199.255.220.235:6789

Connection Banner:

(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-) Welcome, friend, to Pixie's Mud, And welcome, welcome back..., To friends from ages, tree to bud, Too many to keep track... Bards and mages, druids and sages, Slugs and Dragons and more... Quest through our stages and come turn the pages, Of Pixieland's Most Ancient Lore... -- Yaliebear Welcome to PixieMUD.​........... (-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-)\*(-) PixieMud is currently running : 3.3.720. You have arrived at the borders of the sovereign realm of PixieMud, a realm of fantasy and magic. A pair of hulking guards are here checking everyone's credentials. One of the guards says: Please give us your name or ask to see the list. [list, <name> or quit] : The guard says: Sorry, I didn't catch that. The guard says: What is your character name? [list, <name> or quit] :

Server URLs

Server Location: 🇨🇦 Canada (GeoIP)

Encoding

  • Effective encoding: ascii

  • Scanner detected: cp437

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 99 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "The guard says: Sorry, I didn't catch that.\r\nThe guard says: What is your character name?\r\n\r\n[list, <name> or quit] : ",
      "banner_before_return": "(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)\r\n\r\n\r\n\t\tWelcome, friend, to Pixie's Mud,\r\n\t\tAnd welcome, welcome back...,\r\n\t\tTo friends from ages, tree to bud,\r\n\t\tToo many to keep track...\r\n\r\n\t\tBards and mages, druids and sages,\r\n\t\tSlugs and Dragons and more...\r\n\t\tQuest through our stages and come turn the pages,\r\n\t\tOf Pixieland's Most Ancient Lore...\r\n\r\n\t\t\t-- Yaliebear\r\n\r\n      Welcome to PixieMUD............\r\n\r\n(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)*(-)\r\n\r\nPixieMud is currently running : 3.3.720.\r\n\r\nYou have arrived at the borders of the sovereign realm of PixieMud, a\r\nrealm of fantasy and magic.  A pair of hulking guards are here\r\nchecking everyone's credentials.\r\n\r\nOne of the guards says: Please give us your name or ask to see the\r\nlist.\r\n\r\n[list, <name> or quit] : ",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "cp437",
      "option_states": {
        "server_offered": {
          "AARDWOLF": false,
          "ATCP": false,
          "GMCP": false,
          "MCCP3": false,
          "MSDP": false,
          "MSP": false,
          "MSSP": false,
          "MXP": false,
          "ZMP": false
        },
        "server_requested": {
          "AARDWOLF": false,
          "ATCP": false,
          "GMCP": false,
          "MCCP3": false,
          "MSDP": false,
          "MSP": false,
          "MSSP": false,
          "MXP": false,
          "ZMP": false
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5035088062286377,
        "total": 11.086678504943848
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-02T20:55:31.487459+00:00",
      "host": "199.255.220.235",
      "ip": "199.255.220.235",
      "port": 6789
    },
    {
      "connected": "2026-03-02T22:47:55.552686+00:00",
      "host": "199.255.220.235",
      "ip": "199.255.220.235",
      "port": 6789
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 199.255.220.235 6789
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=199.255.220.235 port=6789
ERROR client.py:1296 199.255.220.235:6789: [Errno 113] Connect call failed ('199.255.220.235', 6789)