connect.rayzer.net:2112 ======================= **Connection Banner:** .. raw:: html .. raw:: html

connect.rayzer.net:2112

BBS Software ------------ **Detected**: Mystic BBS Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ------------------ :ref:`f81f891a368f3645... ` *This fingerprint is shared by 30 other servers.* **Options requested from client**: ``BINARY``, ``TTYPE`` **Data source**: `f81f891a368f3645/d2081160e8356e8e.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "f81f891a368f3645", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [ "BINARY", "TTYPE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "Press [.ESC.] twice within 01 seconds to CONTINUE...Press [.ESC.] twice within 00 seconds to CONTINUE...\r\n\r\n(0) Ascii (No Color)\r\n(1) Ansi (Color)\r\n\r\nGraphics Mode -> \r\n\u001b[?1000l\b\b\b\b\b\b\b\b\r\n\u001b[8;25;80t\u001b[1;25r", "banner_before_return": "\u001b[1;1H\u001b[2J\u001b[1;1H\u001b[?1000h\fMystic BBS Version 1.12 A48\r\nCopyright (C) 1997-2023 By James Coyle\r\n\r\nDetecting terminal emulation: \u001b[s\u001b[255B\u001b[255C\u001b[6n\u001b[u\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\f: botcheck v1.2 >> Phenom ProductionsPress [.ESC.] twice within 10 seconds to CONTINUE...Press [.ESC.] twice within 09 seconds to CONTINUE...Press [.ESC.] twice within 08 seconds to CONTINUE...Press [.ESC.] twice within 07 seconds to CONTINUE...Press [.ESC.] twice within 06 seconds to CONTINUE...Press [.ESC.] twice within 05 seconds to CONTINUE...Press [.ESC.] twice within 04 seconds to CONTINUE...Press [.ESC.] twice within 03 seconds to CONTINUE...Press [.ESC.] twice within 02 seconds to CONTINUE...", "encoding": "ascii", "option_states": { "server_offered": { "ECHO": true, "SGA": true }, "server_requested": { "BINARY": true, "SNDLOC": false, "TTYPE": true } }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 13.218359470367432 } } }, "sessions": [ { "connected": "2026-02-09T19:28:37.078446+00:00", "host": "connect.rayzer.net", "ip": "66.255.254.30", "port": 2112 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=connect.rayzer.net port=2112 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC DO SNDLOC DEBUG stream_writer.py:1767 handle_do(SNDLOC) DEBUG stream_writer.py:1845 DO SNDLOC not supported. DEBUG stream_writer.py:3167 local_option[SNDLOC] = False DEBUG stream_writer.py:947 send IAC WONT SNDLOC DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:706 recv IAC WILL SGA DEBUG stream_writer.py:722 WILL SGA unsolicited DEBUG stream_writer.py:1897 handle_will(SGA) DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True DEBUG stream_writer.py:947 send IAC DO SGA DEBUG stream_writer.py:3167 remote_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False DEBUG stream_writer.py:706 recv IAC DO BINARY DEBUG stream_writer.py:1767 handle_do(BINARY) DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True DEBUG stream_writer.py:947 send IAC WILL BINARY DEBUG stream_writer.py:3167 local_option[BINARY] = True DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False DEBUG stream_writer.py:706 recv IAC DO TTYPE DEBUG stream_writer.py:1767 handle_do(TTYPE) DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = True DEBUG stream_writer.py:947 send IAC WILL TTYPE DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = True DEBUG stream_writer.py:3167 local_option[TTYPE] = True DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = False DEBUG stream_writer.py:698 begin sub-negotiation SB TTYPE DEBUG stream_writer.py:685 sub-negotiation cmd TTYPE SE completion byte DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = False DEBUG stream_writer.py:2234 recv TTYPE SEND: b'' DEBUG stream_writer.py:2247 send IAC SB TTYPE IS b'xterm-256color' IAC SE DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:663 IAC NAOFFD: not a legal 2-byte cmd, treating as data DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint f81f891a368f3645 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug connect.rayzer.net 2112