45.72.180.214:23
================
**Connection Banner:**
.. raw:: html
telnetd.device: Waiting for unit to answer.
telnetd.device: Connected to TCP/IP port 2323 unit 1.
!you have reached!
____._______.__ ___________________________________________
\_ | __ | \/ _______ _ / _____ _ \_ _ _ \
/ __| \ ! \____ \ \__/ ._)__ _/ _/ | __| \
/ \___ \____ \ \ \ \ ! \ \ \_ a \___ \
\____| \______/_______/____/_________/__\ /___:____| \dZG
l_____/ \ / . l_____/
!hysteria bbs! \/
[press <!> to continue]
[you really need to press <!> to continue]
.. raw:: html
45.72.180.214:23
Encoding
--------
- **Effective encoding**: cp437
- **Scanner detected**: ascii
Telnet Fingerprint
------------------
:ref:`72c0c1b074a0910f... `
*This fingerprint is unique to this server.*
**Options requested from client**: ``BINARY``, ``LINEMODE``, ``NAWS``, ``TSPEED``
**Data source**: `72c0c1b074a0910f/cc1bc8dd2f6cd302.json `_
The complete JSON record collected during the scan,
including Telnet negotiation results and banner data.
.. code-block:: json
{
"server-probe": {
"fingerprint": "72c0c1b074a0910f",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"BINARY",
"LINEMODE",
"NAWS",
"TSPEED"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n [press to continue]\r\n\r\n [you really need to press to continue]\r\n",
"banner_before_return": "\r\ntelnetd.device: Waiting for unit to answer.\r\ntelnetd.device: Connected to TCP/IP port 2323 unit 1.\r\n\u0007\r\n\f\f\r\r\n !you have reached!\r\r\n ____._______.__ ___________________________________________\r\r\n \\_ | __ | \\/ _______ _ / _____ _ \\_ _ _ \\\r\r\n / __| \\ ! \\____ \\ \\__/ ._)__ _/ _/ | __| \\\r\r\n / \\___ \\____ \\ \\ \\ \\ ! \\ \\ \\_ a \\___ \\\r\r\n \\____| \\______/_______/____/_________/__\\ /___:____| \\dZG\r\r\n l_____/ \\ / . l_____/\r\r\n !hysteria bbs! \\/\r\r\n",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true,
"STATUS": true
},
"server_requested": {
"BINARY": true,
"LINEMODE": true,
"NAWS": true,
"TSPEED": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 3.3613314628601074
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:30:46.318667+00:00",
"host": "45.72.180.214",
"ip": "45.72.180.214",
"port": 23
}
]
}
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
.. code-block:: text
DEBUG client.py:863 Fingerprint client: host=45.72.180.214 port=23
INFO client_base.py:174 Connected to
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:706 recv IAC WILL STATUS
DEBUG stream_writer.py:722 WILL STATUS unsolicited
DEBUG stream_writer.py:1897 handle_will(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = True
DEBUG stream_writer.py:1038 send IAC SB STATUS SEND IAC SE
DEBUG stream_writer.py:3167 pending_option[SB + STATUS] = True
DEBUG stream_writer.py:706 recv IAC DO TSPEED
DEBUG stream_writer.py:1767 handle_do(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = True
DEBUG stream_writer.py:947 send IAC WILL TSPEED
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = True
DEBUG stream_writer.py:3167 local_option[TSPEED] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB TSPEED
DEBUG stream_writer.py:685 sub-negotiation cmd TSPEED SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = False
DEBUG stream_writer.py:2166 recv TSPEED SEND: b''
DEBUG stream_writer.py:2197 send: IAC SB TSPEED IS b'38400',b'38400' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB STATUS, SB LINEMODE'
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to
INFO fingerprinting.py:737 new server fingerprint 72c0c1b074a0910f
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug 45.72.180.214 23