20.121.15.153 (phantasm.bbs.io) =============================== phantasm.bbs.io:4489 -------------------- **Connection Banner:** .. raw:: html .. raw:: html

phantasm.bbs.io:4489

Encoding ~~~~~~~~ - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`c8e0f73ac58e04af... ` *This fingerprint is shared by 13 other servers.* **Options offered by server**: ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY`` **Data source**: `c8e0f73ac58e04af/6bb1afaef012304f.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "c8e0f73ac58e04af", "fingerprint-data": { "offered-options": [ "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\r\nEnter your Name: ", "banner_before_return": "\r\n/X Native Telnet: Searching for free node...\r\n/X Native Telnet: Successful connection to node 2\r\n\r\nCONNECT 19200\r\n**EMSI_IRQ8E08\r\n\r\n\u001b[0mWelcome to Phantasm, located in The UK\r\n\r\nRunning AmiExpress 5.6.2-dev Copyright \ufffd2018-2023 Darren Coles\r\nRegistration QTX-0001. You are connected to Node 2 at 19200 baud\r\nConnection occured at Mon 09-Feb-2026 19:26:16.\r\n\r\n\u001b[0m \u001b[32m/\u001b[33m-\u001b[34m/\u001b[37m kOOL fRONTEND V1.1 bY: rEBEL/QTX \u001b[34m\\\u001b[33m-\u001b[32m\\\r\n \u001b[32m\\\u001b[33m-\u001b[34m\\ \u001b[37mdES!GN bY: nOP!/STS \u001b[34m/\u001b[33m-\u001b[32m/\r\n \u001b[35m.------------------------------------------------------------------.\r\n \u001b[35m|\u001b[34mNode\u001b[35m| \u001b[34mHandle/Username \u001b[35m| \u001b[34mLocation/Group \u001b[35m| \u001b[34mUser Ip Address \u001b[35m|\r\n \u001b[35m|----+-----------------+-----------------------+-------------------|\r\n \u001b[35m | \u001b[32m00 \u001b[35m| \u001b[37mREbEL \u001b[35m| \u001b[37m * R E T I R E D * \u001b[35m|\u001b[36m PRIVATE \u001b[35m|\r\n \u001b[35m | \u001b[32m02 \u001b[35m| \u001b[37mConnecting \u001b[35m| \u001b[37m \u001b[35m|\u001b[36m 64.227.40.173 \u001b[35m|\r\n \u001b[35m | \u001b[32m03 \u001b[35m| \u001b[37mAwaiting Call \u001b[35m| \u001b[37m \u001b[35m|\u001b[36m \u001b[35m|\r\n \u001b[35m | \u001b[32m04 \u001b[35m| \u001b[37mAwaiting Call \u001b[35m| \u001b[37m \u001b[35m|\u001b[36m \u001b[35m|\r\n \u001b[35m `----\ufffd-----------------\ufffd-----------------------\ufffd-------------------|/-|/\r\n \u001b[32mYour Telnet Login Established from Host : \u001b[37mN O T A V A I L A B L E \u001b[35m|\r\n \u001b[35m<<-----------. <<----------------------------------------------------'\r\n \u001b[35m|\u001b[32mCurrent iP of This System \u001b[32m: \u001b[37m20.121.15.153\r\n \u001b[35m`----------------------------------------------------------->>\r\n\u001b[0m\r\n\u001b[0mANSI, RIP or No graphics (A/r/n)? ", "encoding": "ascii", "option_states": { "server_offered": { "ECHO": true, "SGA": true, "STATUS": false }, "server_requested": { "BINARY": true, "LINEMODE": false, "NAWS": false, "TSPEED": false } }, "scan_type": "quick", "timing": { "probe": 0.5033543109893799, "total": 5.1630823612213135 } } }, "sessions": [ { "connected": "2026-02-09T19:26:23.727987+00:00", "host": "phantasm.bbs.io", "ip": "20.121.15.153", "port": 4489 } ] } Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=phantasm.bbs.io port=4489 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC DO BINARY DEBUG stream_writer.py:1767 handle_do(BINARY) DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True DEBUG stream_writer.py:947 send IAC WILL BINARY DEBUG stream_writer.py:3167 local_option[BINARY] = True DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False DEBUG stream_writer.py:706 recv IAC DONT NAWS DEBUG stream_writer.py:1860 handle_dont(NAWS) DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:3167 local_option[NAWS] = False DEBUG stream_writer.py:706 recv IAC WONT STATUS DEBUG stream_writer.py:2022 handle_wont(STATUS) DEBUG stream_writer.py:3167 remote_option[STATUS] = False DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False DEBUG stream_writer.py:706 recv IAC DONT TSPEED DEBUG stream_writer.py:1860 handle_dont(TSPEED) DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False DEBUG stream_writer.py:3167 local_option[TSPEED] = False DEBUG stream_writer.py:706 recv IAC DONT LINEMODE DEBUG stream_writer.py:1860 handle_dont(LINEMODE) DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False DEBUG stream_writer.py:3167 local_option[LINEMODE] = False DEBUG stream_writer.py:706 recv IAC WILL SGA DEBUG stream_writer.py:722 WILL SGA unsolicited DEBUG stream_writer.py:1897 handle_will(SGA) DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True DEBUG stream_writer.py:947 send IAC DO SGA DEBUG stream_writer.py:3167 remote_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True DEBUG stream_writer.py:947 send IAC DO BINARY DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:947 send IAC DO CHARSET DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True DEBUG stream_writer.py:947 send IAC DO EOR DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True DEBUG stream_writer.py:947 send IAC DO GMCP DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True DEBUG stream_writer.py:947 send IAC DO MSDP DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True DEBUG stream_writer.py:947 send IAC DO MSSP DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True DEBUG stream_writer.py:947 send IAC DO MSP DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True DEBUG stream_writer.py:947 send IAC DO MXP DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True DEBUG stream_writer.py:947 send IAC DO ZMP DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:947 send IAC DO AARDWOLF DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True DEBUG stream_writer.py:947 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug phantasm.bbs.io 4489 scenewall.bbs.io:4000 --------------------- **Connection Banner:** .. raw:: html .. raw:: html

