d20MUD: Star Wars
W E L C O M E T O
_ _ _ _ _ _
/ \ / \ / \ / \ / \ / \
( d | 2 | 0 | M | U | D )
\_/ \_/ \_/ \_/ \_/ \_/
________________. ___ .______
/ | / \ | _ \
| (-----| |----`/ ^ \ | |_) |
\ \ | | / /_\ \ | /
.-----) | | | / _____ \ | |\ \-------.
|________/ |__| /__/ \__\| _| `.________|
____ __ ____ ___ .______ ________.
\ \ / \ / / / \ | _ \ / |
\ \/ \/ / / ^ \ | |_) || (-----`
\ / / /_\ \ | / \ \
\ /\ / / _____ \ | |\ \---) |
\__/ \__/ /__/ \__\|__| `._______/
d20MUD Created by Gicker (Stephen Squires)
Built from CWG Rasputin by Zizazat (Mark Garringer)
Based on CircleMUD 3.1 Created by Jeremy Elson
A derivative of DikuMUD (GAMMA 0.0), created by Hans-Henrik Staerfeldt,
Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer
Enter your account name. If you are a new account, simply type what you would like it to be: Server Info
Codebase: CircleMUD 3.1
Players online: 1 [1]
Created: 2005
Website: http://www.d20mud.com
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.
MSSP: Yes (MSSP)
GMCP: No
MSDP: Negotiated
MCCP: No
MCCP2: No
MXP: No
MSP: No
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 15 other servers.
Options requested from client: CHARSET, NAWS, TTYPE
Data source: e49f2eef99a26459/8c3d8d1670192b81.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "e49f2eef99a26459",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"CHARSET",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\n W E L C O M E T O \r\n _ _ _ _ _ _ \r\n / \\ / \\ / \\ / \\ / \\ / \\ \r\n ( d | 2 | 0 | M | U | D ) \r\n \\_/ \\_/ \\_/ \\_/ \\_/ \\_/ \r\n\r\n ________________. ___ .______ \r\n / | / \\ | _ \\\r\n | (-----| |----`/ ^ \\ | |_) |\r\n \\ \\ | | / /_\\ \\ | /\r\n .-----) | | | / _____ \\ | |\\ \\-------.\r\n |________/ |__| /__/ \\__\\| _| `.________|\r\n ____ __ ____ ___ .______ ________.\r\n \\ \\ / \\ / / / \\ | _ \\ / |\r\n \\ \\/ \\/ / / ^ \\ | |_) || (-----`\r\n \\ / / /_\\ \\ | / \\ \\\r\n \\ /\\ / / _____ \\ | |\\ \\---) |\r\n \\__/ \\__/ /__/ \\__\\|__| `._______/\r\n\r\n \r\n d20MUD Created by Gicker (Stephen Squires) \r\n \r\n Built from CWG Rasputin by Zizazat (Mark Garringer) \r\n \r\n Based on CircleMUD 3.1 Created by Jeremy Elson \r\n \r\n A derivative of DikuMUD (GAMMA 0.0), created by Hans-Henrik Staerfeldt, \r\n Katja Nyboe, Tom Madsen, Michael Seifert, and Sebastian Hammer \r\n\r\n\u001b[1;36mEnter your account name. If you are a new account, simply type what you would like it to be: \u001b[0m",
"encoding": "ascii",
"mssp": {
"CODEBASE": "CircleMUD 3.1",
"CONTACT": "gicker\u001b[0;30m20mud.com",
"CRAWL DELAY": "-1",
"CREATED": "2005",
"HOSTNAME": "mud.d20mud.com",
"LANGUAGE": "English",
"NAME": "d20MUD: Star Wars",
"PLAYERS": "1",
"PORT": "5500",
"UPTIME": "1770415186",
"WEBSITE": "http://www.d20mud.com"
},
"option_states": {
"server_offered": {
"0x5a": false,
"0x5b": false,
"MSDP": true,
"MSSP": true
},
"server_requested": {
"0x5b": false,
"0xc8": false,
"CHARSET": true,
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.6299939155578613
}
}
},
"sessions": [
{
"connected": "2026-02-08T17:20:38.587089+00:00",
"host": "starwars.d20mud.com",
"ip": "74.208.126.44",
"port": 5500
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=starwars.d20mud.com port=5500
INFO client_base.py:174 Connected to <Peer 74.208.126.44 5500>
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:692 recv IAC DO NAWS
DEBUG stream_writer.py:1733 handle_do(NAWS)
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:933 send IAC WILL NAWS
DEBUG stream_writer.py:2300 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3030 local_option[NAWS] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:692 recv IAC DO CHARSET
DEBUG stream_writer.py:1733 handle_do(CHARSET)
DEBUG stream_writer.py:3030 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:933 send IAC WILL CHARSET
DEBUG stream_writer.py:3030 local_option[CHARSET] = True
DEBUG stream_writer.py:3030 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:692 recv IAC WILL MSDP
DEBUG stream_writer.py:708 WILL MSDP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSDP)
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 remote_option[MSDP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:692 recv IAC WILL MSSP
DEBUG stream_writer.py:708 WILL MSSP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSSP)
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 remote_option[MSSP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:692 recv IAC DO ATCP
DEBUG stream_writer.py:1733 handle_do(ATCP)
DEBUG stream_writer.py:3030 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:933 send IAC WILL ATCP
DEBUG stream_writer.py:3030 local_option[ATCP] = True
DEBUG stream_writer.py:3030 pending_option[WILL + ATCP] = False
DEBUG stream_writer.py:692 recv IAC WILL MSP
DEBUG stream_writer.py:708 WILL MSP unsolicited
DEBUG stream_writer.py:1863 handle_will(MSP)
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 remote_option[MSP] = True
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = False
DEBUG stream_writer.py:692 recv IAC DO MXP
DEBUG stream_writer.py:1733 handle_do(MXP)
DEBUG stream_writer.py:3030 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:933 send IAC WILL MXP
DEBUG stream_writer.py:3030 local_option[MXP] = True
DEBUG stream_writer.py:3030 pending_option[WILL + MXP] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2025 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:684 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:671 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:2025 [SB + CHARSET] unsolicited
DEBUG client.py:266 encoding negotiated: UTF-8
DEBUG stream_writer.py:2105 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:684 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:671 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:2025 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1633 MSDP: {'SERVER_ID': 'd20MUD: Star Wars'}
DEBUG stream_writer.py:684 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:671 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:2025 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1637 MSSP: {'NAME': 'd20MUD: Star Wars', 'PLAYERS': '1', 'UPTIME': '1770415186', 'CRAWL DELAY': '-1',
'HOSTNAME': 'mud.d20mud.com', 'PORT': '5500', 'CODEBASE': 'CircleMUD 3.1', 'CONTACT': 'gicker\x1b[0;30m20mud.com', 'CREATED':
'2005', 'LANGUAGE': 'English', 'WEBSITE': 'http://www.d20mud.com'}
DEBUG stream_writer.py:684 begin sub-negotiation SB MXP
DEBUG stream_writer.py:671 sub-negotiation cmd MXP SE completion byte
DEBUG stream_writer.py:2025 [SB + MXP] unsolicited
DEBUG stream_writer.py:1646 MXP: b''
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 74.208.126.44 5500>
INFO fingerprinting.py:746 connection for server fingerprint 2d1d3bcf28abae7b
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug starwars.d20mud.com 5500