bbs.wehack.net:23 ================= **Connection Banner:** .. raw:: html .. raw:: html

bbs.wehack.net:23

Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ------------------ :ref:`cfa317a91359cb0b... ` *This fingerprint is shared by 29 other servers.* **Options offered by server**: ``BINARY``, ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY``, ``SGA`` **Data source**: `cfa317a91359cb0b/21cc8bd071466c6a.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "cfa317a91359cb0b", "fingerprint-data": { "offered-options": [ "BINARY", "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY", "SGA" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\u001b[0;1;33m \u001b[0mLogin\u001b[1;30m: \u001b[1D\u001b[33m", "banner_before_return": "* MajorTCP/IP by Vircom Inc. *\r\n\r\nConnecting...Please Wait...\r\n\r\n\u001b[0m\u001b[2J \u001b[1D\u001b[30m \u001b[!\b\b\b\r\u001b[0m\u001b[2J\r\n\r\n \u001b[1;30m:::. :::. ...\r\n `;;;;, `;;; .;;;;;;;.\r\n [[[[[. `[[ ,[[ \\[[,\r\n \u001b[0m$$$ \"T$c$$ $$$, $$$\r\n 888 Y88 \"888,_ _,88P\r\n MMM YM \"YMMMMMP\"\r\n .,-::::: :::. :::::::.. :::::::.. ::: ,:::::: :::::::..\r\n ,;;;'````' ;;`;; ;;;;``;;;; ;;;;``;;;; ` ;;;'''' ;;;;``;;;;\r\n [[[ ,[[ '[[, [[[,/[[[' [[[,/[[[' [[[ [[cccc [[[,/[[['\r\n \u001b[1m$$$ c$$$cc$$$c $$$$$$c $$$$$$c $$$ $$\"\"\" $$$$$$c\r\n `88bo,__,o, 888 888, 888b \"88bo ,888b \"88bo, 888 888oo,_ 88b \"88bo,\r\n \"YUMMMMMP\" YMM \"\"` MMMM \"W\" MMMM \"W\" MMM \"WWWWWW MMM \"W\"\r\n \u001b[0;31m+\u001b[1mo \u001b[33mVisievion\r\n \u001b[1D\u001b[32m\r\n\r\nServer upgrades completed 11/4/2023.\r\n\r\n\u001b[0;1;33m \u001b[0mLogin\u001b[1;30m: \u001b[1D\u001b[33m", "encoding": "ascii", "option_states": { "server_offered": { "BINARY": true, "ECHO": true, "SGA": true }, "server_requested": { "BINARY": true, "ECHO": false, "SGA": true } }, "scan_type": "quick", "timing": { "probe": 0.3069140911102295, "total": 5.352057933807373 } } }, "sessions": [ { "connected": "2026-02-09T19:36:06.958889+00:00", "host": "bbs.wehack.net", "ip": "72.34.60.59", "port": 23 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=bbs.wehack.net port=23 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC DO SGA DEBUG stream_writer.py:1767 handle_do(SGA) DEBUG stream_writer.py:3167 pending_option[WILL + SGA] = True DEBUG stream_writer.py:947 send IAC WILL SGA DEBUG stream_writer.py:3167 local_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[WILL + SGA] = False DEBUG stream_writer.py:706 recv IAC WILL SGA DEBUG stream_writer.py:722 WILL SGA unsolicited DEBUG stream_writer.py:1897 handle_will(SGA) DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True DEBUG stream_writer.py:947 send IAC DO SGA DEBUG stream_writer.py:3167 remote_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False DEBUG stream_writer.py:706 recv IAC DONT ECHO DEBUG stream_writer.py:1860 handle_dont(ECHO) DEBUG stream_writer.py:3167 pending_option[WILL + ECHO] = False DEBUG stream_writer.py:3167 local_option[ECHO] = False DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:706 recv IAC DO BINARY DEBUG stream_writer.py:1767 handle_do(BINARY) DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True DEBUG stream_writer.py:947 send IAC WILL BINARY DEBUG stream_writer.py:3167 local_option[BINARY] = True DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False DEBUG stream_writer.py:706 recv IAC WILL BINARY DEBUG stream_writer.py:722 WILL BINARY unsolicited DEBUG stream_writer.py:1897 handle_will(BINARY) DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True DEBUG stream_writer.py:947 send IAC DO BINARY DEBUG stream_writer.py:3167 remote_option[BINARY] = True DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = False DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True