scenewall.bbs.io:4000

Encoding ~~~~~~~~ - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`c8e0f73ac58e04af... ` *This fingerprint is shared by 13 other servers.* **Options offered by server**: ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY`` **Data source**: `c8e0f73ac58e04af/0a6f33791b6f1fd7.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "c8e0f73ac58e04af", "fingerprint-data": { "offered-options": [ "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\n\r\n\f\u001b[0m\u001b[36mThis is a private system for the exclusive use of our membership.\r\nIn accessing this system you agree to all terms and conditions stated herein,\r\nAll programming received is assumed within the Public Domain.\r\nNo person is to violate copyright, or other lawful rules and regulations.\r\nShould any member advise us to the contrary, we will investigate and remove\r\nmaterials not compatable with any of these rules and regulations this is the\r\nsole extent of our liability.\r\nWe reserve the right to one copy for the purposes of testing, archiving, and\r\nusage for the services we provide authors/members herein in communications.\r\nThe views expressed on this system are those of the membership.\r\nWhile every effort is made legally we can not guarantee or be held liable\r\ntherefore Material submitted is the sole responsibility of the members.\r\nWe assume no liability for content, usage, ownership, reliability, or accuracy\r\nthereof.\r\nAlso! Do not use illegal means to call this system, such as stolen credit cards\r\nor any other illegal means to call here.\r\nBy typing YES you have agreed to these terms anything else would be an act of\r\nentrapment. If you do not agree to anything above Hang up now!\r\n\u001b[34m______________________________________________________________________________\r\n\r\n\u001b[9C\u001b[33mIf you agree to these regulations.....please enter: YES\r\n\u001b[34m______________________________________________________________________________\u001b[0m\r\n\u001b[0mDo You Agree: ", "banner_before_return": "\r\n/X Native Telnet: Searching for free node...\r\n/X Native Telnet: Successful connection to node 1\r\n\r\nCONNECT 19200\r\n**EMSI_IRQ8E08\r\n\r\n\u001b[0mWelcome to CEMENT CITY, located in THE CENTRE OF THE KINGDOM\r\n\r\nRunning AmiExpress 5.6.2-dev Copyright \ufffd2018-2023 Darren Coles\r\nRegistration NONE. You are connected to Node 1 at 19200 baud\r\nConnection occured at Mon 09-Feb-2026 19:26:58.\r\n\r\nANSI, RIP or No graphics (A/r/n)? ", "encoding": "ascii", "option_states": { "server_offered": { "ECHO": true, "SGA": true, "STATUS": false }, "server_requested": { "BINARY": true, "LINEMODE": false, "NAWS": false, "TSPEED": false } }, "scan_type": "quick", "timing": { "probe": 0.5038557052612305, "total": 5.165609836578369 } } }, "sessions": [ { "connected": "2026-02-09T19:27:05.129762+00:00", "host": "scenewall.bbs.io", "ip": "20.121.15.153", "port": 4000 } ] } Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=scenewall.bbs.io port=4000 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC DO BINARY DEBUG stream_writer.py:1767 handle_do(BINARY) DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True DEBUG stream_writer.py:947 send IAC WILL BINARY DEBUG stream_writer.py:3167 local_option[BINARY] = True DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False DEBUG stream_writer.py:706 recv IAC DONT NAWS DEBUG stream_writer.py:1860 handle_dont(NAWS) DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:3167 local_option[NAWS] = False DEBUG stream_writer.py:706 recv IAC WONT STATUS DEBUG stream_writer.py:2022 handle_wont(STATUS) DEBUG stream_writer.py:3167 remote_option[STATUS] = False DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False DEBUG stream_writer.py:706 recv IAC DONT TSPEED DEBUG stream_writer.py:1860 handle_dont(TSPEED) DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False DEBUG stream_writer.py:3167 local_option[TSPEED] = False DEBUG stream_writer.py:706 recv IAC DONT LINEMODE DEBUG stream_writer.py:1860 handle_dont(LINEMODE) DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False DEBUG stream_writer.py:3167 local_option[LINEMODE] = False DEBUG stream_writer.py:706 recv IAC WILL SGA DEBUG stream_writer.py:722 WILL SGA unsolicited DEBUG stream_writer.py:1897 handle_will(SGA) DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True DEBUG stream_writer.py:947 send IAC DO SGA DEBUG stream_writer.py:3167 remote_option[SGA] = True DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True DEBUG stream_writer.py:947 send IAC DO BINARY DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:947 send IAC DO CHARSET DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True DEBUG stream_writer.py:947 send IAC DO EOR DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True DEBUG stream_writer.py:947 send IAC DO GMCP DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True DEBUG stream_writer.py:947 send IAC DO MSDP DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True DEBUG stream_writer.py:947 send IAC DO MSSP DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True DEBUG stream_writer.py:947 send IAC DO MSP DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True DEBUG stream_writer.py:947 send IAC DO MXP DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True DEBUG stream_writer.py:947 send IAC DO ZMP DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:947 send IAC DO AARDWOLF DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True DEBUG stream_writer.py:947 send IAC DO ATCP INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af INFO client_base.py:105 Connection closed to *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug scenewall.bbs.io 4000