199.255.220.235:6789
Connection Banner:
Server URLs
Server Location: 🇨🇦 Canada (GeoIP)
Encoding
Effective encoding: ascii
Scanner detected: cp437
Telnet Fingerprint
This fingerprint is shared by 99 other servers.
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
Show JSON
{
"server-probe": {
"fingerprint": "e89ffa4fe5c32389",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "The guard says: Sorry, I didn't catch that.\r\nThe guard says: What is your character name?\r\n\r\n[list, <name> or quit] : ",
"banner_before_return": "(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)\r\n\r\n\r\n\t\tWelcome, friend, to Pixie's Mud,\r\n\t\tAnd welcome, welcome back...,\r\n\t\tTo friends from ages, tree to bud,\r\n\t\tToo many to keep track...\r\n\r\n\t\tBards and mages, druids and sages,\r\n\t\tSlugs and Dragons and more...\r\n\t\tQuest through our stages and come turn the pages,\r\n\t\tOf Pixieland's Most Ancient Lore...\r\n\r\n\t\t\t-- Yaliebear\r\n\r\n Welcome to PixieMUD............\r\n\r\n(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)\r\n\r\nPixieMud is currently running : 3.3.720.\r\n\r\nYou have arrived at the borders of the sovereign realm of PixieMud, a\r\nrealm of fantasy and magic. A pair of hulking guards are here\r\nchecking everyone's credentials.\r\n\r\nOne of the guards says: Please give us your name or ask to see the\r\nlist.\r\n\r\n[list, <name> or quit] : ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "cp437",
"option_states": {
"server_offered": {
"AARDWOLF": false,
"ATCP": false,
"GMCP": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"ZMP": false
},
"server_requested": {
"AARDWOLF": false,
"ATCP": false,
"GMCP": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"ZMP": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5035088062286377,
"total": 11.086678504943848
}
}
},
"sessions": [
{
"connected": "2026-03-02T20:55:31.487459+00:00",
"host": "199.255.220.235",
"ip": "199.255.220.235",
"port": 6789
},
{
"connected": "2026-03-02T22:47:55.552686+00:00",
"host": "199.255.220.235",
"ip": "199.255.220.235",
"port": 6789
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 199.255.220.235 6789
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=199.255.220.235 port=6789
ERROR client.py:1296 199.255.220.235:6789: [Errno 113] Connect call failed ('199.255.220.235', 6789)