nightowlbbs.ddns.net:6400
=========================
**Connection Banner:**
.. image:: /_static/banners/banner_803687ac57b6.png
:alt: \*\*\* Premiere v6.40 (c) 1990 \*\*\* qg . .Welcome Traveller ! . <0 kt You have connected to } . . 0 . . ppz5 d$$dd$$d$. +}% . !\`d !\`d ! ppxn7 . 90!(8 !81 +}? . . ffdd$$& $the "+o?/# )9991 1 . . "fffd $ NIGHT 9!9)01 . . """""" "$. BBS . . Name .........._ Surname .........._ . Location ............... . Password ............... Enter First Name/Id Number Please Enter Last Name (\*\* To clear)
:class: ansi-banner
:width: 353px
:loading: lazy
Server URLs
-----------
.. raw:: html
**Server Location**: 🇬🇧 United Kingdom (GeoIP)
Listing
-------
- **BBS Name**: Night Owl BBS (from listing)
- **Sysop**: Brian Martin
- **Listed Location**: Glasgow , , Scotland
BBS Software
------------
**Reported**: Premiere BBS
Encoding
--------
- **Effective encoding**: ascii
- **Scanner detected**: cp437
Telnet Fingerprint
------------------
:ref:`a8a260cc4662430c `
*This fingerprint is shared by 14 other servers.*
The complete JSON record collected during the scan,
including Telnet negotiation results and
banner data.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u0014\u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\tPlease Enter Last Name (** To clear) \u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t\t\t\n \b\b\b\b\b\b\b\b\b\b\u0011",
"banner_before_return": "\f\f\f\u0011\u001e\u000b\u000b \t\r\u000b\u000b\u001bF*** Premiere v6.40 (c) 1990 ***\n\r\u0014\f\f\f\u001e\u001e \u001bG \u001bCq\u007fg\u001e\n\u001e\n \u001bB \u001bW \u001bI\u001bG.\n\r .\u001bBWelcome Traveller ! \u001bX.\u001bX\u001bX \u001bV\u001bV\u001bV<0\n\r \u001bG\u001bG \u001bB \u001b^\u001bW\u001bZ\u001bI\u001bY \u001bV\u001bWk\u007ft\n\r \u001bBYou have connected to\u001bW\u001bW\u001bZ\u001bY \u001bV \u007f\u007f}\n\r\u001bH\u001bI \u001bC. \u001bX . \u001b^\u001bW\u001bZ\u001bI \u007f\u007f\u007f0 \u001bH. \u001bX .\u001bW\u001bZ\u001bI ppz\u007f\u007f\u007f5 \u001bI \u001bSd$$dd$$d$\u001bG\u001bI.\u001bW\u001bZ\u001bI +\u007f\u007f}\u007f\u007f% . \u001bI\u001bS !`d !`d ! \u001b^\u001bW\u001bZ ppxn\u007f\u007f\u007f\u007f7\n\r .\u001bI\u001bS 90!(8 !81 \u001b^\u001bW\u001bZ\u001bI+\u007f\u007f\u007f\u007f}\u007f\u007f\u007f?\n\r . \u001bF. \u001bI \u001bSffdd$$& $\u001bBthe\u001bW\u001bZ\u001bI \"+o\u007f\u007f?/#\n\r \u001bS )9991 1 \u001bG\u001bC. \u001bI. \u001bS \u001bI \"fffd $ \u001bTN\u001bSI\u001bQG\u001bRH\u001bUT\n\r \u001bI\u001bS 9!9)01\n\r . .\u001bI\u001bS \"\"\"\"\"\" \"$\u001bG. \u001bG\u007f\u007f\u007f\u001bD\u007f \u007f \u007f\u001bF\u007f\u001bB BBS \u001bA. \u001bI \u001bG \u007f \u007f\u001bD\u007f \u007f \u007f\u001bF\u007f\u001bH\u001bG.\n\r \u001bD Name .........._ \u001bG\u007f\u007f\u007f\u001bD\u007f\u007f \u007f\u007f\u001bF\u007f\u007f\u007f\n\r\u001bFSurname .........._ \u001bI .\n\r\u001bBLocation ............... \u001bC.\n\r\u001bAPassword ...............\n\r\u001bE \u001bD\u001bD\n\u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\tEnter First Name/Id Number \u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\b\b\b\b\b\b\b\b\b\b\b\b\b\u000b\u000b\u000b\u000b\u000b \b\b\b\b\b\b\b\b\b\b\u0011",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "cp437",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5113217830657959,
"total": 10.800801038742065
}
}
},
"sessions": [
{
"connected": "2026-02-14T18:19:07.672292+00:00",
"host": "nightowlbbs.ddns.net",
"ip": "86.182.185.60",
"port": 6400
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug nightowlbbs.ddns.net 6400
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1193 Fingerprint client: host=nightowlbbs.ddns.net port=6400
ERROR client.py:1296 nightowlbbs.ddns.net:6400: [Errno 113] Connect call failed ('86.164.45.36', 6400)
.. raw:: html