dcastle.org:6666 ================ **Connection Banner:** .. raw:: html .. raw:: html

dcastle.org:6666

Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ------------------ :ref:`c2dd7d4e76383b41... ` *This fingerprint is shared by 46 other servers.* **Data source**: `c2dd7d4e76383b41/6edeb9a7444c8f9d.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "Empty name. Disconnecting...", "banner_before_return": "\r\n Inspiration from: M.Seifert, H.Staerfeldt, S.Hammer, T.Madsen, K.Nyboe\n\r <:>========================================================================<:>\n\r|\\| . ,;;;, ,,;;::, ,' |/|\n\r|o| ,;;;, ;;' ';;, ,;;; ;:::' |o|\n\r|/| ;' `;; ', ;;;, ,;';;; ; , , |\\|\n\r|~| ;;, ;;, ';; ,;;' ;;; ; ,;; ,;; |~|\n\r|\\| ,;;;; ;;; ;;; ,;;; ;;; ; ;;; ;;; |/|\n\r|o| ,;;;;;; ;;; ;;; ;;;' ;;; ; ,,;;;,,,; ,,;;;,,,; |o|\n\r|/| ;' ;;; ;;; ;;; ;;;; ;;; ; ;;;;;;;;; ;;;;;;;;; |\\|\n\r|~| ,;;;; ;;; ;;; ;;; ;;; ; ' ;;; ' ;;; |~|\n\r|\\| ,;;;;;; ;;; ;;; ;;;, ;;; ; ;;' ;;' |/|\n\r|o| ;' ;;; ;;; ;;; ;;;; ;;; ; ' ' |o|\n\r|/| ;;; ;;; ;;; ;;;, ;;' ; |\\|\n\r|~| ;;' ,' ;;; ';;;, ' ; |~|\n\r|\\| ,;;,, ;',',;;;, ;' ';;;,,;;;,`. ,,;;. |/|\n\r<:>=====- ,;;;;;;;;,,',;;;;;;;,' ';;;;;;;;,`. ;;;;;;;;. -========<:>\n\r|/| ' \";;;;',;;' ';;;, , , ,;;;' ';;,`;;;;' ` |\\|\n\r|~| '' '''' '''' '' |~|\n\r|\\| Are you afraid of the Dark?.... |/|\n\r|o| |o|\n\r|/| !WARNING! This is the legacy port 6666 mostly used for botting. SSL/TLS|\\|\n\r|~| port at 6670. The new Dark Castle is on port 23, 6969. |~|\n\r<:>========================================================================<:>\n\r dcastle.org ports 6666 www.dcastle.org\n\r\n\rWhat name for the roster? ", "encoding": "ascii", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 2.626703977584839 } } }, "sessions": [ { "connected": "2026-02-09T19:28:36.293258+00:00", "host": "dcastle.org", "ip": "72.14.179.114", "port": 6666 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=dcastle.org port=6666 INFO client_base.py:174 Connected to DEBUG stream_writer.py:1320 IAC GA: Go-Ahead (unhandled). DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug dcastle.org 6666