NukeFire

tdome.nukefire.org:4000

Server Info

  • Codebase: Circle/Nukefire

  • Genre: Fantasy / Sci-Fi / Post-Apocalyptic

  • Players online: 64 [1]

  • Website: tdome.nukefire.org

  • Location: US

Protocol Support

MUD-specific protocols detected via MSSP flags or Telnet negotiation. See the glossary for definitions.

  • MSSP: Yes (MSSP)

  • GMCP: Negotiated

  • MSDP: Yes (MSSP)

  • MCCP: No

  • MCCP2: No

  • MXP: Yes (MSSP)

  • MSP: No

  • MCP: No

  • ZMP: No

Telnet Fingerprint

e49f2eef99a26459…

This fingerprint is shared by 15 other servers.

Options requested from client: CHARSET, NAWS, TTYPE

Data source: e49f2eef99a26459/8feac9f13effc1c7.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "e49f2eef99a26459",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [
        "CHARSET",
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\r\n\u001b[1;31m _   _       _        _____ _\r\n\u001b[1;31m| \\ | |_   _| | _____|  ___(_)_ __ ___\r\n\u001b[1;31m|  \\| | | | | |/ / _ \\ |_  | | '__/ _ \\\r\n\u001b[1;31m| |\\  | |_| |   <  __/  _| | | | |  __/\r\n\u001b[1;31m|_| \\_|\\__,_|_|\\_\\___|_|   |_|_|  \\___|\r\n\u001b[0;00m\r\n\r\n\u001b[1;31m[WASTELAND BROADCAST]\u001b[0;00m \u001b[1;31mSignal acquired.\u001b[0;00m  \u001b[0;36mPort is hot.\u001b[0;00m  \u001b[0;33mStay sharp.\u001b[0;00m\r\n\r\n       \u001b[1;30mPlay hard. Remort Harder.\u001b[0;00m\r\n\r\n\r\n                         \u001b[1;31mWelcome to:\u001b[0;00m\r\n\r\n                         \u001b[1;31mNukeFire\u001b[0;00m : \u001b[1;31mBeyond THUNDERDOME\u001b[0;00m\r\n\r\n                         \u001b[1;31mWhat's your name, \u001b[1;31mfreejack?\u001b[0;00m\r\n\r\n",
      "encoding": "ascii",
      "mssp": {
        "ADDRESS": "tdome.nukefire.org:4000",
        "ANSI": "1",
        "AREAS": "286",
        "BINDINGS": "Soul-bound upgrades (10 slots)",
        "CLASSES - BASE 1": "Barbarian, Assassin, Slinger, Curist, Samurai, Infiltrator",
        "CLASSES - BASE 2": "Cyborg, Ranger, Vagrant, Pirate, Knight, Fanatic",
        "CLASSES - PRESTIGE 1": "Voidstriker, Kaiju, Heretic, Occultist",
        "CLASSES - PRESTIGE 2": "Wolfman, Headhunter, Ninja, Gypsy, Outlander",
        "CODEBASE": "Circle/Nukefire",
        "CONTACT": "log into game for info",
        "CRAFTING": "Materials + crafters across the Deathlands",
        "CRAWL DELAY": "-1",
        "DATABASE": "SQL persistence for gear + objects",
        "EXPLOSIVES": "Grenades, fireworks, sticky bombs",
        "GENRE": "Fantasy / Sci-Fi / Post-Apocalyptic",
        "GUNS": "Firearms from pistols to pulse rifles",
        "IMPLANTS": "Cybernetic augments (24 slots)",
        "INFO": "Deaths: 407, Kills: 69984, Levels Gained: 7746, Remorts: 155, Longwalks: 1",
        "LANGUAGE": "English",
        "LEVEL CAP": "50 (54 incl. immortals)",
        "LOCATION": "US",
        "LONGWALK": "Class changes and prestige unlocks",
        "LOOTING": "Enemies can loot players too",
        "MOBILES": "9209",
        "MSDP": "1",
        "MXP": "1",
        "NAME": "NukeFire",
        "OBJECTS": "10901",
        "PLAYERNAMES": "Sepia, Ascep, Trauma, Bey, Xrodx, Xorixo, Xblacky, Xanta, Minimoog, CurRage, LeveRage, VoidRage, RoidRage, Cogline, Hasek, Zeke, Lucas, Ethan, Lilah, Juki, Doggo, OH, Sus, Slug, Munk, Nact, Frau, Morg, Hadrian, Jahova, Chains, Tarotica, Voidlust, Maverick, Stedman, Moylen, Judge, Denton, Izlude, Shade, Milk, Waa, Snow, Walter, Teejay, Lhel, Jags, Jugs, Jogs, Jigs, Opie, Noth, Thog, Obed, Amon, Rambo, Stitch, Gator, Wind, Motoko, Rei, Xerxes",
        "PLAYERS": "64",
        "QUESTS": "World-wide quests and seasonal events",
        "ROOMS": "28981",
        "TATTOOS": "Mystic tattoos (24 slots)",
        "TINTIN++": "tintin.nukefire.org",
        "UPTIME": "408048",
        "UTF-8": "1",
        "WEBSITE": "tdome.nukefire.org",
        "XTERM 256 COLORS": "1"
      },
