shsbbs.net:23
=============
**Connection Banner:**
.. raw:: html
|o Net2BBS - Resolving your IP Address... 64.227.40.173
[![![![![!
You will be blocked...
.. raw:: html
shsbbs.net:23
Encoding
--------
- **Effective encoding**: cp437
- **Scanner detected**: ascii
Telnet Fingerprint
------------------
:ref:`c2dd7d4e76383b41... `
*This fingerprint is shared by 46 other servers.*
**Data source**: `c2dd7d4e76383b41/284d445786f374ad.json `_
The complete JSON record collected during the scan,
including Telnet negotiation results and banner data.
.. code-block:: json
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "|\u001b[2J\u001b[0;32mo \u001b[1mNet2BBS \u001b[0;32m- \u001b[1;37mRe\u001b[32mso\u001b[0;32mlving your IP Add\u001b[1mre\u001b[37mss\u001b[0;32m...\u001b[1;37m 64.227.40.173\n\r\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\u001b[!\u001b[6n\f\f\r\nYou will be blocked...\r\n",
"encoding": "ascii",
"option_states": {
"server_offered": {
"BINARY": true,
"ECHO": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.767884016036987
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:34:26.534854+00:00",
"host": "shsbbs.net",
"ip": "174.27.153.85",
"port": 23
}
]
}
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
.. code-block:: text
DEBUG client.py:863 Fingerprint client: host=shsbbs.net port=23
INFO client_base.py:174 Connected to
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL BINARY
DEBUG stream_writer.py:722 WILL BINARY unsolicited
DEBUG stream_writer.py:1897 handle_will(BINARY)
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 remote_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:706 recv IAC WILL BINARY
DEBUG stream_writer.py:722 WILL BINARY unsolicited
DEBUG stream_writer.py:1897 handle_will(BINARY)
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug shsbbs.net 23