winds.org

winds.org:4000

Telnet Fingerprint

c405afe101fc3e8c…

This fingerprint is shared by 4 other servers.

Options requested from client: NAWS, TTYPE

Data source: c405afe101fc3e8c/fd95bf31edc65406.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "c405afe101fc3e8c",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\u001bc\u001b(U\u001b[1;5]\u001b[2J\u001b[H\r\n       \u001b[0;1;34m.\r\n       :`'-,.                 .\r\n\u001b[30m<<-----\u001b[34m|    |\u001b[30m-----------------\u001b[34m:`'-.\u001b[30m------------------------------------------>>\r\n      \u001b[34m_|    |          /'`^`'\\|   |        _.  _.,  /'`^'`\\    _.,     __\r\n   /'`      |~-,. .,--|   :   |   `,.--;/'`  `'   `|       |/'`_  `\\/'`  '`\\\r\n  |         |    |    |   |___|    ___.'   .   .   |   |   |   |   |   |    |\r\n  \u001b[0;36m|    |    |    |    |____   |   :    |   |   |   |   |   |   |   :   _____|\r\n  |    |    |    |    |   |   |   |  __:   |   |   |   :   |   :___|   |    :\r\n  \u001b[1m:    :    |    :    |   :   :   `-'  |   :   :   |   _   |   |   :   :    |\r\n   `-,.__.,-'`-,._____:`-,.,-' `-,_.,-'|___|---|   |--' `--:___|    `-,._.,-`\r\n\u001b[30m<<---------------------------------------------\u001b[36m|   |\u001b[30m------------------------->>\r\n                                                \u001b[36m`. |\r\n                                                  `:\u001b[0m\r\n\r\nEnter your character's name, New, or Guest: ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "EOR": true
        },
        "server_requested": {
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 3.292311191558838
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T16:27:51.155928+00:00",
      "host": "winds.org",
      "ip": "68.75.195.9",
      "port": 4000
    },
    {
      "connected": "2026-02-08T16:55:59.169215+00:00",
      "host": "winds.org",
      "ip": "68.75.195.9",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=winds.org port=4000
INFO client_base.py:174 Connected to <Peer 68.75.195.9 4000>
DEBUG stream_writer.py:692 recv IAC WILL EOR
DEBUG stream_writer.py:708 WILL EOR unsolicited
DEBUG stream_writer.py:1863 handle_will(EOR)
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 remote_option[EOR] = True
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = False
DEBUG stream_writer.py:692 recv IAC DO NAWS
DEBUG stream_writer.py:1733 handle_do(NAWS)
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:933 send IAC WILL NAWS
DEBUG stream_writer.py:2300 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3030 local_option[NAWS] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:1306 IAC EOR: End of Record (unhandled).
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 68.75.195.9 4000>
INFO fingerprinting.py:746 connection for server fingerprint c405afe101fc3e8c

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug winds.org 4000