us.muds.net

Connection Banner:

東 方 故 事 Ⅱ 天 朝 遊 俠 錄 T H E C E L E S T I A L E M P I R E - MudOS v21.7 Eastern Stories 2.1-US- 這是流傳於遠古東方,於蘭皇朝與侮天鬼王爭戰的故事 ... 作為天朝遊俠兒的你,又擔當著怎樣的角色呢? 如果你有任何不懂的地方,請於進入後鍵入 help。 請遵守網路禮儀,有關天朝守則請看 help rules。 請隨時覽閱系統公告板以得知天朝最新資訊。 東方故事Ⅱ已經執行了二十天十二小時四十七分四十三秒。期間共有 2998 人次登入。 目前共有 0 位巫師、22 位玩家在線上﹐以及 3 位使用者嘗試連線中。 您的英文名字﹕ 對不起﹐你的英文名字必須是 3 到 12 個英文字母。 您的英文名字﹕

Server URLs

Server Info

  • Server Location: 🇸🇬 Singapore (GeoIP)

  • Encoding: big5

    This server uses a legacy encoding:

    telnetlib3-client --encoding big5 --force-binary us.muds.net 4000

Telnet Fingerprint

6e6641437dab4b1b

This fingerprint is shared by 20 other servers.

Options requested from client: NAWS, TTYPE

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

Show JSON
{
  "server-probe": {
    "fingerprint": "6e6641437dab4b1b",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u5c0d\u4e0d\u8d77\ufe50\u4f60\u7684\u82f1\u6587\u540d\u5b57\u5fc5\u9808\u662f 3 \u5230 12 \u500b\u82f1\u6587\u5b57\u6bcd\u3002\r\n\u60a8\u7684\u82f1\u6587\u540d\u5b57\ufe55",
      "banner_before_return": "\r\n\r\n                             \u6771 \u65b9 \u6545 \u4e8b \u2161\r\n                           \u5929  \u671d  \u904a  \u4fe0  \u9304\r\n\r\n                 \u001b[1;33m\uff34 H E   \uff23 E L E S T I A L   \uff25 M P I R E\u001b[2;37;0m\r\n                  - MudOS v21.7 Eastern Stories 2.1-US-\r\n\r\n\r\n           \u001b[1;32m\u9019\u662f\u6d41\u50b3\u65bc\u9060\u53e4\u6771\u65b9\uff0c\u65bc\u862d\u7687\u671d\u8207\u4fae\u5929\u9b3c\u738b\u722d\u6230\u7684\u6545\u4e8b ...\r\n\r\n                \u4f5c\u70ba\u5929\u671d\u904a\u4fe0\u5152\u7684\u4f60\uff0c\u53c8\u64d4\u7576\u8457\u600e\u6a23\u7684\u89d2\u8272\u5462\uff1f\u001b[2;37;0m\r\n\r\n\r\n\u5982\u679c\u4f60\u6709\u4efb\u4f55\u4e0d\u61c2\u7684\u5730\u65b9\uff0c\u8acb\u65bc\u9032\u5165\u5f8c\u9375\u5165 \u001b[1;37mhelp\u3002\u001b[2;37;0m\r\n\r\n\u8acb\u9075\u5b88\u7db2\u8def\u79ae\u5100\uff0c\u6709\u95dc\u5929\u671d\u5b88\u5247\u8acb\u770b \u001b[1;37mhelp rules\u001b[2;37;0m\u3002\r\n\r\n\u8acb\u96a8\u6642\u89bd\u95b1\u001b[1;35m\u7cfb\u7d71\u516c\u544a\u677f\u001b[2;37;0m\u4ee5\u5f97\u77e5\u5929\u671d\u6700\u65b0\u8cc7\u8a0a\u3002\r\n\r\n\u6771\u65b9\u6545\u4e8b\u2161\u5df2\u7d93\u57f7\u884c\u4e86\u4e8c\u5341\u5929\u5341\u4e8c\u5c0f\u6642\u56db\u5341\u4e03\u5206\u56db\u5341\u4e09\u79d2\u3002\u671f\u9593\u5171\u6709 2998 \u4eba\u6b21\u767b\u5165\u3002\r\n\u76ee\u524d\u5171\u6709 0 \u4f4d\u5deb\u5e2b\u300122 \u4f4d\u73a9\u5bb6\u5728\u7dda\u4e0a\ufe50\u4ee5\u53ca 3 \u4f4d\u4f7f\u7528\u8005\u5617\u8a66\u9023\u7dda\u4e2d\u3002\r\n\r\n\u60a8\u7684\u82f1\u6587\u540d\u5b57\ufe55",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "big5",
      "option_states": {
        "server_offered": {},
        "server_requested": {
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5046689510345459,
        "total": 5.211395025253296
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-14T17:11:35.086151+00:00",
      "host": "us.muds.net",
      "ip": "139.162.24.232",
      "port": 4000
    },
    {
      "connected": "2026-02-15T02:10:31.689133+00:00",
      "host": "us.muds.net",
      "ip": "139.162.24.232",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug us.muds.net 4000
Show Logfile
DEBUG client.py:998 Fingerprint client: host=us.muds.net port=4000
INFO client_base.py:175 Connected to <Peer 139.162.24.232 4000>
DEBUG client_base.py:494 negotiation complete after 0.00s.
DEBUG stream_writer.py:707 recv IAC DO TTYPE
DEBUG stream_writer.py:1770 handle_do(TTYPE)
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:950 send IAC WILL TTYPE
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3174 local_option[TTYPE] = True
DEBUG stream_writer.py:3174 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:707 recv IAC DO NAWS
DEBUG stream_writer.py:1770 handle_do(NAWS)
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:950 send IAC WILL NAWS
DEBUG stream_writer.py:2346 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3174 local_option[NAWS] = True
DEBUG stream_writer.py:3174 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:699 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:686 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3174 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2241 recv TTYPE SEND: b''
DEBUG stream_writer.py:2254 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:1323 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:3174 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:950 send IAC DO BINARY
DEBUG stream_writer.py:3174 pending_option[DO + SGA] = True
DEBUG stream_writer.py:950 send IAC DO SGA
DEBUG stream_writer.py:3174 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:950 send IAC DO ECHO
DEBUG stream_writer.py:3174 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:950 send IAC DO STATUS
DEBUG stream_writer.py:3174 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:950 send IAC DO CHARSET
DEBUG stream_writer.py:3174 pending_option[DO + EOR] = True
DEBUG stream_writer.py:950 send IAC DO EOR
DEBUG stream_writer.py:3174 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:950 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3174 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:950 send IAC DO GMCP
DEBUG stream_writer.py:3174 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:950 send IAC DO MSDP
DEBUG stream_writer.py:3174 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:950 send IAC DO MSSP
DEBUG stream_writer.py:3174 pending_option[DO + MSP] = True
DEBUG stream_writer.py:950 send IAC DO MSP
DEBUG stream_writer.py:3174 pending_option[DO + MXP] = True
DEBUG stream_writer.py:950 send IAC DO MXP
DEBUG stream_writer.py:3174 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:950 send IAC DO ZMP
DEBUG stream_writer.py:3174 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:950 send IAC DO AARDWOLF
DEBUG stream_writer.py:3174 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:950 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint 6e6641437dab4b1b
INFO client_base.py:106 Connection closed to <Peer 139.162.24.232 4000>