winds.org
c(U HTTP/1.1 200 OK Date: Mon, 07 May 2007 06:27:09 GMT Server: TinyMARE Content-Length: 131 Content-Type: text/html; charset=iso-8859-1 <HTML><HEAD><TITLE>This is NOT a proxy!</TITLE></HEAD><BODY><H1><font color="#FF0000">This is NOT a proxy!</font></H1><BODY></HTML> __ __ __ __ ____ / | | | / \ / \ \ / |\ /| /\ | \ | \__ | | | |____ |____ \ / | \/ | / \ |_/ |__ \ | | | | | | | | | | |----| | \ | __/ |___ \__/ \__/ \__/ | | | | | | \ |___ _____ | ___ | |/ \| Prepare to die |(. .)| Nerd Boy! | . | \ | _ | \ [00; 35m \___/ ___ ___/\ /\___ /. \____ / / \/ \ / \ | / |\ |/ \/ \ /\ /| \ \__/ | | /| \ / \ |\ | / _______/
Telnet Fingerprint
This fingerprint is shared by 4 other servers.
Options offered by server: EOR
Options requested from client: NAWS, TTYPE
Data source: 613a2d72c29fe2ff/b978088e40f27944.json
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
{
"server-probe": {
"fingerprint": "613a2d72c29fe2ff",
"fingerprint-data": {
"offered-options": [
"EOR"
],
"probed-protocol": "server",
"refused-options": [
"AUTHENTICATION",
"BINARY",
"BM",
"CHARSET",
"COM_PORT",
"DET",
"ECHO",
"ENCRYPT",
"FORWARD_X",
"KERMIT",
"NAMS",
"NAOCRD",
"NAOFFD",
"NAOHTD",
"NAOHTS",
"NAOL",
"NAOLFD",
"NAOP",
"NAOVTD",
"NAOVTS",
"PRAGMA_HEARTBEAT",
"PRAGMA_LOGON",
"RCP",
"RCTE",
"RSP",
"SEND_URL",
"SGA",
"SSPI_LOGON",
"STATUS",
"SUPDUP",
"SUPDUPOUTPUT",
"SUPPRESS_LOCAL_ECHO",
"TLS",
"TN3270E",
"TTYLOC",
"VT3270REGIME",
"X3PAD",
"XAUTH"
],
"requested-options": [
"NAWS",
"TTYPE"
]
},
"session_data": {
"banner_after_return": "35m \\___/ \u001b[01;37m___\r\n \u001b[00;37m ___/\u001b[00;36m\\ /\u001b[00;37m\\___ \u001b[01;37m/. \\\u001b[01;30m____\r\n \u001b[00;37m /\u001b[00;36m / \\/ \\ / \u001b[00;37m\\ \u001b[01;37m| \u001b[01;30m/ |\u001b[01;37m\\\r\n \u001b[00;37m |\u001b[00;36m/ \\/ \\ /\\ /\u001b[00;37m| \u001b[01;37m\\ \u001b[01;30m\\__/ \u001b[01;37m|\r\n \u001b[00;37m |\u001b[00;36m /\u001b[00;37m|\u001b[00;36m \\ / \\ \u001b[00;37m|\u001b[00;36m\\ \u001b[00;37m| \u001b[01;37m/ _______/\u001b[00;00m\r\n",
"banner_before_return": "\u001bc\u001b(U\u001b[1;5]\u001b[2J\u001b[H\r\nHTTP/1.1 200 OK\r\nDate: Mon, 07 May 2007 06:27:09 GMT\r\nServer: TinyMARE\r\nContent-Length: 131\r\nContent-Type: text/html; charset=iso-8859-1\r\n\r\n<HTML><HEAD><TITLE>This is NOT a proxy!</TITLE></HEAD><BODY><H1><font\r\ncolor=\"#FF0000\">This is NOT a proxy!</font></H1><BODY></HTML>\r\n\r\n\u001b[2J\r\n\u001b[01;34m __ __ __ __ ____\r\n\u001b[01;36m/ | | | / \\ / \\ \\ / |\\ /| /\\ | \\ |\r\n\u001b[01;37m\\__ | | | |____ |____ \\ / | \\/ | / \\ |_/ |__\r\n\u001b[01;36m \\ | | | | | | | | | | |----| | \\ |\r\n\u001b[01;34m __/ |___ \\__/ \\__/ \\__/ | | | | | | \\ |___\r\n \u001b[01;33m _____\r\n \u001b[01;33m | ___ |\r\n \u001b[01;33m |/ \\| \u001b[00;37mPrepare to die\r\n \u001b[00;35m |\u001b[01;37m(. .)\u001b[00;35m| \u001b[00;37mNerd Boy!\r\n \u001b[00;35m |\u001b[01;37m . \u001b[00;35m| \u001b[00;37m\\\r\n \u001b[00;35m |\u001b[01;37m _ \u001b[00;35m| \u001b[00;37m\\\r\n \u001b[00;",
"encoding": "ascii",
"option_states": {
"server_offered": {
"EOR": true
},
"server_requested": {
"NAWS": true,
"TTYPE": true
}
},
"timing": {
"probe": 0.5075979232788086,
"total": 1.3061952590942383
}
}
},
"sessions": [
{
"connected": "2026-02-08T07:27:55.778118+00:00",
"host": "winds.org",
"ip": "68.75.195.9",
"port": 8000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:770 Fingerprint client: host=winds.org port=4000
INFO client_base.py:174 Connected to <Peer 68.75.195.9 4000>
DEBUG stream_writer.py:692 recv IAC WILL EOR
DEBUG stream_writer.py:708 WILL EOR unsolicited
DEBUG stream_writer.py:1863 handle_will(EOR)
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 remote_option[EOR] = True
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = False
DEBUG stream_writer.py:692 recv IAC DO NAWS
DEBUG stream_writer.py:1733 handle_do(NAWS)
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:933 send IAC WILL NAWS
DEBUG stream_writer.py:2300 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3030 local_option[NAWS] = True
DEBUG stream_writer.py:3030 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:692 recv IAC DO TTYPE
DEBUG stream_writer.py:1733 handle_do(TTYPE)
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:933 send IAC WILL TTYPE
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3030 local_option[TTYPE] = True
DEBUG stream_writer.py:3030 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:684 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:671 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3030 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2197 recv TTYPE SEND: b''
DEBUG stream_writer.py:2208 send IAC SB TTYPE IS b'VT100' IAC SE
DEBUG stream_writer.py:1306 IAC EOR: End of Record (unhandled).
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 68.75.195.9 4000>
INFO fingerprinting.py:746 connection for server fingerprint c405afe101fc3e8c
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug winds.org 8000