97.247.163.174:23
=================
**Connection Banner:**
.. image:: /_static/banners/banner_77c919c408f8.png
:alt: Synchronet BBS for Win32 Version 3.20 Telnet connection from: 135.129.91.121 Resolving hostname... _ β©ββ_ Synchronet BBS for Win32 Version 3.20 Copyright 2025 Rob Swindell
:class: ansi-banner
:width: 585px
:loading: lazy
Server URLs
-----------
.. raw:: html
**Server Location**: πΊπΈ United States (GeoIP)
BBS Software
------------
**Detected**: Synchronet
Encoding
--------
- **Effective encoding**: cp437
- **Scanner detected**: cp437
Telnet Fingerprint
------------------
:ref:`cdf52165b1ba8b95 `
*This fingerprint is shared by 256 other servers.*
**Options offered by server**: ``AARDWOLF``, ``ATCP``, ``ECHO``, ``GMCP``, ``MCCP2``, ``MCCP3``, ``MSDP``, ``MSP``, ``MSSP``, ``MXP``, ``SGA``, ``ZMP``
**Options requested from client**: ``NAWS``, ``NEW_ENVIRON``, ``TSPEED``, ``TTYPE``
The complete JSON record collected during the scan,
including Telnet negotiation results and
banner data.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "cdf52165b1ba8b95",
"fingerprint-data": {
"offered-options": [
"AARDWOLF",
"ATCP",
"ECHO",
"GMCP",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"ZMP"
],
"probed-protocol": "server",
"refused-options": [
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"STATUS"
],
"requested-options": [
"NAWS",
"NEW_ENVIRON",
"TSPEED",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\nSynchronet BBS for Win32 Version 3.20\r\nTelnet connection from: 135.129.91.121\r\nResolving hostname...\r\n\r\n\u001b[s\u001b[0c\u001b[255B\u001b[255C\b_\u001b[6n\u001b[u\u001b[!_\r\u2229\u2557\u2510\u001b[6n\u001b[0m_\u001b[2J\u001b[H\f\r\r Synchronet BBS for Win32 Version 3.20 Copyright 2025 Rob Swindell\r\n",
"dsr_replies": 2,
"dsr_requests": 2,
"encoding": "cp437",
"option_states": {
"server_offered": {
"AARDWOLF": true,
"ATCP": true,
"ECHO": true,
"GMCP": true,
"MCCP2": true,
"MCCP3": true,
"MSDP": true,
"MSP": true,
"MSSP": true,
"MXP": true,
"SGA": true,
"ZMP": true
},
"server_requested": {
"AARDWOLF": false,
"ATCP": false,
"GMCP": false,
"MCCP2": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"NAWS": true,
"NEW_ENVIRON": true,
"SNDLOC": false,
"TSPEED": true,
"TTYPE": true,
"ZMP": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5023365020751953,
"total": 11.014111042022705
}
}
},
"sessions": [
{
"connected": "2026-03-02T20:58:36.132636+00:00",
"host": "97.247.163.174",
"ip": "97.247.163.174",
"port": 23
},
{
"connected": "2026-03-02T22:55:28.094553+00:00",
"host": "97.247.163.174",
"ip": "97.247.163.174",
"port": 23
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug 97.247.163.174 23
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1193 Fingerprint client: host=97.247.163.174 port=23
ERROR client.py:1296 97.247.163.174:23: TCP connection to 97.247.163.174:23 timed out after 30.0s
.. raw:: html