147.78.240.155:513 ================== **Connection Banner:** .. image:: /_static/banners/banner_6bcab426148e.png :alt: Synchronet BBS for Linux Version 3.20 RLogin connection from: 143.198.61.53 Resolving hostname... _ ∩╗┐_ Synchronet BBS for Linux Version 3.20 Copyright 2022 Rob Swindell ┌╦═══╦┐ ┌╦╦┐ ┌╦═╗ ╦┐ ┌╦═══╦┐ ┌╦╦┐ ┌╦═══╦┐ ┌╦═══╦┐ ┌╦═╗ ╦┐ ┌╦═══╦┐ ┌═╤╦╤═┐ └╩═══╦┐ └╩╤╦╤╩┘ │║ ║ ║│ │║├╬═══╬┤ │╠══╦╩┘ │║║│ │║ ║ ║│ ├╬══│║│ └╩═══╩┘└╩┘└╩ ╚═╩┘ └╩═══╩┘ └╩╩┘ └╩ ╚═┘ └╩═══╩┘ └╩ ╚═╩┘ └╩═══╩┘╧╩╧ CLIENT CONN: RLogin ADDR: modem.xyz [143.198.61.53] TERM: 80x24 CP437 / ANSI SERVER NAME: Bumgun Club BBS ADDR: bumgun.club NODE: 1 (of 4) - Debian GNU/Linux 11 (bullseye) x86_64 TIME: Wed Apr 08 2026 12:59:55 WEST ADMN: drusalan If you are a new user to the system, type "New" now. Otherwise, enter your user name or number now. NN: Enter User Name or 'New' or 'Guest' Login: :class: ansi-banner :width: 631px :loading: lazy Server URLs ----------- .. raw:: html **Server Location**: 🇳🇱 Netherlands (GeoIP) BBS Software ------------ **Detected**: Synchronet Encoding -------- - **Effective encoding**: cp437 - **Override**: cp437 (from bbslist.txt) - **Scanner detected**: ascii Telnet Fingerprint ------------------ :ref:`fcc77c9fc888e2f2 ` *This fingerprint is shared by 33 other servers.* **Options offered by server**: ``CHARSET`` **Options requested from client**: ``CHARSET`` The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "fcc77c9fc888e2f2", "fingerprint-data": { "offered-options": [ "CHARSET" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "COM_PORT", "ECHO", "EOR", "GMCP", "MCCP2", "MCCP3", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [ "CHARSET" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\r\nNN: \r\u001b[0m\u001b[1m\u001b[36mEnter \u001b[37mUser Name\u001b[36m or '\u001b[33mNew\u001b[36m' or '\u001b[33mGuest\u001b[36m'\r\nLogin: \u001b[37m", "banner_before_return": "\u0000\r\nSynchronet BBS for Linux Version 3.20\r\nRLogin connection from: 143.198.61.53\r\nResolving hostname...\r\n\r\n\u001b[s\u001b[0c\u001b[255B\u001b[255C\b_\u001b[6n\u001b[u\u001b[!_\r\udcef\udcbb\udcbf\u001b[6n\u001b[0m_\u001b[2J\u001b[H\f\r\r Synchronet BBS for Linux Version 3.20 Copyright 2022 Rob Swindell\r\n\r\n\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\u001b[3C\u001b[1m\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udcbb \udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\u001b[3C\u001b[1m\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udcbb \udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccd\udcd1\u001b[1m\udccb\udcd1\udccd\udcbf\r\n\u001b[0m\u001b[36m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\u001b[36m\udcc0\udcca\u001b[1m\udcd1\udccb\udcd1\udcca\udcd9 \u001b[0m\u001b[36m\udcb3\udcba \u001b[1m\udcba \udcba\udcb3 \u001b[0m\u001b[36m\udcb3\udcba\u001b[0m\u001b[6C\u001b[36m\udcc3\udcce\udccd\u001b[1m\udccd\udccd\udcce\udcb4 \u001b[0m\u001b[36m\udcb3\udccc\udccd\u001b[1m\udccd\udccb\udcca\udcd9 \u001b[0m\u001b[36m\udcb3\udcba\u001b[3C\u001b[1m\udcba\udcb3 \u001b[0m\u001b[36m\udcb3\udcba \u001b[1m\udcba \udcba\udcb3 \u001b[0m\u001b[36m\udcc3\udcce\udccd\u001b[1m\udccd\u001b[0m\u001b[6C\u001b[36m\udcb3\u001b[1m\udcba\udcb3\r\n\u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udcc0\u001b[1m\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\u001b[3C\u001b[1m\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udccf\u001b[1m\udcca\udccf\r\n\u001b[0m\r\n\u001b[1mCLIENT \u001b[0m\u001b[36mCONN: \u001b[1mRLogin\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mADDR: \u001b[1mmodem.xyz [143.198.61.53]\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mTERM: \u001b[1m80x24 CP437 / ANSI\r\n\u001b[0m\u001b[1mSERVER \u001b[0m\u001b[36mNAME: \u001b[1m\u001b[33mBumgun Club BBS\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mADDR: \u001b[1mbumgun.club\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mNODE: \u001b[1m1 \u001b[0m\u001b[36m(of \u001b[1m4\u001b[0m\u001b[36m) - \u001b[1mDebian GNU/Linux 11 (bullseye) x86_64\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mTIME: \u001b[1mWed Apr 08 2026 12:59:55 WEST\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mADMN: \u001b[1mdrusalan\r\n\r\n\u001b[34mIf you are a new user to the system, type \u001b[36m\"New\"\u001b[34m now.\r\nOtherwise, enter your user name or number now.\r\n\u001b[0m\r\nNN: \r\u001b[1m\u001b[36mEnter \u001b[37mUser Name\u001b[36m or '\u001b[33mNew\u001b[36m' or '\u001b[33mGuest\u001b[36m'\r\nLogin: \u001b[37m", "dsr_replies": 2, "dsr_requests": 2, "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5160291194915771, "total": 11.421549558639526 } } }, "sessions": [ { "connected": "2026-04-05T18:55:00.095339+00:00", "host": "147.78.240.155", "ip": "147.78.240.155", "port": 513 }, { "connected": "2026-04-08T17:00:06.381138+00:00", "host": "147.78.240.155", "ip": "147.78.240.155", "port": 513 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 147.78.240.155 513 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=147.78.240.155 port=513 ERROR client.py:1296 147.78.240.155:513: [Errno 111] Connect call failed ('147.78.240.155', 513) .. raw:: html