50.214.28.50:8888ο
Connection Banner:
Server URLsο
- Telnet: 50.214.28.50:8888
- Website: http://www.furryfaire.org
Server Location: πΊπΈ United States (GeoIP)
Encodingο
Effective encoding: cp437
Override: cp437 (from bbslist.txt)
Scanner detected: cp437
Telnet Fingerprintο
This fingerprint is unique to this server.
Options offered by server: MCCP2, MSSP
Options requested from client: CHARSET, NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
Show JSON
{
"server-probe": {
"fingerprint": "4e3f6280260df409",
"fingerprint-data": {
"offered-options": [
"MCCP2",
"MSSP"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MCCP3",
"MSDP",
"MSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [
"CHARSET",
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": " \r\n* connect user pass\r\n logs in\r\n \r\n* connect guest guest\r\n logs in as a guest\r\n \r\n* request <user> <email> <your name>\r\n requests a character\r\n \r\n* ch user pass\r\n logs in hidden, if you are a wizard\r\n \r\n* HELP\r\n Shows the help screen\r\n \r\n* WHO\r\n Shows who's online\r\n \r\n* QUIT\r\n Disconnects\r\n \r\n\r\n",
"banner_before_return": "\nWelcome to\r\n _____ _____ _\r\n | ___| _ _ __ _ __ _ _| ___|_ _(_)_ __ ___\r\n | |_ | | | | '__| '__| | | | |_ / _` | | '__/ _ \\\r\n | _|| |_| | | | | | |_| | _| (_| | | | | __/\r\n |_| \\__,_|_| |_| \\__, |_| \\__,_|_|_| \\___|\r\n |___/\r\n http://www.furryfaire.org\r\n \r\nFurryFaire is a 100% Anthropomorphic, Fantasy-Medieval Roleplaying MUCK.\r\nFurryFaire is Copyrighted 2005 by FurryFaire and its admins.\r\nAll other content within retains copyrights of respective authors.\r\n \r\n-> Existing players: to connect, type 'connect [name] [password]'.\r\n-> Guests: please type 'connect guest guest'.\r\n-> To request a new character, type '@request' AFTER you log in.\r\n-> After logging in: use the 'wizzes' command to see what wizards are online.\r\n \r\nAll users of FurryFaire are bound by our AUP. Type 'news aup' to read the AUP.\r\n0 players on right now. Log on and become another one!\r\n",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "cp437",
"mssp": {
"ANSI": "1",
"CODEBASE": "ProtoMUCK",
"FAMILY": "MUCK",
"MCCP": "1",
"NAME": "Furryfaire",
"PLAYERS": "0",
"UPTIME": "1771222001"
},
"option_states": {
"server_offered": {
"AARDWOLF": false,
"ATCP": false,
"GMCP": false,
"MCCP2": true,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": true,
"MXP": false,
"ZMP": false
},
"server_requested": {
"AARDWOLF": false,
"ATCP": false,
"CHARSET": true,
"GMCP": false,
"MCCP2": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MXP": false,
"NAWS": true,
"TTYPE": true,
"ZMP": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.25405263900756836,
"total": 11.01890230178833
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:21:15.122094+00:00",
"host": "50.214.28.50",
"ip": "50.214.28.50",
"port": 8888
}
]
}
Connection Logο
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 50.214.28.50 8888
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=50.214.28.50 port=8888
ERROR client.py:1318 50.214.28.50:8888: [Errno 111] Connect call failed ('50.214.28.50', 8888)