      "option_states": {
        "server_offered": {
          "0x5a": false,
          "0x5b": false,
          "GMCP": true,
          "MSDP": true,
          "MSSP": true
        },
        "server_requested": {
          "0x5b": false,
          "0xc8": false,
          "CHARSET": true,
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 2.568127393722534
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T17:00:17.985719+00:00",
      "host": "tdome.nukefire.org",
      "ip": "76.17.135.123",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:773 Fingerprint client: host=tdome.nukefire.org port=4000
INFO client_base.py:174 Connected to <Peer 76.17.135.123 4000>
DEBUG stream_writer.py:655 recv IAC DO TTYPE
DEBUG stream_writer.py:1668 handle_do(TTYPE)
DEBUG stream_writer.py:2883 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:896 send IAC WILL TTYPE
DEBUG stream_writer.py:2883 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:2883 local_option[TTYPE] = True
DEBUG stream_writer.py:2883 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:655 recv IAC WILL GMCP
DEBUG stream_writer.py:671 WILL GMCP unsolicited
DEBUG stream_writer.py:1793 handle_will(GMCP)
DEBUG stream_writer.py:2883 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:896 send IAC DO GMCP
DEBUG stream_writer.py:2883 remote_option[GMCP] = True
DEBUG stream_writer.py:2883 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:647 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:634 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:2883 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2105 recv TTYPE SEND: b''
DEBUG stream_writer.py:2116 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:655 recv IAC DO NAWS
DEBUG stream_writer.py:1668 handle_do(NAWS)
DEBUG stream_writer.py:2883 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:896 send IAC WILL NAWS
DEBUG stream_writer.py:2208 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:2883 local_option[NAWS] = True
DEBUG stream_writer.py:2883 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:655 recv IAC DO CHARSET
DEBUG stream_writer.py:1668 handle_do(CHARSET)
DEBUG stream_writer.py:2883 pending_option[WILL + CHARSET] = True
DEBUG stream_writer.py:896 send IAC WILL CHARSET
DEBUG stream_writer.py:2883 local_option[CHARSET] = True
DEBUG stream_writer.py:2883 pending_option[WILL + CHARSET] = False
DEBUG stream_writer.py:655 recv IAC WILL MSDP
DEBUG stream_writer.py:671 WILL MSDP unsolicited
DEBUG stream_writer.py:1793 handle_will(MSDP)
DEBUG stream_writer.py:2883 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:896 send IAC DO MSDP
DEBUG stream_writer.py:2883 remote_option[MSDP] = True
DEBUG stream_writer.py:2883 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:655 recv IAC WILL MSSP
DEBUG stream_writer.py:671 WILL MSSP unsolicited
DEBUG stream_writer.py:1793 handle_will(MSSP)
DEBUG stream_writer.py:2883 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:896 send IAC DO MSSP
DEBUG stream_writer.py:2883 remote_option[MSSP] = True
DEBUG stream_writer.py:2883 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:655 recv IAC DO ATCP
DEBUG stream_writer.py:1668 handle_do(ATCP)
DEBUG stream_writer.py:1741 DO ATCP not supported.
DEBUG stream_writer.py:2883 local_option[ATCP] = False
DEBUG stream_writer.py:896 send IAC WONT ATCP
DEBUG stream_writer.py:655 recv IAC WILL MSP
DEBUG stream_writer.py:671 WILL MSP unsolicited
DEBUG stream_writer.py:1793 handle_will(MSP)
DEBUG stream_writer.py:2883 remote_option[MSP] = False
DEBUG stream_writer.py:896 send IAC DONT MSP
WARNING stream_writer.py:1882 Unhandled: WILL MSP.
DEBUG stream_writer.py:655 recv IAC DO MXP
DEBUG stream_writer.py:1668 handle_do(MXP)
DEBUG stream_writer.py:1741 DO MXP not supported.
DEBUG stream_writer.py:2883 local_option[MXP] = False
DEBUG stream_writer.py:896 send IAC WONT MXP
