147.78.240.155:513
==================
**Connection Banner:**
.. image:: /_static/banners/banner_6bcab426148e.png
:alt: Synchronet BBS for Linux Version 3.20 RLogin connection from: 143.198.61.53 Resolving hostname... _ ∩╗┐_ Synchronet BBS for Linux Version 3.20 Copyright 2022 Rob Swindell ┌╦═══╦┐ ┌╦╦┐ ┌╦═╗ ╦┐ ┌╦═══╦┐ ┌╦╦┐ ┌╦═══╦┐ ┌╦═══╦┐ ┌╦═╗ ╦┐ ┌╦═══╦┐ ┌═╤╦╤═┐ └╩═══╦┐ └╩╤╦╤╩┘ │║ ║ ║│ │║├╬═══╬┤ │╠══╦╩┘ │║║│ │║ ║ ║│ ├╬══│║│ └╩═══╩┘└╩┘└╩ ╚═╩┘ └╩═══╩┘ └╩╩┘ └╩ ╚═┘ └╩═══╩┘ └╩ ╚═╩┘ └╩═══╩┘╧╩╧ CLIENT CONN: RLogin ADDR: modem.xyz [143.198.61.53] TERM: 80x24 CP437 / ANSI SERVER NAME: Bumgun Club BBS ADDR: bumgun.club NODE: 1 (of 4) - Debian GNU/Linux 11 (bullseye) x86_64 TIME: Wed Apr 08 2026 12:59:55 WEST ADMN: drusalan If you are a new user to the system, type "New" now. Otherwise, enter your user name or number now. NN: Enter User Name or 'New' or 'Guest' Login:
:class: ansi-banner
:width: 631px
:loading: lazy
Server URLs
-----------
.. raw:: html
**Server Location**: 🇳🇱 Netherlands (GeoIP)
BBS Software
------------
**Detected**: Synchronet
Encoding
--------
- **Effective encoding**: cp437
- **Override**: cp437 (from bbslist.txt)
- **Scanner detected**: ascii
Telnet Fingerprint
------------------
:ref:`fcc77c9fc888e2f2 `
*This fingerprint is shared by 33 other servers.*
**Options offered by server**: ``CHARSET``
**Options requested from client**: ``CHARSET``
The complete JSON record collected during the scan,
including Telnet negotiation results and
banner data.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "fcc77c9fc888e2f2",
"fingerprint-data": {
"offered-options": [
"CHARSET"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [
"CHARSET"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\nNN: \r\u001b[0m\u001b[1m\u001b[36mEnter \u001b[37mUser Name\u001b[36m or '\u001b[33mNew\u001b[36m' or '\u001b[33mGuest\u001b[36m'\r\nLogin: \u001b[37m",
"banner_before_return": "\u0000\r\nSynchronet BBS for Linux Version 3.20\r\nRLogin connection from: 143.198.61.53\r\nResolving hostname...\r\n\r\n\u001b[s\u001b[0c\u001b[255B\u001b[255C\b_\u001b[6n\u001b[u\u001b[!_\r\udcef\udcbb\udcbf\u001b[6n\u001b[0m_\u001b[2J\u001b[H\f\r\r Synchronet BBS for Linux Version 3.20 Copyright 2022 Rob Swindell\r\n\r\n\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\u001b[3C\u001b[1m\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udcbb \udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\u001b[3C\u001b[1m\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udcbb \udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccd\udcd1\u001b[1m\udccb\udcd1\udccd\udcbf\r\n\u001b[0m\u001b[36m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\u001b[36m\udcc0\udcca\u001b[1m\udcd1\udccb\udcd1\udcca\udcd9 \u001b[0m\u001b[36m\udcb3\udcba \u001b[1m\udcba \udcba\udcb3 \u001b[0m\u001b[36m\udcb3\udcba\u001b[0m\u001b[6C\u001b[36m\udcc3\udcce\udccd\u001b[1m\udccd\udccd\udcce\udcb4 \u001b[0m\u001b[36m\udcb3\udccc\udccd\u001b[1m\udccd\udccb\udcca\udcd9 \u001b[0m\u001b[36m\udcb3\udcba\u001b[3C\u001b[1m\udcba\udcb3 \u001b[0m\u001b[36m\udcb3\udcba \u001b[1m\udcba \udcba\udcb3 \u001b[0m\u001b[36m\udcc3\udcce\udccd\u001b[1m\udccd\u001b[0m\u001b[6C\u001b[36m\udcb3\u001b[1m\udcba\udcb3\r\n\u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udcc0\u001b[1m\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\u001b[3C\u001b[1m\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udccf\u001b[1m\udcca\udccf\r\n\u001b[0m\r\n\u001b[1mCLIENT \u001b[0m\u001b[36mCONN: \u001b[1mRLogin\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mADDR: \u001b[1mmodem.xyz [143.198.61.53]\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mTERM: \u001b[1m80x24 CP437 / ANSI\r\n\u001b[0m\u001b[1mSERVER \u001b[0m\u001b[36mNAME: \u001b[1m\u001b[33mBumgun Club BBS\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mADDR: \u001b[1mbumgun.club\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mNODE: \u001b[1m1 \u001b[0m\u001b[36m(of \u001b[1m4\u001b[0m\u001b[36m) - \u001b[1mDebian GNU/Linux 11 (bullseye) x86_64\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mTIME: \u001b[1mWed Apr 08 2026 12:59:55 WEST\r\n\u001b[0m\u001b[1m \u001b[0m\u001b[36mADMN: \u001b[1mdrusalan\r\n\r\n\u001b[34mIf you are a new user to the system, type \u001b[36m\"New\"\u001b[34m now.\r\nOtherwise, enter your user name or number now.\r\n\u001b[0m\r\nNN: \r\u001b[1m\u001b[36mEnter \u001b[37mUser Name\u001b[36m or '\u001b[33mNew\u001b[36m' or '\u001b[33mGuest\u001b[36m'\r\nLogin: \u001b[37m",
"dsr_replies": 2,
"dsr_requests": 2,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5160291194915771,
"total": 11.421549558639526
}
}
},
"sessions": [
{
"connected": "2026-04-05T18:55:00.095339+00:00",
"host": "147.78.240.155",
"ip": "147.78.240.155",
"port": 513
},
{
"connected": "2026-04-08T17:00:06.381138+00:00",
"host": "147.78.240.155",
"ip": "147.78.240.155",
"port": 513
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug 147.78.240.155 513
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1193 Fingerprint client: host=147.78.240.155 port=513
ERROR client.py:1296 147.78.240.155:513: [Errno 111] Connect call failed ('147.78.240.155', 513)
.. raw:: html