siliconu.com:23 =============== **Connection Banner:** .. image:: /_static/banners/banner_f2c0736968f5.png :alt:     o NetFoss - Revision 5 FOSSIL - Com Eng v1.26b1 - (c) 2001-2022 pcmicro.com ! ProBoard v2.32 (05.31.2025) Copyright Jason Bock and element14 Technologies http://www.proboardbbs.com Registered to: Jason Bock \*\* ProBoard Anti-Bot Detection v1 \*\* Please press [ESC] to continue. ProBoard BBS Software v2.32 (05.31.2025) ── Node 2 ── Please enter your name or handle: ProBoard BBS Software v2.32 (05.31.2025) ── Node 2 ── Please enter your name or handle: :class: ansi-banner :width: 602px :loading: lazy Server URLs ----------- .. raw:: html **Server Location**: 🇺🇸 United States (GeoIP) Listing ------- - **BBS Name**: SiliconUnderground (from listing) - **Sysop**: Massacre - **Listed Location**: Rochester, NY, USA BBS Software ------------ **Reported**: ProBoard Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: cp437 Telnet Fingerprint ------------------ :ref:`cfa317a91359cb0b ` *This fingerprint is shared by 4 other servers.* **Options offered by server**: ``BINARY``, ``ECHO``, ``SGA`` **Options requested from client**: ``BINARY``, ``SGA`` The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. raw:: html
Show JSON .. code-block:: json { "server-probe": { "fingerprint": "cfa317a91359cb0b", "fingerprint-data": { "offered-options": [ "BINARY", "ECHO", "SGA" ], "probed-protocol": "server", "refused-options": [ "AARDWOLF", "ATCP", "CHARSET", "COM_PORT", "EOR", "GMCP", "MSDP", "MSP", "MSSP", "MXP", "STATUS", "ZMP" ], "requested-options": [ "BINARY", "SGA" ], "scan-type": "quick" }, "session_data": { "banner_after_return": "\r\u001b[0;32mo\u001b[1m NetFoss \u001b[0;32m- Revision 5 FOSSIL - Com Eng v1.26b1 - (c) 2001-2022 pcmicro.com\u001b[37m\r\n\u0000\f\r\n\u001b[5n\u001b[!\r ProBoard v2.32 (05.31.2025) \r\n Copyright Jason Bock and element14 Technologies \r\n http://www.proboardbbs.com \r\n\r\n Registered to: Jason Bock \r\n\r\n\r\n ** ProBoard Anti-Bot Detection v1 **\r\n\r\n\r\n Please press [ESC] to continue.\rProBoard BBS Software v2.32 (05.31.2025) \u2500\u2500 Node 2 \u2500\u2500\r\n \rPlease enter your name or handle: \r\r\n\r\n\rProBoard BBS Software v2.32 (05.31.2025) \u2500\u2500 Node 2 \u2500\u2500\r\n \rPlease enter your name or handle: ", "banner_before_return": "\b\b\b\b\b\b \b\b\b\b\b\b\r\n\u001b[6n\b\b\b \b\b\b", "dsr_replies": 1, "dsr_requests": 1, "encoding": "cp437", "option_states": { "server_offered": { "BINARY": true, "ECHO": true, "SGA": true }, "server_requested": { "BINARY": true, "ECHO": false, "SGA": true } }, "scan_type": "quick", "timing": { "probe": 0.2590973377227783, "total": 10.012631893157959 } } }, "sessions": [ { "connected": "2026-02-14T17:43:14.810239+00:00", "host": "siliconu.com", "ip": "24.30.241.107", "port": 23 } ] } .. raw:: html
Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug siliconu.com 23 .. raw:: html
Show Logfile .. code-block:: text DEBUG client.py:1193 Fingerprint client: host=siliconu.com port=23 ERROR client.py:1296 siliconu.com:23: [Errno 111] Connect call failed ('24.30.241.107', 23) .. raw:: html