DEBUG stream_writer.py:947 send IAC DO STATUS DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:947 send IAC DO CHARSET DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True DEBUG stream_writer.py:947 send IAC DO EOR DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True DEBUG stream_writer.py:947 send IAC DO GMCP DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True DEBUG stream_writer.py:947 send IAC DO MSDP DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True DEBUG stream_writer.py:947 send IAC DO MSSP DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True DEBUG stream_writer.py:947 send IAC DO MSP DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True DEBUG stream_writer.py:947 send IAC DO MXP DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True DEBUG stream_writer.py:947 send IAC DO ZMP DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:947 send IAC DO AARDWOLF DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True DEBUG stream_writer.py:947 send IAC DO ATCP DEBUG stream_writer.py:706 recv IAC WONT STATUS DEBUG stream_writer.py:2022 handle_wont(STATUS) DEBUG stream_writer.py:3167 remote_option[STATUS] = False DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False DEBUG stream_writer.py:706 recv IAC WONT CHARSET DEBUG stream_writer.py:2022 handle_wont(CHARSET) DEBUG stream_writer.py:3167 remote_option[CHARSET] = False DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = False DEBUG stream_writer.py:706 recv IAC WONT EOR DEBUG stream_writer.py:2022 handle_wont(EOR) DEBUG stream_writer.py:3167 remote_option[EOR] = False DEBUG stream_writer.py:3167 pending_option[DO + EOR] = False DEBUG stream_writer.py:706 recv IAC WONT COM_PORT_OPTION DEBUG stream_writer.py:2022 handle_wont(COM_PORT_OPTION) DEBUG stream_writer.py:3167 remote_option[COM_PORT_OPTION] = False DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = False DEBUG stream_writer.py:706 recv IAC WONT GMCP DEBUG stream_writer.py:2022 handle_wont(GMCP) DEBUG stream_writer.py:3167 remote_option[GMCP] = False DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = False DEBUG stream_writer.py:706 recv IAC WONT MSDP DEBUG stream_writer.py:2022 handle_wont(MSDP) DEBUG stream_writer.py:3167 remote_option[MSDP] = False DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = False DEBUG stream_writer.py:706 recv IAC WONT MSSP DEBUG stream_writer.py:2022 handle_wont(MSSP) DEBUG stream_writer.py:3167 remote_option[MSSP] = False DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = False DEBUG stream_writer.py:706 recv IAC WONT MSP DEBUG stream_writer.py:2022 handle_wont(MSP) DEBUG stream_writer.py:3167 remote_option[MSP] = False DEBUG stream_writer.py:3167 pending_option[DO + MSP] = False DEBUG stream_writer.py:706 recv IAC WONT MXP DEBUG stream_writer.py:2022 handle_wont(MXP) DEBUG stream_writer.py:3167 remote_option[MXP] = False DEBUG stream_writer.py:3167 pending_option[DO + MXP] = False DEBUG stream_writer.py:706 recv IAC WONT ZMP DEBUG stream_writer.py:2022 handle_wont(ZMP) DEBUG stream_writer.py:3167 remote_option[ZMP] = False DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = False DEBUG stream_writer.py:706 recv IAC WONT AARDWOLF DEBUG stream_writer.py:2022 handle_wont(AARDWOLF) DEBUG stream_writer.py:3167 remote_option[AARDWOLF] = False DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = False DEBUG stream_writer.py:706 recv IAC WONT ATCP DEBUG stream_writer.py:2022 handle_wont(ATCP) DEBUG stream_writer.py:3167 remote_option[ATCP] = False DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = False INFO fingerprinting.py:746 connection for server fingerprint cfa317a91359cb0b INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug bbs.wehack.net 23