136.144.155.250 =============== 136.144.155.250:2000 -------------------- **Connection Banner:** .. raw:: html .. raw:: html

136.144.155.250:2000

Encoding ~~~~~~~~ - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`759aef872114a5f7... ` *This fingerprint is shared by 1 other server.* **Options offered by server**: ``ECHO``, ``SGA`` **Options requested from client**: ``LINEMODE`` **Data source**: `759aef872114a5f7/fa6dfa09fb865cf0.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "759aef872114a5f7", "fingerprint-data": { "offered-options": [ "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "LINEMODE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\r\n T H E FFFF FF FFFF\r\n FF FFFF FF\r\n FF FF FF FF FFFF FF FF FF\r\n FF FF FF FF FF FF FF FF\r\n FFFF FFFF FF FF FFFF\r\n FFF FFF FF FF FF\r\n FF FF FFFF FF FF O F T H E\r\n\r\n FFFFFFFFFFFF\r\n FF\r\n FF FFFFFF FF FFFF FFFFFF FF FFFF\r\n FFFFFF FF FF FFF FF FF FF FF\r\n FF FF FF FF FF FFFF\r\n FF FF FF FF FF FF FF\r\n FFFF FFFFFF FFFF FFFFFF FF FFFF\r\n\r\n\r\n\r\nName : who\r\nPassword : ", "banner_before_return": "\u001b[2J\r\n\u001b[1;1H\u001b[1;1H\u001b[1mDGD 1.2.157-WOTF-NET / WOTF Kernel 0.84\u001b[0m\r\n\r\n\r\n\u001b[2J\r\n\u001b[1;1H\u001b[1m\u001b[1m\u001b[33m T H E W A Y O F T H E F O R C E\u001b[0m\r\n\u001b[1m=================================================\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mWelcome to the Way of the Force, space traveller.\u001b[0m\r\n\u001b[1mThis mud is in development and is not open for\u001b[0m\r\n\u001b[1mfull gameplay yet. We do have a working game \u001b[0m\r\n\u001b[1mwith some areas however and new characters can \u001b[0m\r\n\u001b[1mbe created and you can do some playtesting in \u001b[0m\r\n\u001b[1mthe already available areas. \u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m=================================================\u001b[0m\r\n\u001b[1m\u001b[0m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mEnter menu option or your name:\u001b[0m\r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[1m 1\u001b[0m - Introduction to Way of the Force \r\n\u001b[1m 2\u001b[0m - Login an existing character \r\n\u001b[1m n\u001b[0m - Create a new character \r\n\u001b[1m w\u001b[0m - Who is online? \r\n\u001b[1m q\u001b[0m - disconnect \r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[0m\u001b[1m> \u001b[0m", "encoding": "ascii", "option_states": { "server_offered": { "ECHO": true }, "server_requested": { "LINEMODE": true } }, "scan_type": "quick", "timing": { "probe": 0.5069048404693604, "total": 5.021974325180054 } } }, "sessions": [ { "connected": "2026-02-09T19:27:02.415121+00:00", "host": "136.144.155.250", "ip": "136.144.155.250", "port": 2000 } ] } Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=136.144.155.250 port=2000 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC WONT ECHO DEBUG stream_writer.py:2022 handle_wont(ECHO) DEBUG stream_writer.py:3167 remote_option[ECHO] = False DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:706 recv IAC DO LINEMODE DEBUG stream_writer.py:1767 handle_do(LINEMODE) DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True DEBUG stream_writer.py:947 send IAC WILL LINEMODE DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True DEBUG stream_writer.py:3167 local_option[LINEMODE] = True DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = False DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE DEBUG stream_writer.py:1274 set Linemode DEBUG stream_writer.py:1277 send IAC SB LINEMODE LINEMODE-MODE IAC SE DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True DEBUG stream_writer.py:947 send IAC DO BINARY DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True DEBUG stream_writer.py:947 send IAC DO SGA DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True DEBUG stream_writer.py:947 send IAC DO STATUS DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:947 send IAC DO CHARSET DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True DEBUG stream_writer.py:947 send IAC DO EOR DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True DEBUG stream_writer.py:947 send IAC DO GMCP DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True DEBUG stream_writer.py:947 send IAC DO MSDP DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True DEBUG stream_writer.py:947 send IAC DO MSSP DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True DEBUG stream_writer.py:947 send IAC DO MSP DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True DEBUG stream_writer.py:947 send IAC DO MXP DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True DEBUG stream_writer.py:947 send IAC DO ZMP DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:947 send IAC DO AARDWOLF DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True DEBUG stream_writer.py:947 send IAC DO ATCP DEBUG stream_writer.py:706 recv IAC WILL SGA DEBUG stream_writer.py:1897 handle_will(SGA) DEBUG stream_writer.py:921 skip DO SGA; pending_option = True DEBUG stream_writer.py:3167 remote_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False INFO fingerprinting.py:737 new server fingerprint 759aef872114a5f7 INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 136.144.155.250 2000 136.144.155.250:8888 -------------------- **Connection Banner:** .. raw:: html .. raw:: html

