Sanity’s Edge
IP name: mud.sanitysedge.com 2020 (4040 TLS)
Y O U H A V E R E A C H E D T H E E D G E
|\\\\\\\\\ |\\\\\\ |\\ |\\|\\\\\\ |\\\\\\ |\\ |\\ |\\ \\\\\\\\\
\\ | \\ \\ \\\\ \\ |\\ |\\ \\ \\ || \\
\\\\\\\\\\\ |\\\\\\ \\ \\ \\ \\ \\ \\\\\\ \\\\\\\\\
| |\\ \\ \\ \\ \\\\ \\ \\ | |\\ | |\\
\\\\\\\\\\ \\ \\ \\ \\\ \\\\\\\ \\ \\ \\\\\\\\\
| | || || || | | | | || || | |
//////////| //////| /////| /////////|
//| //| //| //| //| |
///////| // // // /////| //////|
//| // // // //| //| |
////////// /////// | /////// //////////|
| | | | | | | |
S A N I T Y ' S E D G E
Gamedriver version:CD.
06.06 Sep 13 2020 23:03:50
Mudlib version:CD.00.30-h4xed by CMD
Please enter your name:Server Info
Codebase: CD
Family: LPMud
Genre: Science Fiction
Gameplay: Hack and Slash
Players online: 5 [1]
Created: 1995
Location: United States of America
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.
MSSP: Yes (MSSP)
GMCP: Yes (MSSP)
MSDP: No
MCCP: No
MCCP2: No
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 1 other server.
Options offered by server: CHARSET, ECHO, SGA
Data source: b4e9c93ab4bb4b35/c3913a32d832937f.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "b4e9c93ab4bb4b35",
"fingerprint-data": {
"offered-options": [
"CHARSET",
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"COM_PORT",
"DET",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": []
},
"session_data": {
"banner_after_return": "06.06 Sep 13 2020 23:03:50\r\nMudlib version:\t\tCD.00.30-h4xed by CMD\r\n\r\nPlease enter your name: ",
"banner_before_return": "IP name: mud.sanitysedge.com 2020 (4040 TLS)\r\n\r\n\t Y O U H A V E R E A C H E D T H E E D G E \r\n\r\n \r\n |\\\\\\\\\\\\\\\\\\ |\\\\\\\\\\\\ |\\\\ |\\\\|\\\\\\\\\\\\ |\\\\\\\\\\\\ |\\\\ |\\\\ |\\\\ \\\\\\\\\\\\\\\\\\\r\n \\\\ | \\\\ \\\\ \\\\\\\\ \\\\ |\\\\ |\\\\ \\\\ \\\\ || \\\\\r\n \\\\\\\\\\\\\\\\\\\\\\ |\\\\\\\\\\\\ \\\\ \\\\ \\\\ \\\\ \\\\ \\\\\\\\\\\\ \\\\\\\\\\\\\\\\\\\r\n | |\\\\ \\\\ \\\\ \\\\ \\\\\\\\ \\\\ \\\\ | |\\\\ | |\\\\\r\n \\\\\\\\\\\\\\\\\\\\ \\\\ \\\\ \\\\ \\\\\\ \\\\\\\\\\\\\\ \\\\ \\\\ \\\\\\\\\\\\\\\\\\\r\n | | || || || | | | | || || | |\r\n\r\n //////////| //////| /////| /////////|\r\n //| //| //| //| //| |\r\n ///////| // // // /////| //////| \r\n //| // // // //| //| |\r\n ////////// /////// | /////// //////////|\r\n | | | | | | | |\r\n\r\n\t\t\tS A N I T Y ' S E D G E\r\n\r\n\r\nGamedriver version:\tCD.",
"encoding": "ascii",
"mssp": {
"ANSI": "1",
"CLASSES": "0",
"CODEBASE": "CD",
"CRAWL DELAY": "-1",
"CREATED": "1995",
"FAMILY": "LPMud",
"GAMEPLAY": "Hack and Slash",
"GAMESYSTEM": "None",
"GENRE": "Science Fiction",
"GMCP": "1",
"HIRING BUILDERS": "0",
"HIRING CODERS": "0",
"HOSTNAME": "sanitysedge.com",
"LANGUAGE": "English",
"LEVELS": "0",
"LOCATION": "United States of America",
"MCCP": "0",
"MCP": "0",
"MINIMUM AGE": "18",
"MSDP": "0",
"MSP": "0",
"MXP": "0",
"NAME": "Sanity's Edge",
"PAY FOR PERKS": "0",
"PAY TO PLAY": "0",
"PLAYERS": "5",
"PORT": "2020",
"PUEBLO": "0",
"RACES": "1",
"SKILLS": "34",
"SUBGENRE": "Cyberpunk",
"UPTIME": "1769014608",
"UTF-8": "0",
"XTERM 256 COLORS": "1",
"XTERM TRUE COLORS": "0"
},
"option_states": {
"server_offered": {
"CHARSET": true,
"GMCP": true,
"MSSP": true
},
"server_requested": {}
},
"timing": {
"probe": 0.053464412689208984,
"total": 0.554868221282959
}
}
},
"sessions": [
{
"connected": "2026-02-08T06:42:31.576266+00:00",
"host": "sanitysedge.com",
"ip": "35.171.219.224",
"port": 2020
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=sanitysedge.com port=2020
INFO client_base.py:174 Connected to <Peer 35.171.219.224 2020>
DEBUG stream_writer.py:692 recv IAC WILL GMCP
DEBUG stream_writer.py:708 WILL GMCP unsolicited
DEBUG stream_writer.py:1863 handle_will(GMCP)
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 remote_option[GMCP] = True
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:692 recv IAC WILL MSSP
DEBUG stream_writer.py:708 WILL MSSP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSSP)
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 remote_option[MSSP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:692 recv IAC WILL CHARSET
DEBUG stream_writer.py:710 WILL CHARSET (bi-directional capability exchange)
DEBUG stream_writer.py:1863 handle_will(CHARSET)
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 remote_option[CHARSET] = True
