valhalla.comο
Connection Banner:
Server URLsο
- Telnet: telnet://valhalla.com:4242
Server Infoο
Server Location: πΊπΈ United States (GeoIP)
Telnet Fingerprintο
This fingerprint is shared by 291 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "e89ffa4fe5c32389",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "Illegal name, please try another.\n\rName: ",
"banner_before_return": "Requesting an ID from Valhalla.\n\r\n\r\n\r \u001b[1;36m\u001b[40m\u001b[40mT\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;36m\u001b[40m\u001b[40m\u001b[40mhe Ultimate Online Text Adventure - \u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;36m\u001b[40m\u001b[40mV\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;36m\u001b[40m\u001b[40m\u001b[40manquish your foes, \u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;36m\u001b[40m\u001b[40mS\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;36m\u001b[40m\u001b[40m\u001b[40mave\n\r the World, and \u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;36m\u001b[40m\u001b[40mL\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;36m\u001b[40m\u001b[40m\u001b[40mive the Legend of the \u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;36m\u001b[40m\u001b[40mV\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;36m\u001b[40m\u001b[40m\u001b[40maliant \u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;36m\u001b[40m\u001b[40mH\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;36m\u001b[40m\u001b[40m\u001b[40mero.\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\n\r \u001b[1;31m\u001b[40m\u001b[40m-\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m Thousands of Locations, Monsters, and Artifacts.\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\n\r \u001b[1;33m\u001b[40m\u001b[40m-\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m Hundreds of Quests to play online, varying through a wide\n\r Spectrum of Type, Difficulty and Duration.\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\n\r \u001b[1;32m\u001b[40m\u001b[40m-\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;37m\u001b[40m\u001b[40m Our Automated Newbie Guide is back!\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\n\r Test him out and see if he still can be of service. You can \n\r request his help any time before level 6 just type: \n\r '\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[1;32m\u001b[40m\u001b[40msay help me newbie guide\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m'\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\n\r\n\r\u001b[1;31m\u001b[40m\u001b[40m-\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\u001b[0;37m\u001b[40m\u001b[40m\u001b[40mWhen creating a new name please pick a fantasy name. Inappropriate names will\n\rbe deleted.\u001b[0;37m\u001b[40m\u001b[40m\u001b[40m\n\r\n\rBy what name do they call you? ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5041623115539551,
"total": 11.33488154411316
}
}
},
"sessions": [
{
"connected": "2026-03-07T03:56:01.683111+00:00",
"host": "valhalla.com",
"ip": "3.208.207.117",
"port": 4242
}
]
}
Connection Logο
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug valhalla.com 4242
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=valhalla.com port=4242
INFO client_base.py:186 Connected to <Peer 3.208.207.117 4242>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:1400 IAC GA: Go-Ahead (unhandled).
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:118 Connection closed to <Peer 3.208.207.117 4242>