[1;31mV\u001b[0;31m\u001b[40malheru \u001b[1;31mM\u001b[0;31m\u001b[40mud.\u001b[0;37m\u001b[40m\n\r\r             \u001b[1;37m      _  _  __    __    _   _  ____  ____  __  __   \n\r\r             \u001b[1;37m     ( \\/ )/__\\  (  )  ( )_( )( ___)(  _ \\(  )(  )  \n\r\r             \u001b[1;34m      \\  //(__)\\  )(__  ) _ (  )__)  )   / )(__)(    \n\r\r             \u001b[0;34m\u001b[40m       \\/(__)(__)(____)(_) (_)(____)(_)\\_)(______)  \n\r\r             \u001b[1;37m                __  __  __  __  ____  \n\r\r             \u001b[1;37m               (  \\/  )(  )(  )(  _ \\ \n\r\r             \u001b[1;34m                )    (  )(__)(  )(_) )\n\r\r             \u001b[0;34m\u001b[40m               (_/\\/\\_)(______)(____/ \n\r\r     \n\r\r                        \u001b[1;32mB\u001b[0;32m\u001b[40m e y o n d   \u001b[1;32mA\u001b[0;32m\u001b[40m d v e n t u r e\u001b[0;37m\u001b[40m \n\r\r     \n\r\r   \u001b[1;31m*\u001b[1;33m  Competitions, prizes, quests and dragon-slaying-fun.\n\r\r   \u001b[1;31m*\u001b[1;33m  The world, players and engine you just cant beat!\n\r\r\n\r\r\u001b[1;37mI\u001b[0;37m\u001b[40mf you are \u001b[1;32masked",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "timing": {
        "probe": 0.5044615268707275,
        "total": 1.00529146194458
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T05:29:59.807502+00:00",
      "host": "mud.valheru.com",
      "ip": "167.71.64.84",
      "port": 4242
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=mud.valheru.com port=4242
INFO client_base.py:174 Connected to <Peer 167.71.64.84 4242>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 167.71.64.84 4242>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug mud.valheru.com 4242