47.185.76.199 ============= .. _ip_47_185_76_199_47_185_76_199_23: 47.185.76.199:23 ---------------- **Connection Banner:** .. image:: /_static/banners/banner_0212e12bd18a.png :alt: Synchronet BBS for Win32 Version 3.20 Telnet connection from: 135.129.91.121 Resolving hostname... _ βˆ©β•—β”_ Synchronet BBS for Win32 Version 3.20 Copyright 2025 Rob Swindell  !ERROR[x3089] checking C:\\sbbs\\text\\answer.msg The sysop has been notified. [Hit a key]               !ERROR[x3090] checking C:\\sbbs\\text\\menu\\digdist\\answer.msg The sysop has been notified. [Hit a key] :class: ansi-banner :width: 585px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) BBS Software ~~~~~~~~~~~~ **Detected**: Synchronet Encoding ~~~~~~~~ - **Effective encoding**: cp437 - **Scanner detected**: cp437 Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`cdf52165b1ba8b95 ` *This fingerprint is shared by 256 other servers.* **Options offered by server**: ``AARDWOLF``, ``ATCP``, ``ECHO``, ``GMCP``, ``MCCP2``, ``MCCP3``, ``MSDP``, ``MSP``, ``MSSP``, ``MXP``, ``SGA``, ``ZMP`` **Options requested from client**: ``NAWS``, ``NEW_ENVIRON``, ``TSPEED``, ``TTYPE`` The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "cdf52165b1ba8b95", "fingerprint-data": { "offered-options": [ "AARDWOLF", "ATCP", "ECHO", "GMCP", "MCCP2", "MCCP3", "MSDP", "MSP", "MSSP", "MXP", "SGA", "ZMP" ], "probed-protocol": "server", "refused-options": [ "BINARY", "CHARSET", "COM_PORT", "EOR", "STATUS" ], "requested-options": [ "NAWS", "NEW_ENVIRON", "TSPEED", "TTYPE" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\b \b\r\n\u0007\r\n!ERROR[x3090] checking C:\\sbbs\\text\\menu\\digdist\\answer.msg\r\n\r\nThe sysop has been notified.\r\n[Hit a key] ", "banner_before_return": "\r\nSynchronet BBS for Win32 Version 3.20\r\nTelnet connection from: 135.129.91.121\r\nResolving hostname...\r\n\r\n\u001b[s\u001b[0c\u001b[255B\u001b[255C\b_\u001b[6n\u001b[u\u001b[!_\r\u2229\u2557\u2510\u001b[6n\u001b[0m_\u001b[2J\u001b[H\f\r\r Synchronet BBS for Win32 Version 3.20 Copyright 2025 Rob Swindell\r\n\u0007\r\n!ERROR[x3089] checking C:\\sbbs\\text\\answer.msg\r\n\r\nThe sysop has been notified.\r\n[Hit a key] ", "dsr_replies": 2, "dsr_requests": 2, "encoding": "cp437", "option_states": { "server_offered": { "AARDWOLF": true, "ATCP": true, "ECHO": true, "GMCP": true, "MCCP2": true, "MCCP3": true, "MSDP": true, "MSP": true, "MSSP": true, "MXP": true, "SGA": true, "ZMP": true }, "server_requested": { "AARDWOLF": false, "ATCP": false, "GMCP": false, "MCCP2": false, "MCCP3": false, "MSDP": false, "MSP": false, "MSSP": false, "MXP": false, "NAWS": true, "NEW_ENVIRON": true, "SNDLOC": false, "TSPEED": true, "TTYPE": true, "ZMP": false } }, "scan_type": "quick", "timing": { "probe": 0.5050294399261475, "total": 15.73537564277649 } } }, "sessions": [ { "connected": "2026-03-02T20:53:21.386634+00:00", "host": "47.185.76.199", "ip": "47.185.76.199", "port": 23 }, { "connected": "2026-03-02T22:49:25.053070+00:00", "host": "47.185.76.199", "ip": "47.185.76.199", "port": 23 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug 47.185.76.199 23 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=47.185.76.199 port=23 ERROR client.py:1296 47.185.76.199:23: TCP connection to 47.185.76.199:23 timed out after 30.0s .. raw:: html
.. _ip_47_185_76_199_bbs_kn6q_org_2002: bbs.kn6q.org:2002 ----------------- **Connection Banner:** .. image:: /_static/banners/banner_1ebf68e26ff8.png :alt: Telnet connection detected. Please enter your name (ENTER for none): TradeWars Game Server Copyright (C) EIS TWGS v2.20b www.eisonline.com Server registered to Desert Rats Sanctuary Supports up to 3 games and 10 nodes Desert Rats Game Large Game - 30K Sectors, 1K turn <#> Players Online View game descriptions Quit Selection (? for menu): :class: ansi-banner :width: 610px :loading: lazy Server URLs ~~~~~~~~~~~ .. raw:: html **Server Location**: πŸ‡ΊπŸ‡Έ United States (GeoIP) Listing ~~~~~~~ - **BBS Name**: Desert Rats Sanctuary TWGS (from listing) - **Listed Location**: Azle, TX, USA BBS Software ~~~~~~~~~~~~ **Reported**: TWGS Encoding ~~~~~~~~ - **Effective encoding**: ascii - **Scanner detected**: cp437 Telnet Fingerprint ~~~~~~~~~~~~~~~~~~ :ref:`e9e1390d6941c201 ` *This fingerprint is shared by 133 other servers.