45.72.180.214:23

Connection Banner:

45.72.180.214:23

Encoding

  • Effective encoding: cp437

  • Scanner detected: ascii

Telnet Fingerprint

72c0c1b074a0910f…

This fingerprint is unique to this server.

Options requested from client: BINARY, LINEMODE, NAWS, TSPEED

Data source: 72c0c1b074a0910f/cc1bc8dd2f6cd302.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "72c0c1b074a0910f",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [
        "BINARY",
        "LINEMODE",
        "NAWS",
        "TSPEED"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n [press <!> to continue]\r\n\r\n [you really need to press <!> to continue]\r\n",
      "banner_before_return": "\r\ntelnetd.device:  Waiting for unit to answer.\r\ntelnetd.device:  Connected to TCP/IP port 2323 unit 1.\r\n\u0007\r\n\f\f\r\r\n                                                 !you have reached!\r\r\n        ____._______.__  ___________________________________________\r\r\n        \\_  |  __   |  \\/  _______  _    / _____   _   \\_   _    _  \\\r\r\n        / __|   \\   !   \\____   \\    \\__/  ._)__  _/  _/    |  __|   \\\r\r\n       /  \\___   \\____   \\  \\    \\    \\    !    \\ \\    \\_   a  \\___   \\\r\r\n       \\____|     \\______/_______/____/_________/__\\    /___:____|     \\dZG\r\r\n            l_____/                                 \\  /    .    l_____/\r\r\n                    !hysteria bbs!                   \\/\r\r\n",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": true,
          "SGA": true,
          "STATUS": true
        },
        "server_requested": {
          "BINARY": true,
          "LINEMODE": true,
          "NAWS": true,
          "TSPEED": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 3.3613314628601074
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:30:46.318667+00:00",
      "host": "45.72.180.214",
      "ip": "45.72.180.214",
      "port": 23
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=45.72.180.214 port=23
INFO client_base.py:174 Connected to <Peer 45.72.180.214 23>
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:706 recv IAC WILL STATUS
DEBUG stream_writer.py:722 WILL STATUS unsolicited
DEBUG stream_writer.py:1897 handle_will(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = True
DEBUG stream_writer.py:1038 send IAC SB STATUS SEND IAC SE
DEBUG stream_writer.py:3167 pending_option[SB + STATUS] = True
DEBUG stream_writer.py:706 recv IAC DO TSPEED
DEBUG stream_writer.py:1767 handle_do(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = True
DEBUG stream_writer.py:947 send IAC WILL TSPEED
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = True
DEBUG stream_writer.py:3167 local_option[TSPEED] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB TSPEED
DEBUG stream_writer.py:685 sub-negotiation cmd TSPEED SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = False
DEBUG stream_writer.py:2166 recv TSPEED SEND: b''
DEBUG stream_writer.py:2197 send: IAC SB TSPEED IS b'38400',b'38400' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB STATUS, SB LINEMODE'
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 45.72.180.214 23>
INFO fingerprinting.py:737 new server fingerprint 72c0c1b074a0910f

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 45.72.180.214 23