Nuke
+ . . . . _ . . + . . . +
. | . . + . // * . . . _/_ . * . | . .
. -*- . , , , _ // _. ________ _ . . / __ . -*- .
. | . (_(_/_</_</_(__(_) / / <</_ <__(_) . | . .
+ . * . . + . . * . . . + . * . .
. _ __ _ . _ __ . _ __ . __ + _ __ . _ . __ _ __ .
. ' ) ) ' ) / / ) _// / ` / ) ' ) ) ' ) / / ) ' ) ) .
. / / / / / / /-- /--/ /--' . / / / /--/ /--' +
. + / (_ (__/ (__/ /___ (___, / (_ / \_ . (_(_/ / (_ / \_ .
-----------------------------------------------------------------------------
nuclearwarmud.com | admin@nuclearwarmud.com
=============================================================================
The static content and underlying source code for this MUD, MUD driver and
it's MUDLib are subject to copyright a
s it's based on lpmudlib 2.4.5 code.
Please see http://nuclearwarmud.com/COPYRIGHT for more information.
Nuclear War MUD is located in Dallas, USA.
Nuclear War MUD rebooted 1 day 15 hours 49 minutes 16 seconds ago.
There are 5 users logged on right now. Unique logins during this reboot: 8.
Use "guest" for short visits, "users" to see who is on or "quit" to exit.
We finally upgraded our driver to FluffOS 2019. Thank you for everyone who participated in it!
What is your name:Server Info
Players online: 6 [1]
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.
MSSP: Yes (MSSP)
GMCP: No
MSDP: No
MCCP: No
MCCP2: No
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 1 other server.
Options offered by server: CHARSET, ECHO
Options requested from client: NAWS, NEW_ENVIRON, TTYPE
Data source: 10e5c82d7d10d380/a2ba3f6f527a1001.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "10e5c82d7d10d380",
"fingerprint-data": {
"offered-options": [
"CHARSET",
"ECHO"
],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"COM_PORT",
"DET",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": [
"NAWS",
"NEW_ENVIRON",
"TTYPE"
]
},
"session_data": {
"banner_after_return": "s it's based on lpmudlib 2.4.5 code.\r\nPlease see http://nuclearwarmud.com/COPYRIGHT for more information.\r\nNuclear War MUD is located in Dallas, USA.\r\nNuclear War MUD rebooted 1 day 15 hours 49 minutes 16 seconds ago.\r\nThere are 5 users logged on right now. Unique logins during this reboot: 8.\r\nUse \"guest\" for short visits, \"users\" to see who is on or \"quit\" to exit.\r\n\r\nWe finally upgraded our driver to FluffOS 2019. Thank you for everyone who participated in it!\r\nWhat is your name: ",
"banner_before_return": "\r\n + . . . . _ . . + . . . +\r\n . | . . + . // * . . . _/_ . * . | . .\r\n. -*- . , , , _ // _. ________ _ . . / __ . -*- .\r\n . | . (_(_/_</_</_(__(_) / / <</_ <__(_) . | . .\r\n + . * . . + . . * . . . + . * . .\r\n . _ __ _ . _ __ . _ __ . __ + _ __ . _ . __ _ __ .\r\n . ' ) ) ' ) / / ) _// / ` / ) ' ) ) ' ) / / ) ' ) ) .\r\n . / / / / / / /-- /--/ /--' . / / / /--/ /--' +\r\n . + / (_ (__/ (__/ /___ (___, / (_ / \\_ . (_(_/ / (_ / \\_ .\r\n\r\n-----------------------------------------------------------------------------\r\n nuclearwarmud.com | admin@nuclearwarmud.com\r\n=============================================================================\r\nThe static content and underlying source code for this MUD, MUD driver and\r\nit's MUDLib are subject to copyright a",
"encoding": "ascii",
"mssp": {
"NAME": "Nuke",
"PLAYERS": "6",
"UPTIME": "1770389982"
},
"option_states": {
"environ_requested": [],
"server_offered": {
"0x56": false,
"CHARSET": true,
"MSSP": true
},
"server_requested": {
"NAWS": true,
"NEW_ENVIRON": true,
"TTYPE": true
}
},
"timing": {
"probe": 0.1033177375793457,
"total": 0.6047852039337158
}
}
},
"sessions": [
{
"connected": "2026-02-08T06:48:59.098132+00:00",
"host": "nuclearwarmud.com",
"ip": "173.255.201.173",
"port": 4080
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:773 Fingerprint client: host=nuclearwarmud.com port=4080
INFO client_base.py:174 Connected to <Peer 173.255.201.173 4080>
DEBUG stream_writer.py:655 recv IAC DO TTYPE
DEBUG stream_writer.py:1668 handle_do(TTYPE)
DEBUG stream_writer.py:2883 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:896 send IAC WILL TTYPE
DEBUG stream_writer.py:2883 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:2883 local_option[TTYPE] = True
DEBUG stream_writer.py:2883 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:655 recv IAC DO NAWS
DEBUG stream_writer.py:1668 handle_do(NAWS)
DEBUG stream_writer.py:2883 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:896 send IAC WILL NAWS
DEBUG stream_writer.py:2208 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:2883 local_option[NAWS] = True
DEBUG stream_writer.py:2883 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:655 recv IAC DO NEW_ENVIRON
DEBUG stream_writer.py:1668 handle_do(NEW_ENVIRON)
DEBUG stream_writer.py:2883 pending_option[WILL + NEW_ENVIRON] = True
DEBUG stream_writer.py:896 send IAC WILL NEW_ENVIRON
DEBUG stream_writer.py:2883 pending_option[SB + NEW_ENVIRON] = True
DEBUG stream_writer.py:2883 local_option[NEW_ENVIRON] = True
DEBUG stream_writer.py:2883 pending_option[WILL + NEW_ENVIRON] = False
DEBUG stream_writer.py:655 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:671 WILL MCCP2_COMPRESS unsolicited
DEBUG stream_writer.py:1793 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:2883 remote_option[MCCP2_COMPRESS] = False
DEBUG stream_writer.py:896 send IAC DONT MCCP2_COMPRESS
WARNING stream_writer.py:1882 Unhandled: WILL MCCP2_COMPRESS.
