114.32.122.32:4002

Connection Banner:

114.32.122.32:4002

Encoding

  • Effective encoding: big5

  • Override: big5 (from bbslist.txt)

  • Scanner detected: big5

Telnet Fingerprint

6e6641437dab4b1b…

This fingerprint is shared by 7 other servers.

Options requested from client: NAWS, TTYPE

Data source: 6e6641437dab4b1b/a58ac306aeaf1457.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "6e6641437dab4b1b",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "NAWS",
        "TTYPE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\r\n\r\n                            \u001b[1;33m\u842c  \u738b  \u4e4b  \u738b\u001b[2;37;0m\r\n\r\n                       \u001b[1;33m\uff2b\u001b[2;37;0m I N G  OF  \u001b[1;33m\uff2b\u001b[2;37;0m I N G S\u001b[2;37;0m\r\n\u3000\r\n                          - MudOS v22pre11 -\r\n\r\n                       <\u5efa\u7acb\u67b6\u69cb Nov 15, 1996>\r\n\r\n      \u001b[1;35m\u672c Mud \u4e3b\u6a5f\u7531\u83ef\u5f69\u8edf\u9ad4\u516c\u53f8\u8207\u767e\u9918\u4f4d\u71b1\u5fc3\u73a9\u5bb6\u5171\u540c\u8d0a\u52a9\uff0c\u7279\u6b64\u611f\u8b1d !!\u001b[2;37;0m\r\n\r\n\t  \u001b[1;32m\u672c Mud \u627f\u8499\u6e05\u83ef\u5927\u5b78\u8cc7\u5de5\u7cfb\u91d1\u4ef2\u9054\u6559\u6388\u6307\u5c0e\uff0c\u7279\u6b64\u611f\u8b1d !!\u001b[2;37;0m\r\n\r\n\u9019\u5834\u5f81\u6230\u5df2\u7d93\u6301\u7e8c\u4e86 13 \u5c0f\u6642 58 \u5206 56 \u79d2\r\n\r\n\u76ee\u524d\u7dda\u4e0a\u5171\u6709 433 \u4f4d\u82f1\u96c4\u8c6a\u5091\u3002\r\n\r\n\u60a8\u7684\u82f1\u6587\u540d\u5b57(\u65b0\u4eba\u7269\u8acb\u8f38\u5165'new') : ",
      "encoding": "big5",
      "option_states": {
        "server_offered": {},
        "server_requested": {
          "NAWS": true,
          "TTYPE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5057005882263184,
        "total": 5.012822389602661
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:31:12.484160+00:00",
      "host": "114.32.122.32",
      "ip": "114.32.122.32",
      "port": 4002
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=114.32.122.32 port=4002
INFO client_base.py:174 Connected to <Peer 114.32.122.32 4002>
DEBUG stream_writer.py:706 recv IAC DO TTYPE
DEBUG stream_writer.py:1767 handle_do(TTYPE)
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:947 send IAC WILL TTYPE
DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3167 local_option[TTYPE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB TTYPE'
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint 6e6641437dab4b1b
INFO client_base.py:105 Connection closed to <Peer 114.32.122.32 4002>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 114.32.122.32 4002