DEBUG stream_writer.py:647 begin sub-negotiation SB GMCP
DEBUG stream_writer.py:634 sub-negotiation cmd GMCP SE completion byte
DEBUG stream_writer.py:1938 [SB + GMCP] unsolicited
DEBUG stream_writer.py:1581 GMCP: Core.Hello {'name': 'NukeFire', 'version': 'Nukefire 2026'}
DEBUG stream_writer.py:647 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:634 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:1938 [SB + TTYPE] unsolicited
DEBUG stream_writer.py:2105 recv TTYPE SEND: b''
DEBUG stream_writer.py:2116 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:647 begin sub-negotiation SB CHARSET
DEBUG stream_writer.py:634 sub-negotiation cmd CHARSET SE completion byte
DEBUG stream_writer.py:1938 [SB + CHARSET] unsolicited
DEBUG client.py:266 encoding negotiated: UTF-8
DEBUG stream_writer.py:2013 send IAC SB CHARSET ACCEPTED UTF-8 IAC SE
DEBUG stream_writer.py:647 begin sub-negotiation SB MSDP
DEBUG stream_writer.py:634 sub-negotiation cmd MSDP SE completion byte
DEBUG stream_writer.py:1938 [SB + MSDP] unsolicited
DEBUG stream_writer.py:1591 MSDP: {'SERVER_ID': 'NukeFire'}
DEBUG stream_writer.py:647 begin sub-negotiation SB MSSP
DEBUG stream_writer.py:634 sub-negotiation cmd MSSP SE completion byte
DEBUG stream_writer.py:1938 [SB + MSSP] unsolicited
DEBUG stream_writer.py:1595 MSSP: {'NAME': 'NukeFire', 'PLAYERS': '67', 'UPTIME': '418386', 'CRAWL
    DELAY': '-1', 'CODEBASE': 'Circle/Nukefire', 'CONTACT': 'log into game for info', 'LANGUAGE':
    'English', 'LOCATION': 'US', 'WEBSITE': 'tdome.nukefire.org', 'ANSI': '1', 'UTF-8': '1', 'MSDP':
    '1', 'MXP': '1', 'XTERM 256 COLORS': '1', 'INFO': 'Deaths: 475, Kills: 78605, Levels Gained:
    8668, Remorts: 170, Longwalks: 1', 'ADDRESS': 'tdome.nukefire.org:4000', 'GENRE': 'Fantasy /
    Sci-Fi / Post-Apocalyptic', 'LEVEL CAP': '50 (54 incl. immortals)', 'AREAS': '286', 'ROOMS':
    '28981', 'MOBILES': '9209', 'OBJECTS': '10901', 'PLAYERNAMES': 'Denton, Minimoog, Gyro, Minime,
    Tychon, Stedman, Mo, Merbie, Anjar, Raigu, Eyediya, Sepia, Ascep, Trauma, Bey, Xrodx, Xorixo,
    Xblacky, Xanta, CurRage, LeveRage, VoidRage, RoidRage, Zeke, Lucas, Ethan, Lilah, Juki, Doggo,
    OH, Sus, Slug, Munk, Nact, Frau, Morg, Hadrian, Jahova, Chains, Tarotica, Voidlust, Maverick,
    Moylen, Shade, Milk, Waa, Snow, Walter, Teejay, Lhel, Jags, Jugs, Jogs, Jigs, Opie, Noth, Thog,
    Obed, Amon, Rambo, Stitch, Gator, Wind, Motoko, Rei, Xerxes', 'IMPLANTS': 'Cybernetic augments
    (24 slots)', 'TATTOOS': 'Mystic tattoos (24 slots)', 'BINDINGS': 'Soul-bound upgrades (10
    slots)', 'GUNS': 'Firearms from pistols to pulse rifles', 'EXPLOSIVES': 'Grenades, fireworks,
    sticky bombs', 'LOOTING': 'Enemies can loot players too', 'DATABASE': 'SQL persistence for gear
    + objects', 'CRAFTING': 'Materials + crafters across the Deathlands', 'QUESTS': 'World-wide
    quests and seasonal events', 'LONGWALK': 'Class changes and prestige unlocks', 'CLASSES - BASE
    1': 'Barbarian, Assassin, Slinger, Curist, Samurai, Infiltrator', 'CLASSES - BASE 2': 'Cyborg,
    Ranger, Vagrant, Pirate, Knight, Fanatic', 'CLASSES - PRESTIGE 1': 'Voidstriker, Kaiju, Heretic,
    Occultist', 'CLASSES - PRESTIGE 2': 'Wolfman, Headhunter, Ninja, Gypsy, Outlander', 'TINTIN++':
    'tintin.nukefire.org'}
DEBUG stream_writer.py:655 recv IAC WILL MXP
DEBUG stream_writer.py:671 WILL MXP unsolicited
DEBUG stream_writer.py:1793 handle_will(MXP)
DEBUG stream_writer.py:2883 remote_option[MXP] = False
DEBUG stream_writer.py:896 send IAC DONT MXP
WARNING stream_writer.py:1882 Unhandled: WILL MXP.
DEBUG client_base.py:460 negotiation complete after 2.01s.
DEBUG stream_writer.py:1250 IAC GA: Go-Ahead (unhandled).
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 76.17.135.123 4000>
INFO fingerprinting.py:736 connection for server fingerprint e49f2eef99a26459

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug tdome.nukefire.org 4000