bbs.outpost9.co:2023 ==================== **Connection Banner:** .. image:: /_static/banners/banner_42199618e087.png :alt: Client Address: 1984.ws (64.227.40.173) WWIV 5.8.1.3688 Copyright (c) 1998-2023, WWIV Software Services. All Rights Reserved. ─────────────────────────────────────────────────────────────────────────── ▀▀▀▀▀▀▓▓▄ ▀▓▓█ ▓▓▓▀▀▓▓▓▀▀ ▀▀▀▀▀▀▓▓▄ ▀▀▀▀▀▀▓▓▄ ▄▓▓▀▀▀▀▀▀ ▀▀▓▓▓▀▀ ▄▓▓▀▀▀▀▀▀ ▒▒▒█ ▒▒▓▒▒▒█ ▒▒▒█ ▒▒▒█ ▒▒▒▀▀▀▀▀ ▒▒▒█ ▒▒▓▀▀▀▀▀▒▒▄ █ ▒▒▒█ ▀▀▀▀▀▒▒▒ ░░░▀ ░░░░░░▀ ░░░█ ░░░█ ░░░█████ ░░░▀ ░░░░░░▀ ░░░█ ░░░█ █████ ░░░ ▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀ ▀▀▀ ▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀ ─────────────────────────────────────────────────────────────────────────── Sysop: Veeb0rgWeb: https://outpost9.co Telnet: bbs.outpost9.co:2023 location: Maryland, USA phone:443-332-8301 Enter number or name or 'NEW' NN: Unknown user. Enter number or name or 'NEW' NN: :class: ansi-banner :width: 619px :loading: lazy Server URLs ----------- .. raw:: html **Server Location**: 🇺🇸 United States (GeoIP) Listing ------- - **BBS Name**: Outpost 9 (BBS) (from listing) - **Sysop**: Veeb0rg - **Listed Location**: Glen Burnie, MD, USA BBS Software ------------ **Detected**: WWIV Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: cp437 Telnet Fingerprint ------------------ :ref:`4305c7e02be02e5d ` *This fingerprint is shared by 29 other servers.* **Options offered by server**: ``ECHO``, ``SGA`` The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "4305c7e02be02e5d", "fingerprint-data": { "offered-options": [ "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "EOR", "GMCP", "MCCP2", "MCCP3", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "\u001b[0;37;40m\r\n\r\n\u001b[0;31;40;1mUnknown user.\r\u001b[0;37;40m\n\r\nEnter number or name or 'NEW'\r\nNN: \u001b[s\u001b[0;37;44;1m \u001b[u\u001b[s\u001b[u\u001b[s\u001b[u\u001b[s", "banner_before_return": "Client Address: 1984.ws (64.227.40.173)\r\n\r\n\r\nWWIV 5.8.1.3688\r\nCopyright (c) 1998-2023, WWIV Software Services.\r\nAll Rights Reserved.\r\n\u001b[s\u001b[999;999H\u001b[6n\u001b[u\u001b[6n\r\n\u001b[?7h\u001b[40m\u001b[2J\u001b[40m\r\n\u001b[0;1m \u001b[34m\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\r\n \u001b[37m\u2580\u2580\u2580\u2580\u2580\u2580\u001b[47m\u2593\u2593\u001b[40m\u2584 \u001b[47m\u2580\u2593\u2593\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2593\u2593\u2593\u001b[1C\u001b[40m\u2580\u2580\u001b[47m\u2593\u2593\u2593\u001b[40m\u2580\u2580 \u2580\u2580\u2580\u2580\u2580\u2580\u001b[47m\u2593\u2593\u001b[40m\u2584 \u2580\u2580\u2580\u2580\u2580\u2580\u001b[47m\u2593\u2593\u001b[40m\u2584 \u2584\u001b[47m\u2593\u2593\u001b[40m\u2580\u2580\u2580\u2580\u2580\u2580 \u2580\u2580\u001b[47m\u2593\u2593\u2593\u001b[40m\u2580\u2580 \u2584\u001b[47m\u2593\u2593\u001b[40m\u2580\u2580\u2580\u2580\u2580\u001b[0m\u2580\r\n \u001b[1;47m\u2592\u2592\u2592\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2592\u2592\u2593\u001b[1C\u2592\u2592\u2592\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2592\u2592\u2592\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2592\u2592\u2592\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2592\u2592\u2592\u001b[40m\u2580\u2580\u2580\u2580\u2580 \u001b[47m\u2592\u2592\u2592\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2592\u2592\u2593\u001b[2C\u001b[40m\u2580\u2580\u2580\u2580\u2580\u001b[47m\u2592\u2592\u001b[0m\u2584 \u001b[1;30m\u2588 \u001b[37;47m\u2592\u2592\u2592\u001b[1C\u001b[30;40m\u2588 \u001b[37m\u2580\u2580\u2580\u2580\u2580\u001b[47m\u2592\u2592\u2592\u001b[40m\r\n \u001b[47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2580 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2580 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2588\u2588\u2588\u2588\u2588 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2580 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2580 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2588 \u001b[37;47m\u2591\u2591\u2591\u001b[1C\u001b[30;40m\u2588 \u2588\u2588\u2588\u2588\u2588 \u001b[37;47m\u2591\u2591\u2591\u001b[40m\r\n \u001b[0m\u2580\u2580\u2580\u2580\u2580\u2580\u2580 \u2580\u2580\u2580\u2580\u2580\u2580\u2580 \u2580\u2580\u2580 \u2580\u2580\u2580\u001b[8C\u2580\u2580\u2580\u2580\u2580\u2580\u2580 \u2580\u2580\u2580\u2580\u2580\u2580\u2580\u2580 \u2580\u2580\u2580\u001b[9C\u2580\u2580\u2580\r\n \u001b[1;34m\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\r\n S\u001b[0;34mysop\u001b[1;30m: \u001b[0mVeeb0rg\u001b[5C\u001b[1;34mW\u001b[0;34meb\u001b[1;30m: \u001b[0mhttps://outpost9.co \u001b[1;34mT\u001b[0;34melnet\u001b[1;30m: \u001b[0mbbs.outpost9.co:2023\r\n\u001b[14C\u001b[1;34ml\u001b[0;34mocation\u001b[1;30m: \u001b[0mMaryland, USA \u001b[1;34mp\u001b[0;34mhone\u001b[1;30m:\u001b[0m443-332-8301\r\n\u001b[0m\u001b[255D\r\n\r\nEnter number or name or 'NEW'\r\nNN: \u001b[s\u001b[0;37;44;1m \u001b[u\u001b[s\u001b[u\u001b[s", "dsr_replies": 2, "dsr_requests": 2, "encoding": "cp437", "option_states": { "server_offered": { "ECHO": true, "SGA": true }, "server_requested": { "ECHO": false, "LINEMODE": false } }, "scan_type": "quick", "timing": { "probe": 0.5042092800140381, "total": 11.15628170967102 } } }, "sessions": [ { "connected": "2026-03-07T04:13:25.533528+00:00", "host": "bbs.outpost9.co", "ip": "68.134.179.115", "port": 2023 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug bbs.outpost9.co 2023 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=bbs.outpost9.co port=2023 INFO client_base.py:186 Connected to DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True DEBUG stream_writer.py:1019 send IAC WILL MXP DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True DEBUG stream_writer.py:1019 send IAC WILL ATCP DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True DEBUG stream_writer.py:1019 send IAC WILL GMCP DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True DEBUG stream_writer.py:1019 send IAC WILL MSP DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True DEBUG stream_writer.py:1019 send IAC WILL MSDP DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True DEBUG stream_writer.py:1019 send IAC WILL MSSP DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True DEBUG stream_writer.py:1019 send IAC WILL ZMP DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True DEBUG stream_writer.py:1019 send IAC DO MXP DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True DEBUG stream_writer.py:1019 send IAC DO ATCP DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True DEBUG stream_writer.py:1019 send IAC DO GMCP DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:1019 send IAC DO AARDWOLF DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True DEBUG stream_writer.py:1019 send IAC DO MSP DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True DEBUG stream_writer.py:1019 send IAC DO MSDP DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True DEBUG stream_writer.py:1019 send IAC DO MSSP DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True DEBUG stream_writer.py:1019 send IAC DO ZMP DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS DEBUG stream_writer.py:768 recv IAC DONT ECHO DEBUG stream_writer.py:1959 handle_dont(ECHO) DEBUG stream_writer.py:3330 pending_option[WILL + ECHO] = False DEBUG stream_writer.py:3330 local_option[ECHO] = False DEBUG stream_writer.py:768 recv IAC WILL ECHO DEBUG stream_writer.py:784 WILL ECHO unsolicited DEBUG stream_writer.py:1994 handle_will(ECHO) DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True DEBUG stream_writer.py:1019 send IAC DO ECHO DEBUG stream_writer.py:3330 remote_option[ECHO] = True DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = False DEBUG stream_writer.py:768 recv IAC WILL SGA DEBUG stream_writer.py:784 WILL SGA unsolicited DEBUG stream_writer.py:1994 handle_will(SGA) DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True DEBUG stream_writer.py:1019 send IAC DO SGA DEBUG stream_writer.py:3330 remote_option[SGA] = True DEBUG stream_writer.py:3330 pending_option[DO + SGA] = False DEBUG stream_writer.py:768 recv IAC DONT LINEMODE DEBUG stream_writer.py:1959 handle_dont(LINEMODE) DEBUG stream_writer.py:3330 pending_option[WILL + LINEMODE] = False DEBUG stream_writer.py:3330 local_option[LINEMODE] = False DEBUG stream_writer.py:768 recv IAC WILL SGA DEBUG stream_writer.py:784 WILL SGA unsolicited DEBUG stream_writer.py:1994 handle_will(SGA) DEBUG client_base.py:499 negotiation failed after 4.00s. DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP, WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP, DO ZMP, DO MCCP2_COMPRESS' DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True DEBUG stream_writer.py:1019 send IAC DO BINARY DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True DEBUG stream_writer.py:1019 send IAC DO STATUS DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:1019 send IAC DO CHARSET DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True DEBUG stream_writer.py:1019 send IAC DO EOR DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True DEBUG stream_writer.py:993 skip DO MSP; pending_option = True DEBUG stream_writer.py:993 skip DO MXP; pending_option = True DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True INFO fingerprinting.py:755 connection for server fingerprint 4305c7e02be02e5d INFO client_base.py:118 Connection closed to .. raw:: html