nightowlbbs.ddns.net:6400 ========================= **Connection Banner:** .. image:: /_static/banners/banner_803687ac57b6.png :alt:  \*\*\* Premiere v6.40 (c) 1990 \*\*\*  qg . .Welcome Traveller ! . <0 kt You have connected to } . . 0 . . ppz5 d$$dd$$d$. +}% . !\`d !\`d ! ppxn7 . 90!(8 !81 +}? . . ffdd$$& $the "+o?/# )9991 1 . . "fffd $ NIGHT 9!9)01 . . "​""""" "$.    BBS .    . Name .​........._   Surname .​........._ . Location .​.............. . Password .​.............. Enter First Name/Id Number    Please Enter Last Name (\*\* To clear)  :class: ansi-banner :width: 353px :loading: lazy Server URLs ----------- .. raw:: html **Server Location**: 🇬🇧 United Kingdom (GeoIP) Listing ------- - **BBS Name**: Night Owl BBS (from listing) - **Sysop**: Brian Martin - **Listed Location**: Glasgow , , Scotland BBS Software ------------ **Reported**: Premiere BBS Encoding -------- - **Effective encoding**: ascii - **Scanner detected**: cp437 Telnet Fingerprint ------------------ :ref:`a8a260cc4662430c ` *This fingerprint is shared by 14 other servers.* The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "a8a260cc4662430c", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "BINARY", "CHARSET", "COM_PORT", "ECHO", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "SGA", "STATUS", "ZMP" ], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "\u0014\u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\tPlease Enter Last Name (** To clear) \u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t\t\t\n \b\b\b\b\b\b\b\b\b\b\u0011", "banner_before_return": "\f\f\f\u0011\u001e\u000b\u000b \t\r\u000b\u000b\u001bF*** Premiere v6.40 (c) 1990 ***\n\r\u0014\f\f\f\u001e\u001e \u001bG \u001bCq\u007fg\u001e\n\u001e\n \u001bB \u001bW \u001bI\u001bG.\n\r .\u001bBWelcome Traveller ! \u001bX.\u001bX\u001bX \u001bV\u001bV\u001bV<0\n\r \u001bG\u001bG \u001bB \u001b^\u001bW\u001bZ\u001bI\u001bY \u001bV\u001bWk\u007ft\n\r \u001bBYou have connected to\u001bW\u001bW\u001bZ\u001bY \u001bV \u007f\u007f}\n\r\u001bH\u001bI \u001bC. \u001bX . \u001b^\u001bW\u001bZ\u001bI \u007f\u007f\u007f0 \u001bH. \u001bX .\u001bW\u001bZ\u001bI ppz\u007f\u007f\u007f5 \u001bI \u001bSd$$dd$$d$\u001bG\u001bI.\u001bW\u001bZ\u001bI +\u007f\u007f}\u007f\u007f% . \u001bI\u001bS !`d !`d ! \u001b^\u001bW\u001bZ ppxn\u007f\u007f\u007f\u007f7\n\r .\u001bI\u001bS 90!(8 !81 \u001b^\u001bW\u001bZ\u001bI+\u007f\u007f\u007f\u007f}\u007f\u007f\u007f?\n\r . \u001bF. \u001bI \u001bSffdd$$& $\u001bBthe\u001bW\u001bZ\u001bI \"+o\u007f\u007f?/#\n\r \u001bS )9991 1 \u001bG\u001bC. \u001bI. \u001bS \u001bI \"fffd $ \u001bTN\u001bSI\u001bQG\u001bRH\u001bUT\n\r \u001bI\u001bS 9!9)01\n\r . .\u001bI\u001bS \"\"\"\"\"\" \"$\u001bG. \u001bG\u007f\u007f\u007f\u001bD\u007f \u007f \u007f\u001bF\u007f\u001bB BBS \u001bA. \u001bI \u001bG \u007f \u007f\u001bD\u007f \u007f \u007f\u001bF\u007f\u001bH\u001bG.\n\r \u001bD Name .........._ \u001bG\u007f\u007f\u007f\u001bD\u007f\u007f \u007f\u007f\u001bF\u007f\u007f\u007f\n\r\u001bFSurname .........._ \u001bI .\n\r\u001bBLocation ............... \u001bC.\n\r\u001bAPassword ...............\n\r\u001bE \u001bD\u001bD\n\u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\tEnter First Name/Id Number \u001e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\b\b\b\b\b\b\b\b\b\b\b\b\b\u000b\u000b\u000b\u000b\u000b \b\b\b\b\b\b\b\b\b\b\u0011", "dsr_replies": 0, "dsr_requests": 0, "encoding": "cp437", "option_states": { "server_offered": {}, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.5113217830657959, "total": 10.800801038742065 } } }, "sessions": [ { "connected": "2026-02-14T18:19:07.672292+00:00", "host": "nightowlbbs.ddns.net", "ip": "86.182.185.60", "port": 6400 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug nightowlbbs.ddns.net 6400 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=nightowlbbs.ddns.net port=6400 ERROR client.py:1296 nightowlbbs.ddns.net:6400: [Errno 113] Connect call failed ('86.164.45.36', 6400) .. raw:: html