147.78.240.155:513

Connection Banner:

Synchronet BBS for Linux Version 3.20 RLogin connection from: 143.198.61.53 Resolving hostname... _ ∩╗┐_ Synchronet BBS for Linux Version 3.20 Copyright 2022 Rob Swindell ┌╦═══╦┐ ┌╦╦┐ ┌╦═╗ ╦┐ ┌╦═══╦┐ ┌╦╦┐ ┌╦═══╦┐ ┌╦═══╦┐ ┌╦═╗ ╦┐ ┌╦═══╦┐ ┌═╤╦╤═┐ └╩═══╦┐ └╩╤╦╤╩┘ │║ ║ ║│ │║├╬═══╬┤ │╠══╦╩┘ │║║│ │║ ║ ║│ ├╬══│║│ └╩═══╩┘└╩┘└╩ ╚═╩┘ └╩═══╩┘ └╩╩┘ └╩ ╚═┘ └╩═══╩┘ └╩ ╚═╩┘ └╩═══╩┘╧╩╧ CLIENT CONN: RLogin ADDR: modem.xyz [143.198.61.53] TERM: 80x24 CP437 / ANSI SERVER NAME: Bumgun Club BBS ADDR: bumgun.club NODE: 1 (of 4) - Debian GNU/Linux 11 (bullseye) x86_64 TIME: Wed Apr 08 2026 12:59:55 WEST ADMN: drusalan If you are a new user to the system, type "New" now. Otherwise, enter your user name or number now. NN: Enter User Name or 'New' or 'Guest' Login:

Server URLs

Server Location: 🇳🇱 Netherlands (GeoIP)

BBS Software

Detected: Synchronet

Encoding

  • Effective encoding: cp437

  • Override: cp437 (from bbslist.txt)

  • Scanner detected: ascii

Telnet Fingerprint

fcc77c9fc888e2f2

This fingerprint is shared by 33 other servers.

Options offered by server: CHARSET

Options requested from client: CHARSET

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

Show JSON
{
  "server-probe": {
    "fingerprint": "fcc77c9fc888e2f2",
    "fingerprint-data": {
      "offered-options": [
        "CHARSET"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "CHARSET"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n\r\nNN: \r\u001b[0m\u001b[1m\u001b[36mEnter \u001b[37mUser Name\u001b[36m or '\u001b[33mNew\u001b[36m' or '\u001b[33mGuest\u001b[36m'\r\nLogin: \u001b[37m",
      "banner_before_return": "\u0000\r\nSynchronet BBS for Linux  Version 3.20\r\nRLogin connection from: 143.198.61.53\r\nResolving hostname...\r\n\r\n\u001b[s\u001b[0c\u001b[255B\u001b[255C\b_\u001b[6n\u001b[u\u001b[!_\r\udcef\udcbb\udcbf\u001b[6n\u001b[0m_\u001b[2J\u001b[H\f\r\r      Synchronet BBS for Linux  Version 3.20  Copyright 2022 Rob Swindell\r\n\r\n\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\u001b[3C\u001b[1m\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udcbb \udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\u001b[3C\u001b[1m\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udcbb \udccb\udcbf \u001b[0m\udcda\udccb\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\udcda\udccd\udcd1\u001b[1m\udccb\udcd1\udccd\udcbf\r\n\u001b[0m\u001b[36m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udccb\udcbf \u001b[0m\u001b[36m\udcc0\udcca\u001b[1m\udcd1\udccb\udcd1\udcca\udcd9 \u001b[0m\u001b[36m\udcb3\udcba \u001b[1m\udcba \udcba\udcb3 \u001b[0m\u001b[36m\udcb3\udcba\u001b[0m\u001b[6C\u001b[36m\udcc3\udcce\udccd\u001b[1m\udccd\udccd\udcce\udcb4 \u001b[0m\u001b[36m\udcb3\udccc\udccd\u001b[1m\udccd\udccb\udcca\udcd9 \u001b[0m\u001b[36m\udcb3\udcba\u001b[3C\u001b[1m\udcba\udcb3 \u001b[0m\u001b[36m\udcb3\udcba \u001b[1m\udcba \udcba\udcb3 \u001b[0m\u001b[36m\udcc3\udcce\udccd\u001b[1m\udccd\u001b[0m\u001b[6C\u001b[36m\udcb3\u001b[1m\udcba\udcb3\r\n\u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udcc0\u001b[1m\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\u001b[3C\u001b[1m\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca  \u001b[1m\udcc8\udccd\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca \u001b[1m\udcc8\udccd\udcca\udcd9 \u001b[0m\u001b[34m\udcc0\udcca\udccd\u001b[1m\udccd\udccd\udcca\udcd9\u001b[3C\u001b[0m\u001b[34m\udccf\u001b[1m\udcca\udccf\r\n\u001b[0m\r\n\u001b[1mCLIENT \u001b[0m\u001b[36mCONN: \u001b[1mRLogin\r\n\u001b[0m\u001b[1m       \u001b[0m\u001b[36mADDR: \u001b[1mmodem.xyz [143.198.61.53]\r\n\u001b[0m\u001b[1m       \u001b[0m\u001b[36mTERM: \u001b[1m80x24 CP437 / ANSI\r\n\u001b[0m\u001b[1mSERVER \u001b[0m\u001b[36mNAME: \u001b[1m\u001b[33mBumgun Club BBS\r\n\u001b[0m\u001b[1m       \u001b[0m\u001b[36mADDR: \u001b[1mbumgun.club\r\n\u001b[0m\u001b[1m       \u001b[0m\u001b[36mNODE: \u001b[1m1 \u001b[0m\u001b[36m(of \u001b[1m4\u001b[0m\u001b[36m) - \u001b[1mDebian GNU/Linux 11 (bullseye) x86_64\r\n\u001b[0m\u001b[1m       \u001b[0m\u001b[36mTIME: \u001b[1mWed Apr 08 2026 12:59:55 WEST\r\n\u001b[0m\u001b[1m       \u001b[0m\u001b[36mADMN: \u001b[1mdrusalan\r\n\r\n\u001b[34mIf you are a new user to the system, type \u001b[36m\"New\"\u001b[34m now.\r\nOtherwise, enter your user name or number now.\r\n\u001b[0m\r\nNN: \r\u001b[1m\u001b[36mEnter \u001b[37mUser Name\u001b[36m or '\u001b[33mNew\u001b[36m' or '\u001b[33mGuest\u001b[36m'\r\nLogin: \u001b[37m",
      "dsr_replies": 2,
      "dsr_requests": 2,
      "encoding": "ascii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5160291194915771,
        "total": 11.421549558639526
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-04-05T18:55:00.095339+00:00",
      "host": "147.78.240.155",
      "ip": "147.78.240.155",
      "port": 513
    },
    {
      "connected": "2026-04-08T17:00:06.381138+00:00",
      "host": "147.78.240.155",
      "ip": "147.78.240.155",
      "port": 513
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 147.78.240.155 513
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=147.78.240.155 port=513
ERROR client.py:1296 147.78.240.155:513: [Errno 111] Connect call failed ('147.78.240.155', 513)