* **Options offered by server**: ``BINARY``, ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY`` The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "e9e1390d6941c201", "fingerprint-data": { "offered-options": [ "BINARY", "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "CHARSET", "COM_PORT", "EOR", "GMCP", "MCCP2", "MCCP3", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\n\r\u001b[2J\u001b[H\u001b[0mTradeWars Game Server Copyright (C) EIS\n\rTWGS v2.20b www.eisonline.com\n\r\n\rServer registered to Desert Rats Sanctuary\n\rSupports up to 3 games and 10 nodes\n\r\n\r Desert Rats Game Large Game - 30K Sectors, 1K turn\n\r\n\r<#> Players Online\n\r View game descriptions\n\r\n\r Quit\n\r\r\nSelection (? for menu): ", "banner_before_return": "\u0000Telnet connection detected.\n\r\n\rPlease enter your name (ENTER for none): ", "dsr_replies": 0, "dsr_requests": 0, "encoding": "cp437", "option_states": { "server_offered": { "0x24": false, "BINARY": true, "ECHO": true, "NEW_ENVIRON": false, "SGA": true, "STATUS": false }, "server_requested": { "0x24": false, "0xf6": false, "BINARY": true, "LFLOW": false, "LINEMODE": false, "NAWS": false, "NEW_ENVIRON": false, "TSPEED": false, "TTYPE": false } }, "scan_type": "quick", "timing": { "probe": 0.507819652557373, "total": 11.284609079360962 } } }, "sessions": [ { "connected": "2026-03-07T04:13:36.024925+00:00", "host": "bbs.kn6q.org", "ip": "47.185.76.199", "port": 2002 } ] } .. raw:: html
Connection Log ~~~~~~~~~~~~~~ Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug bbs.kn6q.org 2002 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=bbs.kn6q.org port=2002 INFO client_base.py:186 Connected to DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True DEBUG stream_writer.py:1019 send IAC WILL MXP DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True DEBUG stream_writer.py:1019 send IAC WILL ATCP DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True DEBUG stream_writer.py:1019 send IAC WILL GMCP DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True DEBUG stream_writer.py:1019 send IAC WILL MSP DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True DEBUG stream_writer.py:1019 send IAC WILL MSDP DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True DEBUG stream_writer.py:1019 send IAC WILL MSSP DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True DEBUG stream_writer.py:1019 send IAC WILL ZMP DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True DEBUG stream_writer.py:1019 send IAC DO MXP DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True DEBUG stream_writer.py:1019 send IAC DO ATCP DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True DEBUG stream_writer.py:1019 send IAC DO GMCP DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True DEBUG stream_writer.py:1019 send IAC DO AARDWOLF DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True DEBUG stream_writer.py:1019 send IAC DO MSP DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True DEBUG stream_writer.py:1019 send IAC DO MSDP DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True DEBUG stream_writer.py:1019 send IAC DO MSSP DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True DEBUG stream_writer.py:1019 send IAC DO ZMP DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS DEBUG stream_writer.py:768 recv IAC DO b'\xf6' DEBUG stream_writer.py:1836 handle_do(AYT) DEBUG stream_writer.py:1944 DO AYT not supported. DEBUG stream_writer.py:3330 local_option[AYT] = False DEBUG stream_writer.py:1019 send IAC WONT AYT DEBUG stream_writer.py:768 recv IAC WILL BINARY DEBUG stream_writer.py:784 WILL BINARY unsolicited DEBUG stream_writer.py:1994 handle_will(BINARY) DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True DEBUG stream_writer.py:1019 send IAC DO BINARY DEBUG stream_writer.py:3330 remote_option[BINARY] = True DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = False DEBUG stream_writer.py:768 recv IAC DO BINARY DEBUG stream_writer.py:1836 handle_do(BINARY) DEBUG stream_writer.py:3330 pending_option[WILL + BINARY] = True DEBUG stream_writer.py:1019 send IAC WILL BINARY DEBUG stream_writer.py:3330 local_option[BINARY] = True DEBUG stream_writer.py:3330 pending_option[WILL + BINARY] = False DEBUG stream_writer.py:768 recv IAC WILL ECHO DEBUG stream_writer.py:784 WILL ECHO unsolicited DEBUG stream_writer.py:1994 handle_will(ECHO) DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True DEBUG stream_writer.py:1019 send IAC DO ECHO DEBUG stream_writer.py:3330 remote_option[ECHO] = True DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = False DEBUG stream_writer.py:768 recv IAC WILL SGA DEBUG stream_writer.py:784 WILL SGA unsolicited DEBUG stream_writer.py:1994 handle_will(SGA) DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True DEBUG stream_writer.py:1019 send IAC DO SGA DEBUG stream_writer.py:3330 remote_option[SGA] = True DEBUG stream_writer.py:3330 pending_option[DO + SGA] = False DEBUG stream_writer.py:768 recv IAC WONT STATUS DEBUG stream_writer.py:2148 handle_wont(STATUS) DEBUG stream_writer.py:3330 remote_option[STATUS] = False DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = False DEBUG stream_writer.py:768 recv IAC DONT TTYPE DEBUG stream_writer.py:1959 handle_dont(TTYPE) DEBUG stream_writer.py:3330 pending_option[WILL + TTYPE] = False DEBUG stream_writer.py:3330 local_option[TTYPE] = False DEBUG stream_writer.py:768 recv IAC DONT NAWS DEBUG stream_writer.py:1959 handle_dont(NAWS) DEBUG stream_writer.py:3330 pending_option[WILL + NAWS] = False DEBUG stream_writer.py:3330 local_option[NAWS] = False DEBUG stream_writer.py:768 recv IAC DONT TSPEED DEBUG stream_writer.py:1959 handle_dont(TSPEED) DEBUG stream_writer.py:3330 pending_option[WILL + TSPEED] = False DEBUG stream_writer.py:3330 local_option[TSPEED] = False DEBUG stream_writer.py:768 recv IAC DONT LFLOW DEBUG stream_writer.py:1959 handle_dont(LFLOW) DEBUG stream_writer.py:3330 pending_option[WILL + LFLOW] = False DEBUG stream_writer.py:3330 local_option[LFLOW] = False DEBUG stream_writer.py:768 recv IAC DONT LINEMODE DEBUG stream_writer.py:1959 handle_dont(LINEMODE) DEBUG stream_writer.py:3330 pending_option[WILL + LINEMODE] = False DEBUG stream_writer.py:3330 local_option[LINEMODE] = False DEBUG stream_writer.py:768 recv IAC WONT NEW_ENVIRON DEBUG stream_writer.py:2148 handle_wont(NEW_ENVIRON) DEBUG stream_writer.py:3330 remote_option[NEW_ENVIRON] = False DEBUG stream_writer.py:3330 pending_option[DO + NEW_ENVIRON] = False DEBUG stream_writer.py:768 recv IAC DONT NEW_ENVIRON DEBUG stream_writer.py:1959 handle_dont(NEW_ENVIRON) DEBUG stream_writer.py:3330 pending_option[WILL + NEW_ENVIRON] = False DEBUG stream_writer.py:3330 local_option[NEW_ENVIRON] = False DEBUG stream_writer.py:768 recv IAC WONT b'$' DEBUG stream_writer.py:2148 handle_wont(b'$') DEBUG stream_writer.py:3330 remote_option[b'$'] = False DEBUG stream_writer.py:3330 pending_option[DO + b'$'] = False DEBUG stream_writer.py:768 recv IAC DONT b'$' DEBUG stream_writer.py:1959 handle_dont(b'$') DEBUG stream_writer.py:3330 pending_option[WILL + b'$'] = False DEBUG stream_writer.py:3330 local_option[b'$'] = False DEBUG client_base.py:499 negotiation failed after 4.00s. DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP, WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP, DO ZMP, DO MCCP2_COMPRESS' DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True DEBUG stream_writer.py:1019 send IAC DO CHARSET DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True DEBUG stream_writer.py:1019 send IAC DO EOR DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True DEBUG stream_writer.py:993 skip DO MSP; pending_option = True DEBUG stream_writer.py:993 skip DO MXP; pending_option = True DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True INFO fingerprinting.py:755 connection for server fingerprint e9e1390d6941c201 INFO client_base.py:118 Connection closed to .. raw:: html