rotjmud.com
Connection Banner:
Server URLs
- Telnet: telnet://rotjmud.com:9400
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 173 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": ". . . . . . . .\r\n . . . /*****************\\ . . .\r\n . . Revenge of the Jedi * . \r\n . . . . \\*****************/ . . .\r\n . . * . . . .\r\n . . . . . . . .\r\n . . -)------+====+ .\r\n -)----==== ,' ,' . .\r\n . . `. `.,;___,' * .\r\n . . * `, |____l_\\ .\r\n _,.....------c==]\"\"______ |,,,,,,.....____ _\r\n . . \"-:______________ |____l_|]''''''''''' . .\r\n ,'\"\",'. `. .\r\n . -)-----==== `. `. .\r\n . * . . -)-------+====+ . .\r\n . . . . .\r\n . . . . * . . .\r\n . Based on CircleMUD 3.0, Created by Jeremy Elson . .\r\n . CircleMUD is a derivative of DikuMUD (GAMMA 0.0) created by:\r\n . Hans Henrik Staerfeldt, Katja Nyboe, Tom Madsen, Michael Seifert\r\n . . . and Sebastian Hammer . .\r\n . All rights reserved. Star Wars is a registered trademark of Lucasfilm\r\n . . Welcome Screen by Xerxes . .\r\n . . . . .\r\n By what name do you wish to be known? Please wait\u001b[2K\n\rBy what name do you wish to be known? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.690242052078247
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:12:19.280388+00:00",
"host": "rotjmud.com",
"ip": "34.214.193.207",
"port": 9400
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug rotjmud.com 9400
Show Logfile
DEBUG client.py:965 Fingerprint client: host=rotjmud.com port=9400
INFO client_base.py:175 Connected to <Peer 34.214.193.207 9400>
DEBUG client_base.py:492 negotiation complete after 0.00s.
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:106 Connection closed to <Peer 34.214.193.207 9400>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41