yay.tim.org

yay.tim.org:5440

Telnet Fingerprint

8d9ec9f191ea1be9…

This fingerprint is shared by 110 other servers.

Data source: 8d9ec9f191ea1be9/b49c6b6155e169a7.json

The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.

{
  "server-probe": {
    "fingerprint": "8d9ec9f191ea1be9",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AUTHENTICATION",
        "BINARY",
        "BM",
        "CHARSET",
        "COM_PORT",
        "DET",
        "ECHO",
        "ENCRYPT",
        "EOR",
        "FORWARD_X",
        "KERMIT",
        "NAMS",
        "NAOCRD",
        "NAOFFD",
        "NAOHTD",
        "NAOHTS",
        "NAOL",
        "NAOLFD",
        "NAOP",
        "NAOVTD",
        "NAOVTS",
        "PRAGMA_HEARTBEAT",
        "PRAGMA_LOGON",
        "RCP",
        "RCTE",
        "RSP",
        "SEND_URL",
        "SGA",
        "SSPI_LOGON",
        "STATUS",
        "SUPDUP",
        "SUPDUPOUTPUT",
        "SUPPRESS_LOCAL_ECHO",
        "TLS",
        "TN3270E",
        "TTYLOC",
        "VT3270REGIME",
        "X3PAD",
        "XAUTH"
      ],
      "requested-options": []
    },
    "session_data": {
      "banner_after_return": "o create a new character.\nconnect <name> <password>          if you already have a character.\nWHO                                to see players currently connected.\nQUIT                               to return to the dreariness of life.\n\nMore upgrades ... and they broke the 32-bit libs...\n\n",
      "banner_before_return": "\nWelcome to TinyTIM, the world's oldest MUSH!\n                                           xxxxxxx\n    XXXXX    XXX                      XXXXXXXXXXXXXXX\n XXXXXXXXXX   XXX                     XXXXXXXXXXXXXXXX  \nXXX XXX  XXX      XXX     XXXXX  XXX XXXX   XXXXX  XXXXX\n X   XXX  XX XX XXXXXXXX  XXXX  XXXX  XXX    XXXXX               X\n     XXX     XX XXX  XXXX  XX    XXX         XXXX  XXXXXXXXXX   XX     XX\n    XXXX   XXXX  XX   XXX  XXXX  XX          XXXX     XXX      XXXX   XXXX\n   XXXXXX  XXX  XXX   XXXX  XXXXXXX         XXXX     XXXX     XXXXXXXXXXXXX\n    XXXX   XX  XXXXX  XXXXX   XXXXX         XXX     XXXX     XXXX XXXXXX XXXX\n                              XXX         XXXXX    XXXXX    XXXXX  XXXX   XXX\nIt's not just a game...    XXXXXX        XXXXXX     XXXXX    XXXXX XXXXX XXXXX\n                         XXXXXXXXXX       XXXX    XXXXXXXXX  XXX    XXXX  XXX\n                          XXXXXXX        \n                                        ...it's a really, really BIG game!\n\ncreate <name> <password>           t",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "timing": {
        "probe": 0.5066282749176025,
        "total": 1.0072038173675537
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-08T05:51:34.210720+00:00",
      "host": "yay.tim.org",
      "ip": "204.87.226.42",
      "port": 5440
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:770 Fingerprint client: host=yay.tim.org port=5440
INFO client_base.py:174 Connected to <Peer 204.87.226.42 5440>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3030 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:933 send IAC DO BINARY
DEBUG stream_writer.py:3030 pending_option[DO + SGA] = True
DEBUG stream_writer.py:933 send IAC DO SGA
DEBUG stream_writer.py:3030 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:933 send IAC DO ECHO
DEBUG stream_writer.py:3030 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:933 send IAC DO STATUS
DEBUG stream_writer.py:3030 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:933 send IAC DO CHARSET
DEBUG stream_writer.py:3030 pending_option[DO + EOR] = True
DEBUG stream_writer.py:933 send IAC DO EOR
DEBUG stream_writer.py:3030 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:933 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3030 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:933 send IAC DO GMCP
DEBUG stream_writer.py:3030 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:933 send IAC DO MSDP
DEBUG stream_writer.py:3030 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:933 send IAC DO MSSP
DEBUG stream_writer.py:3030 pending_option[DO + MSP] = True
DEBUG stream_writer.py:933 send IAC DO MSP
DEBUG stream_writer.py:3030 pending_option[DO + MXP] = True
DEBUG stream_writer.py:933 send IAC DO MXP
DEBUG stream_writer.py:3030 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:933 send IAC DO ZMP
DEBUG stream_writer.py:3030 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:933 send IAC DO AARDWOLF
DEBUG stream_writer.py:3030 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:933 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 204.87.226.42 5440>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug yay.tim.org 5440