DEBUG stream_writer.py:655 recv IAC WILL MSSP
DEBUG stream_writer.py:671 WILL MSSP unsolicited
DEBUG stream_writer.py:1793 handle_will(MSSP)
DEBUG stream_writer.py:2883 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:896 send IAC DO MSSP
DEBUG stream_writer.py:2883 remote_option[MSSP] = True
DEBUG stream_writer.py:2883 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:655 recv IAC WILL CHARSET
DEBUG stream_writer.py:673 WILL CHARSET (bi-directional capability exchange)
DEBUG stream_writer.py:1793 handle_will(CHARSET)
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:896 send IAC DO CHARSET
DEBUG stream_writer.py:2883 remote_option[CHARSET] = True
DEBUG stream_writer.py:2883 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:647 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:634 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2883 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2105 recv TTYPE SEND: b''
DEBUG stream_writer.py:2116 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:647 begin sub-negotiation SB NEW_ENVIRON
DEBUG stream_writer.py:634 sub-negotiation cmd NEW_ENVIRON SE completion byte
DEBUG stream_writer.py:2883 pending_option[SB + NEW_ENVIRON] = False
DEBUG stream_writer.py:2151 recv NEW_ENVIRON SEND (all)
DEBUG stream_writer.py:2174 env send: LANG='C', TERM='VT100', LINES=25, COLUMNS=80, COLORTERM=''
DEBUG client_base.py:460 negotiation complete after 0.25s.
DEBUG stream_writer.py:647 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:634 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:1938 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1595 MSSP: {'NAME': 'Nuke', 'PLAYERS': '6', 'UPTIME': '1770389982'}
DEBUG stream_writer.py:647 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:634 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:1938 [SB + CHARSET] unsolicited
DEBUG client.py:266 encoding negotiated: UTF-8
DEBUG stream_writer.py:2013 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:1250 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:896 send IAC DO BINARY
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = True
DEBUG stream_writer.py:896 send IAC DO SGA
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:896 send IAC DO ECHO
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:896 send IAC DO STATUS
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = True
DEBUG stream_writer.py:896 send IAC DO EOR
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:896 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:655 recv IAC WONT BINARY
DEBUG stream_writer.py:1899 handle_wont(BINARY)
DEBUG stream_writer.py:2883 remote_option[BINARY] = False
DEBUG stream_writer.py:2883 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:655 recv IAC WILL SGA
DEBUG stream_writer.py:1793 handle_will(SGA)
DEBUG stream_writer.py:870 skip DO SGA; pending_option = True
DEBUG stream_writer.py:2883 remote_option[SGA] = True
DEBUG stream_writer.py:2883 pending_option[DO + SGA] = False
DEBUG stream_writer.py:655 recv IAC WONT SGA
DEBUG stream_writer.py:1899 handle_wont(SGA)
DEBUG stream_writer.py:2883 remote_option[SGA] = False
DEBUG stream_writer.py:655 recv IAC WILL ECHO
DEBUG stream_writer.py:1793 handle_will(ECHO)
DEBUG stream_writer.py:870 skip DO ECHO; pending_option = True
DEBUG stream_writer.py:2883 remote_option[ECHO] = True
DEBUG stream_writer.py:2883 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:655 recv IAC WONT STATUS
DEBUG stream_writer.py:1899 handle_wont(STATUS)
DEBUG stream_writer.py:2883 remote_option[STATUS] = False
DEBUG stream_writer.py:2883 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:655 recv IAC WONT EOR
DEBUG stream_writer.py:1899 handle_wont(EOR)
DEBUG stream_writer.py:2883 remote_option[EOR] = False
DEBUG stream_writer.py:2883 pending_option[DO + EOR] = False
DEBUG stream_writer.py:655 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:1899 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:2883 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:2883 pending_option[DO + COM_PORT_OPTION] = False
INFO fingerprinting.py:727 new server fingerprint 76d49ec90dc221a5
INFO client_base.py:105 Connection closed to <Peer 173.255.201.173 4080>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug nuclearwarmud.com 4080