winds.orgļ
c(U
.
:`'-,. .
<<-----| |-----------------:`'-.------------------------------------------>>
_| | /'`^`'\| | _. _., /'`^'`\ _., __
/'` |~-,. .,--| : | `,.--;/'` `' `| |/'`_ `\/'` '`\
| | | | |___| ___.' . . | | | | | | |
| | | | |____ | : | | | | | | | : _____|
| | | | | | | | __: | | | : | :___| | :
: : | : | : : `-' | : : | _ | | : : |
`-,.__.,-'`-,._____:`-,.,-' `-,_.,-'|___|---| |--' `--:___| `-,._.,-`
<<---------------------------------------------| |------------------------->>
`. |
`:
Enter your character's name, New, or Guest:Telnet Fingerprintļ
This fingerprint is shared by 4 other servers.
Options requested from client: NAWS, TTYPE
Data source: c405afe101fc3e8c/fd95bf31edc65406.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "c405afe101fc3e8c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\u001bc\u001b(U\u001b[1;5]\u001b[2J\u001b[H\r\n \u001b[0;1;34m.\r\n :`'-,. .\r\n\u001b[30m<<-----\u001b[34m| |\u001b[30m-----------------\u001b[34m:`'-.\u001b[30m------------------------------------------>>\r\n \u001b[34m_| | /'`^`'\\| | _. _., /'`^'`\\ _., __\r\n /'` |~-,. .,--| : | `,.--;/'` `' `| |/'`_ `\\/'` '`\\\r\n | | | | |___| ___.' . . | | | | | | |\r\n \u001b[0;36m| | | | |____ | : | | | | | | | : _____|\r\n | | | | | | | | __: | | | : | :___| | :\r\n \u001b[1m: : | : | : : `-' | : : | _ | | : : |\r\n `-,.__.,-'`-,._____:`-,.,-' `-,_.,-'|___|---| |--' `--:___| `-,._.,-`\r\n\u001b[30m<<---------------------------------------------\u001b[36m| |\u001b[30m------------------------->>\r\n \u001b[36m`. |\r\n `:\u001b[0m\r\n\r\nEnter your character's name, New, or Guest: ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"EOR": true
},
"server_requested": {
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.292311191558838
}
}
},
"sessions": [
{
"connected": "2026-02-08T16:27:51.155928+00:00",
"host": "winds.org",
"ip": "68.75.195.9",
"port": 4000
},
{
"connected": "2026-02-08T16:55:59.169215+00:00",
"host": "winds.org",
"ip": "68.75.195.9",
"port": 4000
}
]
}
Connection Logļ
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=winds.org port=4000
INFO client_base.py:174 Connected to <Peer 68.75.195.9 4000>
DEBUG stream_writer.py:692 recv IAC WILL EOR
DEBUG stream_writer.py:708 WILL EOR unsolicited
DEBUG stream_writer.py:1863 handle_will(EOR)
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 remote_option[EOR] = True
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = False
DEBUG stream_writer.py:692 recv IAC DO NAWS
DEBUG stream_writer.py:1733 handle_do(NAWS)
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:933 send IAC WILL NAWS
DEBUG stream_writer.py:2300 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3030 local_option[NAWS] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:1306 IAC EOR: End of Record (unhandled).
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 68.75.195.9 4000>
INFO fingerprinting.py:746 connection for server fingerprint c405afe101fc3e8c
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug winds.org 4000