siliconu.com:23
===============
**Connection Banner:**
.. image:: /_static/banners/banner_f2c0736968f5.png
:alt: o NetFoss - Revision 5 FOSSIL - Com Eng v1.26b1 - (c) 2001-2022 pcmicro.com ! ProBoard v2.32 (05.31.2025) Copyright Jason Bock and element14 Technologies http://www.proboardbbs.com Registered to: Jason Bock \*\* ProBoard Anti-Bot Detection v1 \*\* Please press [ESC] to continue. ProBoard BBS Software v2.32 (05.31.2025) ── Node 2 ── Please enter your name or handle: ProBoard BBS Software v2.32 (05.31.2025) ── Node 2 ── Please enter your name or handle:
:class: ansi-banner
:width: 602px
:loading: lazy
Server URLs
-----------
.. raw:: html
**Server Location**: 🇺🇸 United States (GeoIP)
Listing
-------
- **BBS Name**: SiliconUnderground (from listing)
- **Sysop**: Massacre
- **Listed Location**: Rochester, NY, USA
BBS Software
------------
**Reported**: ProBoard
Encoding
--------
- **Effective encoding**: cp437
- **Scanner detected**: cp437
Telnet Fingerprint
------------------
:ref:`cfa317a91359cb0b `
*This fingerprint is shared by 4 other servers.*
**Options offered by server**: ``BINARY``, ``ECHO``, ``SGA``
**Options requested from client**: ``BINARY``, ``SGA``
The complete JSON record collected during the scan,
including Telnet negotiation results and
banner data.
.. raw:: html
Show JSON
.. code-block:: json
{
"server-probe": {
"fingerprint": "cfa317a91359cb0b",
"fingerprint-data": {
"offered-options": [
"BINARY",
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY",
"SGA"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\u001b[0;32mo\u001b[1m NetFoss \u001b[0;32m- Revision 5 FOSSIL - Com Eng v1.26b1 - (c) 2001-2022 pcmicro.com\u001b[37m\r\n\u0000\f\r\n\u001b[5n\u001b[!\r ProBoard v2.32 (05.31.2025) \r\n Copyright Jason Bock and element14 Technologies \r\n http://www.proboardbbs.com \r\n\r\n Registered to: Jason Bock \r\n\r\n\r\n ** ProBoard Anti-Bot Detection v1 **\r\n\r\n\r\n Please press [ESC] to continue.\rProBoard BBS Software v2.32 (05.31.2025) \u2500\u2500 Node 2 \u2500\u2500\r\n \rPlease enter your name or handle: \r\r\n\r\n\rProBoard BBS Software v2.32 (05.31.2025) \u2500\u2500 Node 2 \u2500\u2500\r\n \rPlease enter your name or handle: ",
"banner_before_return": "\b\b\b\b\b\b \b\b\b\b\b\b\r\n\u001b[6n\b\b\b \b\b\b",
"dsr_replies": 1,
"dsr_requests": 1,
"encoding": "cp437",
"option_states": {
"server_offered": {
"BINARY": true,
"ECHO": true,
"SGA": true
},
"server_requested": {
"BINARY": true,
"ECHO": false,
"SGA": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.2590973377227783,
"total": 10.012631893157959
}
}
},
"sessions": [
{
"connected": "2026-02-14T17:43:14.810239+00:00",
"host": "siliconu.com",
"ip": "24.30.241.107",
"port": 23
}
]
}
.. raw:: html
Connection Log
--------------
Debug-level log of the Telnet negotiation session,
showing each IAC (Interpret As Command) exchange
between client and server.
*Generated by* `telnetlib3-fingerprint `_
.. code-block:: shell
telnetlib3-fingerprint --loglevel=debug siliconu.com 23
.. raw:: html
Show Logfile
.. code-block:: text
DEBUG client.py:1193 Fingerprint client: host=siliconu.com port=23
ERROR client.py:1296 siliconu.com:23: [Errno 111] Connect call failed ('24.30.241.107', 23)
.. raw:: html