136.144.155.250:8888

Encoding ~~~~~~~~ - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`759aef872114a5f7... ` *This fingerprint is shared by 1 other server.* **Options offered by server**: ``ECHO``, ``SGA`` **Options requested from client**: ``LINEMODE`` **Data source**: `759aef872114a5f7/6bc1d41ac39cb3bf.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "759aef872114a5f7", "fingerprint-data": { "offered-options": [ "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "LINEMODE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n ;;;|||||||||\r\n ;;;|||||||\r\n ;||||||| ,,,,,, __ __| |\r\n |||| ,||'' ''||, | __ \\ _ \\\r\n ,,|||||||,,, |||' ||| | | | | __/\r\n ,||'' '|||,,, ,,||' & | _| _| |_|\\___|\r\n || & '''.'' |\r\n |||, ,,,,,,,'||','||',,,,,,, ,||| __ /\r\n ,||||||||||||||| || ,|, ||||||||||||||||||| / _ \\ __ \\ _ \\ \r\n ;|||||||||| ,,|||||| ||||| '''|||||||||| / ( | | | | __/\r\n ||||| |||||||||| ||||||| | ''|||| ____\\___/ _| |_|\\___|\r\n ' || ,|||||||||| ' |||||| |||\r\n ,||''',,, ;'' ;', ,,, | |\r\n ,, |' ;| ' ; '| |' ,,\r\n ;| ' ' ;|\r\n\r\nName : who\r\nPassword : ", "banner_before_return": "\u001b[2J\r\n\u001b[1;1H\u001b[1;1H\u001b[1mDGD 1.4.1 / WOTF Kernel 0.84\u001b[0m\r\n\r\n\r\n\u001b[2J\r\n\u001b[1;1H\u001b[1m\u001b[1m\u001b[33m\u001b[0m\r\n\u001b[1m W E L C O M E T O\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m ;;;|||||||||\u001b[0m\r\n\u001b[1m ;;;|||||||\u001b[0m\r\n\u001b[1m ;||||||| ,,,,,, __ __| |\u001b[0m\r\n\u001b[1m |||| ,||'' ''||, | __ \\ _ \\\u001b[0m\r\n\u001b[1m ,,|||||||,,, |||' ||| | | | | __/\u001b[0m\r\n\u001b[1m ,||'' '|||,,, ,,||' & | _| _| |_|\\___|\u001b[0m\r\n\u001b[1m || & '''.'' |\u001b[0m\r\n\u001b[1m |||, ,,,,,,,'||','||',,,,,,, ,||| __ /\u001b[0m\r\n\u001b[1m ,||||||||||||||| || ,|, ||||||||||||||||||| / _ \\ __ \\ _ \\ \u001b[0m\r\n\u001b[1m ;|||||||||| ,,|||||| ||||| '''|||||||||| / ( | | | | __/\u001b[0m\r\n\u001b[1m ||||| |||||||||| ||||||| | ''|||| ____\\___/ _| |_|\\___|\u001b[0m\r\n\u001b[1m ' || ,|||||||||| ' |||||| |||\u001b[0m\r\n\u001b[1m ,||''',,, ;'' ;', ,,, | |\u001b[0m\r\n\u001b[1m ,, |' ;| ' ; '| |' ,,\u001b[0m\r\n\u001b[1m ;| ' ' ;|\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m (C) 1991-2008 Stool, Spork and Aidil\u001b[0m\r\n\u001b[1m of The_zone.\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m\u001b[0m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mEnter menu option or your name:\u001b[0m\r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[1m 1\u001b[0m - Introduction to Way of the Force \r\n\u001b[1m 2\u001b[0m - Login an existing character \r\n\u001b[1m w\u001b[0m - Who is online? \r\n\u001b[1m q\u001b[0m - disconnect \r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[0m\u001b[1m> \u001b[0m", "encoding": "ascii", "option_states": { "server_offered": { "ECHO": true }, "server_requested": { "LINEMODE": true } }, "scan_type": "quick", "timing": { "probe": 0.5051991939544678, "total": 5.0198023319244385 } } }, "sessions": [ { "connected": "2026-02-09T19:28:44.432093+00:00", "host": "136.144.155.250", "ip": "136.144.155.250", "port": 8888 } ] } Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=136.144.155.250 port=8888 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC WONT ECHO DEBUG stream_writer.py:2022 handle_wont(ECHO) DEBUG stream_writer.py:3167 remote_option[ECHO] = False DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:706 recv IAC DO LINEMODE DEBUG stream_writer.py:1767 handle_do(LINEMODE) DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True DEBUG stream_writer.py:947 send IAC WILL LINEMODE DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True DEBUG stream_writer.py:3167 local_option[LINEMODE] = True DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = False DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE DEBUG stream_writer.py:1274 set Linemode DEBUG stream_writer.py:1277 send IAC SB LINEMODE LINEMODE-MODE IAC SE DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True DEBUG stream_writer.py:947 send IAC DO BINARY DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True DEBUG stream_writer.py:947 send IAC DO SGA DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True DEBUG stream_writer.py:947 send IAC DO STATUS DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:947 send IAC DO CHARSET DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True DEBUG stream_writer.py:947 send IAC DO EOR DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True DEBUG stream_writer.py:947 send IAC DO GMCP DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True DEBUG stream_writer.py:947 send IAC DO MSDP DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True DEBUG stream_writer.py:947 send IAC DO MSSP DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True DEBUG stream_writer.py:947 send IAC DO MSP DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True DEBUG stream_writer.py:947 send IAC DO MXP DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True DEBUG stream_writer.py:947 send IAC DO ZMP DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:947 send IAC DO AARDWOLF DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True DEBUG stream_writer.py:947 send IAC DO ATCP DEBUG stream_writer.py:706 recv IAC WILL SGA DEBUG stream_writer.py:1897 handle_will(SGA) DEBUG stream_writer.py:921 skip DO SGA; pending_option = True DEBUG stream_writer.py:3167 remote_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False INFO fingerprinting.py:746 connection for server fingerprint 759aef872114a5f7 INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 136.144.155.250 8888