shsbbs.net:23 ============= **Connection Banner:** .. raw:: html .. raw:: html

shsbbs.net:23

Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ------------------ :ref:`c2dd7d4e76383b41... ` *This fingerprint is shared by 46 other servers.* **Data source**: `c2dd7d4e76383b41/284d445786f374ad.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "", "banner_before_return": "|\u001b[2J\u001b[0;32mo \u001b[1mNet2BBS \u001b[0;32m- \u001b[1;37mRe\u001b[32mso\u001b[0;32mlving your IP Add\u001b[1mre\u001b[37mss\u001b[0;32m...\u001b[1;37m 64.227.40.173\n\r\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\r\nYou will be blocked...\r\n", "encoding": "ascii", "option_states": { "server_offered": { "BINARY": true, "ECHO": true }, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 5.767884016036987 } } }, "sessions": [ { "connected": "2026-02-09T19:34:26.534854+00:00", "host": "shsbbs.net", "ip": "174.27.153.85", "port": 23 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=shsbbs.net port=23 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True DEBUG stream_writer.py:947 send IAC DO ECHO DEBUG stream_writer.py:3167 remote_option[ECHO] = True DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False DEBUG stream_writer.py:706 recv IAC WILL BINARY DEBUG stream_writer.py:722 WILL BINARY unsolicited DEBUG stream_writer.py:1897 handle_will(BINARY) DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True DEBUG stream_writer.py:947 send IAC DO BINARY DEBUG stream_writer.py:3167 remote_option[BINARY] = True DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = False DEBUG stream_writer.py:706 recv IAC WILL ECHO DEBUG stream_writer.py:722 WILL ECHO unsolicited DEBUG stream_writer.py:1897 handle_will(ECHO) DEBUG stream_writer.py:706 recv IAC WILL BINARY DEBUG stream_writer.py:722 WILL BINARY unsolicited DEBUG stream_writer.py:1897 handle_will(BINARY) DEBUG client_base.py:460 negotiation complete after 2.00s. DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug shsbbs.net 23