bbs.archaicbinary.net:23
========================
**Connection Banner:**
.. raw:: html
ASCII detected.
Hit [ESC] twice within 15 seconds to continue...Hit [ESC] twice within 14
seconds to continue...Hit [ESC] twice within 13 seconds to continue...Hit [ESC]
twice within 12 seconds to continue...Hit [ESC] twice within 11 seconds to
continue...Hit [ESC] twice within 10 seconds to continue...Hit [ESC] twice
within 09 seconds to continue...Hit [ESC] twice within 08 seconds to
continue...Hit [ESC] twice within 07 seconds to continue...
Hit [ESC] twice within 06 seconds to continue...Hit [ESC] twice within 05
seconds to continue...Hit [ESC] twice within 04 seconds to continue...Hit [ESC]
twice within 03 seconds to continue...Hit [ESC] twice within 02 seconds to
continue...Hit [ESC] twice within 01 seconds to continue...Hit [ESC] twice
within 00 seconds to continue...
.. raw:: html
bbs.archaicbinary.net:23
⎘
Encoding
--------
- **Effective encoding**: cp437
- **Scanner detected**: ascii
Telnet Fingerprint
------------------
:ref:`f81f891a368f3645... `
*This fingerprint is shared by 30 other servers.*
**Options requested from client**: ``BINARY``, ``TTYPE``
**Data source**: `f81f891a368f3645/d2c2cad815ee78e3.json `_
The complete JSON record collected during the scan,
including Telnet negotiation results and banner data.
.. code-block:: json
{
"server-probe": {
"fingerprint": "f81f891a368f3645",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"BINARY",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "Hit [ESC] twice within 06 seconds to continue...Hit [ESC] twice within 05 seconds to continue...Hit [ESC] twice within 04 seconds to continue...Hit [ESC] twice within 03 seconds to continue...Hit [ESC] twice within 02 seconds to continue...Hit [ESC] twice within 01 seconds to continue...Hit [ESC] twice within 00 seconds to continue...\u001b[?1000l\b\b\b\b\b\b\b\b",
"banner_before_return": "\u001b[?1000l\f \r\n \r\n\u001b[s\u001b[255B\u001b[255C\u001b[6n\u001b[u\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \bASCII detected.\r\n\fHit [ESC] twice within 15 seconds to continue...Hit [ESC] twice within 14 seconds to continue...Hit [ESC] twice within 13 seconds to continue...Hit [ESC] twice within 12 seconds to continue...Hit [ESC] twice within 11 seconds to continue...Hit [ESC] twice within 10 seconds to continue...Hit [ESC] twice within 09 seconds to continue...Hit [ESC] twice within 08 seconds to continue...Hit [ESC] twice within 07 seconds to continue...",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true
},
"server_requested": {
"BINARY": true,
"SNDLOC": false,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 18.08535671234131
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:36:03.138398+00:00",
"host": "bbs.archaicbinary.net",
"ip": "167.114.108.156",
"port": 23
}
]
}
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
.. code-block:: text
DEBUG client.py:863 Fingerprint client: host=bbs.archaicbinary.net port=23
INFO client_base.py:174 Connected to
DEBUG stream_writer.py:706 recv IAC DO SNDLOC
DEBUG stream_writer.py:1767 handle_do(SNDLOC)
DEBUG stream_writer.py:1845 DO SNDLOC not supported.
DEBUG stream_writer.py:3167 local_option[SNDLOC] = False
DEBUG stream_writer.py:947 send IAC WONT SNDLOC
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC DO TTYPE
DEBUG stream_writer.py:1767 handle_do(TTYPE)
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:947 send IAC WILL TTYPE
DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3167 local_option[TTYPE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:685 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2234 recv TTYPE SEND: b''
DEBUG stream_writer.py:2247 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to
INFO fingerprinting.py:746 connection for server fingerprint f81f891a368f3645
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug bbs.archaicbinary.net 23