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:1287 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:684 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:671 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2025 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1637 MSSP: {'XTERM TRUE COLORS': '0', 'MSDP': '0', 'CODEBASE': 'CD', 'UTF-8': '0', 'UPTIME': '1769014608',
'PAY FOR PERKS': '0', 'PUEBLO': '0', 'HIRING BUILDERS': '0', 'MCCP': '0', 'NAME': "Sanity's Edge", 'GAMESYSTEM': 'None',
'PORT': '2020', 'PLAYERS': '5', 'CLASSES': '0', 'GAMEPLAY': 'Hack and Slash', 'MSP': '0', 'MCP': '0', 'CREATED': '1995', 'PAY
TO PLAY': '0', 'FAMILY': 'LPMud', 'SUBGENRE': 'Cyberpunk', 'SKILLS': '34', 'ANSI': '1', 'GENRE': 'Science Fiction', 'HIRING
CODERS': '0', 'XTERM 256 COLORS': '1', 'LOCATION': 'United States of America', 'LEVELS': '0', 'LANGUAGE': 'English', 'GMCP':
'1', 'MXP': '0', 'HOSTNAME': 'sanitysedge.com', 'CRAWL DELAY': '-1', 'RACES': '1', 'MINIMUM AGE': '18'}
DEBUG stream_writer.py:684 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:671 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2025 [SB + CHARSET] unsolicited
WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/client_base.py", line 399, in _process_chunk
WARNING client_base.py:495 recv_inband = writer.feed_byte(_ONE_BYTE[b])
WARNING client_base.py:495 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 675, in feed_byte
WARNING client_base.py:495 self.handle_subnegotiation(self._sb_buffer)
WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 2051, in handle_subnegotiation
WARNING client_base.py:495 fn_call(buf)
WARNING client_base.py:495 File "/home/jquast/telnetlib3/telnetlib3/stream_writer.py", line 2120, in _handle_sb_charset
WARNING client_base.py:495 raise ValueError(f"Illegal option follows IAC SB CHARSET: {opt!r}.")
WARNING client_base.py:495 ValueError: Illegal option follows IAC SB CHARSET: b';'.
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:1287 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
DEBUG stream_writer.py:692 recv IAC WONT BINARY
DEBUG stream_writer.py:1985 handle_wont(BINARY)
DEBUG stream_writer.py:3030 remote_option[BINARY] = False
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:692 recv IAC WILL SGA
DEBUG stream_writer.py:1863 handle_will(SGA)
DEBUG stream_writer.py:907 skip DO SGA; pending_option = True
DEBUG stream_writer.py:3030 remote_option[SGA] = True
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = False
DEBUG stream_writer.py:692 recv IAC WILL ECHO
DEBUG stream_writer.py:1863 handle_will(ECHO)
DEBUG stream_writer.py:907 skip DO ECHO; pending_option = True
DEBUG stream_writer.py:3030 remote_option[ECHO] = True
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:692 recv IAC WONT STATUS
DEBUG stream_writer.py:1985 handle_wont(STATUS)
DEBUG stream_writer.py:3030 remote_option[STATUS] = False
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:692 recv IAC WONT EOR
DEBUG stream_writer.py:1985 handle_wont(EOR)
DEBUG stream_writer.py:3030 remote_option[EOR] = False
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = False
DEBUG stream_writer.py:692 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:1985 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3030 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:692 recv IAC WONT MSDP
DEBUG stream_writer.py:1985 handle_wont(MSDP)
DEBUG stream_writer.py:3030 remote_option[MSDP] = False
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:692 recv IAC WONT MSP
DEBUG stream_writer.py:1985 handle_wont(MSP)
DEBUG stream_writer.py:3030 remote_option[MSP] = False
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = False
DEBUG stream_writer.py:692 recv IAC WONT MXP
DEBUG stream_writer.py:1985 handle_wont(MXP)
DEBUG stream_writer.py:3030 remote_option[MXP] = False
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = False
DEBUG stream_writer.py:692 recv IAC WONT ZMP
DEBUG stream_writer.py:1985 handle_wont(ZMP)
DEBUG stream_writer.py:3030 remote_option[ZMP] = False
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:692 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:1985 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3030 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:692 recv IAC WONT ATCP
DEBUG stream_writer.py:1985 handle_wont(ATCP)
DEBUG stream_writer.py:3030 remote_option[ATCP] = False
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint 8fc1730a768daf6a
INFO client_base.py:105 Connection closed to <Peer 35.171.219.224 2020>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug sanitysedge.com 2020