terrorkom-server.de:56656 ========================= **Connection Banner:** .. raw:: html .. raw:: html

terrorkom-server.de:56656

Encoding -------- - **Effective encoding**: cp437 - **Scanner detected**: ascii Telnet Fingerprint ------------------ :ref:`c2dd7d4e76383b41... ` *This fingerprint is shared by 46 other servers.* **Data source**: `c2dd7d4e76383b41/a0039c99e46a405a.json `_ The complete JSON record collected during the scan, including Telnet negotiation results and banner data. .. code-block:: json { "server-probe": { "fingerprint": "c2dd7d4e76383b41", "fingerprint-data": { "offered-options": [], "probed-protocol": "server", "refused-options": [], "requested-options": [], "scan-type": "quick" }, "session_data": { "banner_after_return": "You don't have access.\n", "banner_before_return": "\r\n\r\nTerrorb0t (Eggdrop v1.10.1 (C) 1997 Robey Pointer (C) 1999-2025 Eggheads Development Team)\r\n\r\nBitte gib Deinen Nickname ein:\r\n", "encoding": "ascii", "option_states": { "server_offered": { "STATUS": true }, "server_requested": {} }, "scan_type": "quick", "timing": { "probe": 0.0, "total": 2.5614206790924072 } } }, "sessions": [ { "connected": "2026-02-09T19:31:55.432729+00:00", "host": "terrorkom-server.de", "ip": "5.181.49.42", "port": 56656 } ] } Connection Log -------------- Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server. .. code-block:: text DEBUG client.py:863 Fingerprint client: host=terrorkom-server.de port=56656 INFO client_base.py:174 Connected to DEBUG stream_writer.py:706 recv IAC WILL STATUS DEBUG stream_writer.py:722 WILL STATUS unsolicited DEBUG stream_writer.py:1897 handle_will(STATUS) DEBUG stream_writer.py:3167 remote_option[STATUS] = True DEBUG stream_writer.py:1038 send IAC SB STATUS SEND IAC SE DEBUG stream_writer.py:3167 pending_option[SB + STATUS] = True DEBUG client_base.py:463 negotiation failed after 4.00s. DEBUG client_base.py:470 failed-reply: 'SB STATUS' DEBUG client_base.py:88 EOF from server, closing. INFO client_base.py:105 Connection closed to INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41 *Generated by* `telnetlib3-fingerprint `_ .. code-block:: shell telnetlib3-fingerprint --loglevel=debug terrorkom-server.de 56656