soulruins.com
Connection Banner:
Server URLs
- Telnet: telnet://soulruins.com:5000
- Website: soulruins.com
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation.
MSSP: No
GMCP: No
MSDP: No
MCCP: No
MCCP2: Negotiated
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 75 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\n\r XX XX\n\r XX..X X..XX\n\r XX.....X X.....XX\n\r XXXXX.....XX XX.....XXXXX\n\r X |......XX\\,.@ @#/,XX......| X\n\r X |.....X @#\\,.@ @#/,.@ X.....| X\n\r X \\...X @#\\,.@ @#/,.@ X.../ X\n\r X# \\.X @#\\,.@ @#/,.@ X./ #\n\r ## X @#\\,.@ @#/,.@ X #\n\r , \"# #X @#\\,.@ @#/,.@ X ##\n\r `###X @#\\,.@ @#/,.@ ####'\n\r . ' ### @#\\.,@ @#/,.@ ###`\"\n\r _________ .__ __________ .__\n\r / _____/ ____ __ __| | \\______ \\__ __|__| ____ ______\n\r \\_____ \\ / _ \\| | \\ | | _/ | \\ |/ \\ / ___/\n\r / ( <_> ) | / |__ | | \\ | / | | \\\\___ \\\n\r _,.-*-'-*-.,_,.-*-'-*-.,_,.-*-'-*-.,.-*-'-*-.,_,.-*-'-*-.,_,.-*-'-*-.,_\n\r/ Diku: Staerfeldt, Madsen, Nyboe, Seifert Hammer. SMAUG: Thoric, \\\n\r Blodkai, Nivek & Altrag. Resort: Ntanel, Garinan, Badastaz, Josh, \n\r Digifuzz, Senir. MUD operated and programmed by Hypereye and Alucard.\n\r-------------------------------------------------------------------------\n\r Telnet://soulruins.com port 5000 --- Http://www.soulruins.com\n\rHypereye: mwoodj@soulruins.com [ Rwho - Soul ] Dace: dace@kmfms.com (retired)\n\r-------------------------------------------------------------------------\n\r [ Get your issue of MUD Companion at http://www.mudcompanion.com/! ]\n\rEnter thy name or type \"new\" to create a character: ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {
"MCCP2": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.636728763580322
}
}
},
"sessions": [
{
"connected": "2026-03-07T03:58:49.197979+00:00",
"host": "soulruins.com",
"ip": "24.96.51.127",
"port": 5000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug soulruins.com 5000
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=soulruins.com port=5000
INFO client_base.py:186 Connected to <Peer 24.96.51.127 5000>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:768 recv IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:1994 handle_will(MCCP2_COMPRESS)
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:3330 remote_option[MCCP2_COMPRESS] = True
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = False
DEBUG client_base.py:499 negotiation failed after 4.01s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
DO ZMP'
DEBUG stream_writer.py:762 begin sub-negotiation SB MCCP2_COMPRESS
DEBUG stream_writer.py:749 sub-negotiation cmd MCCP2_COMPRESS SE completion byte
DEBUG stream_writer.py:2187 [SB + MCCP2_COMPRESS] unsolicited
DEBUG stream_writer.py:3178 MCCP2 activated
DEBUG client_base.py:448 MCCP2 decompression started (server→client)
DEBUG client_base.py:454 MCCP2 decompression ended (server→client)
DEBUG client_base.py:89 EOF from server, closing.
INFO client_base.py:118 Connection closed to <Peer 24.96.51.127 5000>
INFO fingerprinting.py:755 connection for server fingerprint c2dd7d4e76383b41