199.255.220.235:6789 ==================== **Connection Banner:** .. image:: /_static/banners/banner_e88a49d2eb86.png :alt: (-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-) Welcome, friend, to Pixie's Mud, And welcome, welcome back..., To friends from ages, tree to bud, Too many to keep track... Bards and mages, druids and sages, Slugs and Dragons and more... Quest through our stages and come turn the pages, Of Pixieland's Most Ancient Lore... -- Yaliebear Welcome to PixieMUD.​........... (-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-) PixieMud is currently running : 3.3.720. You have arrived at the borders of the sovereign realm of PixieMud, a realm of fantasy and magic. A pair of hulking guards are here checking everyone's credentials. One of the guards says: Please give us your name or ask to see the list. [list, or quit] : The guard says: Sorry, I didn't catch that. The guard says: What is your character name? [list, or quit] : :class: ansi-banner :width: 601px :loading: lazy Server URLs ----------- .. raw:: html **Server Location**: 🇨🇦 Canada (GeoIP) Encoding -------- - **Effective encoding**: ascii - **Scanner detected**: cp437 Telnet Fingerprint ------------------ :ref:`e89ffa4fe5c32389 ` *This fingerprint is shared by 99 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "e89ffa4fe5c32389", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MCCP2", "MCCP3", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "The guard says: Sorry, I didn't catch that.\r\nThe guard says: What is your character name?\r\n\r\n[list, or quit] : ", "banner_before_return": "(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)\r\n\r\n\r\n\t\tWelcome, friend, to Pixie's Mud,\r\n\t\tAnd welcome, welcome back...,\r\n\t\tTo friends from ages, tree to bud,\r\n\t\tToo many to keep track...\r\n\r\n\t\tBards and mages, druids and sages,\r\n\t\tSlugs and Dragons and more...\r\n\t\tQuest through our stages and come turn the pages,\r\n\t\tOf Pixieland's Most Ancient Lore...\r\n\r\n\t\t\t-- Yaliebear\r\n\r\n Welcome to PixieMUD............\r\n\r\n(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)\r\n\r\nPixieMud is currently running : 3.3.720.\r\n\r\nYou have arrived at the borders of the sovereign realm of PixieMud, a\r\nrealm of fantasy and magic. A pair of hulking guards are here\r\nchecking everyone's credentials.\r\n\r\nOne of the guards says: Please give us your name or ask to see the\r\nlist.\r\n\r\n[list, or quit] : ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "cp437", "option_states": { "server_offered": { "AARDWOLF": false, "ATCP": false, "GMCP": false, "MCCP3": false, "MSDP": false, "MSP": false, "MSSP": false, "MXP": false, "ZMP": false }, "server_requested": { "AARDWOLF": false, "ATCP": false, "GMCP": false, "MCCP3": false, "MSDP": false, "MSP": false, "MSSP": false, "MXP": false, "ZMP": false } }, "scan_type": "quick", "timing": { "probe": 0.5035088062286377, "total": 11.086678504943848 } } }, "sessions": [ { "connected": "2026-03-02T20:55:31.487459+00:00", "host": "199.255.220.235", "ip": "199.255.220.235", "port": 6789 }, { "connected": "2026-03-02T22:47:55.552686+00:00", "host": "199.255.220.235", "ip": "199.255.220.235", "port": 6789 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 199.255.220.235 6789 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=199.255.220.235 port=6789 ERROR client.py:1296 199.255.220.235:6789: [Errno 113] Connect call failed ('199.255.220.235', 6789) .. raw:: html