StickMUD
Discord: https://discord.gg/BduazjAKxR Bluesky: https://bsky.app/profile/stickmud.com --------------------- Welcome to StickMUD --------------------- Established June 17, 1991 A free, multi-player, medieval fantasy hack-and-slash game played with text only! Roleplay as a Bard, Fighter, Mage, Necromancer, Ninja, Thief, Healer or Priest Train skills in both craft and combat aligned with your guild. 18 player races. Heroes and villains alike are invited! Web: https://www.stickmud.com/ New to the game? Please enter a new character name now! 'who' to see who is logged in, 'visit' for guests, or 'events' Give your character name: Too short a name - must be at least two characters long. Try another name:
Server Info
Codebase: LDMud 3.6.7 (3.6.7)
Family: LPMud
Genre: Fantasy
Gameplay: Hack and Slash
Players online: 1 [1]
Created: 1991
Status: Live
Website: https://www.stickmud.com
Location: Canada
TLS/SSL: Port 7670
Protocol Support
MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.
MSSP: Yes (MSSP)
GMCP: Yes (MSSP)
MSDP: No
MCCP: No
MCCP2: No
MXP: Yes (MSSP)
MSP: Yes (MSSP)
MCP: No
ZMP: No
Telnet Fingerprint
This fingerprint is shared by 2 other servers.
Options offered by server: CHARSET
Options requested from client: NAWS, NEW_ENVIRON, TTYPE
Data source: b3f0ba36bb618fce/f3fc20180236aea3.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "b3f0ba36bb618fce",
"fingerprint-data": {
"offered-options": [
"CHARSET"
],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"EOR",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": [
"NAWS",
"NEW_ENVIRON",
"TTYPE"
]
},
"session_data": {
"banner_after_return": "Too short a name - must be at least two characters long.\r\n\r\nTry another name: ",
"banner_before_return": "\r\n\u001b[33mDiscord:\u001b[0m https://discord.gg/BduazjAKxR\r\n\u001b[33mBluesky:\u001b[0m https://bsky.app/profile/stickmud.com\r\n\r\n \u001b[94m---------------------\u001b[0m\r\n \u001b[93mWelcome to StickMUD\u001b[0m\r\n \u001b[94m---------------------\u001b[0m\r\n\r\n Established June 17, 1991\r\n\r\n A free, multi-player, medieval fantasy \r\n hack-and-slash game played with text only!\r\n\r\n Roleplay as a Bard, Fighter, Mage, Necromancer,\r\n Ninja, Thief, Healer or Priest\r\n\r\n Train skills in both craft and combat aligned with your guild.\r\n 18 player races. Heroes and villains alike are invited!\r\n\r\n \u001b[33mWeb:\u001b[0m https://www.stickmud.com/\r\n\r\n \u001b[93mNew to the game? Please enter a new character name now!\u001b[0m\r\n 'who' to see who is logged in, 'visit' for guests, or 'events'\r\n\r\nGive your character name: ",
"encoding": "ascii",
"mssp": {
"ANSI": "1",
"AREAS": "178",
"CLASSES": "8",
"CODEBASE": "LDMud 3.6.7 (3.6.7)",
"CONTACT": "support@stickmud.com",
"CREATED": "1991",
"DISCORD": "https://discord.gg/BduazjAKxR",
"FAMILY": "LPMud",
"GAMEPLAY": "Hack and Slash",
"GAMESYSTEM": "Custom",
"GENRE": "Fantasy",
"GMCP": "1",
"HELPFILES": "310",
"HIRING BUILDERS": "0",
"HIRING CODERS": "0",
"HOSTNAME": "stickmud.com",
"ICON": "https://www.stickmud.com/wp-content/uploads/2020/12/stick-siteicon.png",
"INTERMUD": "-1",
"IP": "172.105.105.30",
"LANGUAGE": "English",
"LEVELS": "300",
"LOCATION": "Canada",
"MCCP": "0",
"MCMP": "1",
"MCP": "0",
"MINIMUM AGE": "13",
"MOBILES": "-1",
"MSDP": "0",
"MSP": "1",
"MXP": "1",
"NAME": "StickMUD",
"OBJECTS": "64526",
"PAY FOR PERKS": "0",
"PAY TO PLAY": "0",
"PLAYERS": "1",
"PORT": "7680",
"PUEBLO": "0",
"RACES": "20",
"ROOMS": "32968",
"SKILLS": "100",
"SSL": "7670",
"STATUS": "Live",
"SUBGENRE": "Medieval Fantasy",
"TLS": "7670",
"UPTIME": "0",
"UTF-8": "1",
"VT100": "1",
"WEBSITE": "https://www.stickmud.com",
"XTERM 256 COLORS": "1"
},
"option_states": {
"environ_requested": [],
"server_offered": {
"0x5a": false,
"0x5b": false,
"CHARSET": true,
"GMCP": true,
"MSSP": true
},
"server_requested": {
"NAWS": true,
"NEW_ENVIRON": true,
"TTYPE": true
}
},
"timing": {
"probe": 0.5086405277252197,
"total": 1.7065374851226807
}
}
},
"sessions": [
{
"connected": "2026-02-08T07:42:11.693176+00:00",
"host": "stickmud.com",
"ip": "172.105.102.228",
"port": 7680
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=stickmud.com port=7670
INFO client_base.py:174 Connected to <Peer 172.105.102.228 7670>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 172.105.102.228 7670>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug stickmud.com 7680