67.190.218.57:2323
Connection Banner:
Server URLs
- Telnet: 67.190.218.57:2323
- FTP: ftp://67.190.218.57
- NNTP: nntp://67.190.218.57
- Website: http://67.190.218.57
Server Location: 🇺🇸 United States (GeoIP)
BBS Software
Detected: Wildcat!
Encoding
Effective encoding: cp437
Override: cp437 (from bbslist.txt)
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 142 other servers.
Options offered by server: BINARY, ECHO, SGA
Options requested from client: BINARY
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
Show JSON
{
"server-probe": {
"fingerprint": "e9e1390d6941c201",
"fingerprint-data": {
"offered-options": [
"BINARY",
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MCCP2",
"MCCP3",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u001b[0;1;40;37m",
"banner_before_return": "\f\u001b[0m\u001b[H\u001b[2J\r<WC250003-1590112693136E294823>\rWildcat! Interactive Net Server (c) 1998-2025 Santronics Software, Inc.\r\nRegistration number: 03-1590 v10.0.500.1 (Oct 16 2025) Node: 1\r\n\u001b[6n\r \r\nConnected with Telnet. Ansi detected.\r\n\r\n \u001b[0;1;40;36m\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\r\n \u001b[0;1;40;33mYou have connected to node 1 on \u001b[0;1;40;37mCrappiecracker Online\r\n\r\n \u001b[0;1;40;33m This system is operating on \u001b[0;1;40;37mWildcat! v10.0\r\n\r\n \u001b[0;1;40;33m Please make use of your real name on this BBS\r\n \u001b[0;1;40;36m\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\udcc4\r\n\r\n\r\n\r\n\u001b[0;1;40;33mWhat is your first name? ",
"dsr_replies": 1,
"dsr_requests": 1,
"encoding": "ascii",
"option_states": {
"server_offered": {
"AARDWOLF": false,
"ATCP": false,
"BINARY": true,
"ECHO": true,
"GMCP": false,
"MCCP2": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"SGA": true,
"ZMP": false
},
"server_requested": {
"AARDWOLF": false,
"ATCP": false,
"BINARY": true,
"GMCP": false,
"MCCP2": false,
"MCCP3": false,
"MSDP": false,
"MSP": false,
"MSSP": false,
"MXP": false,
"ZMP": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.10200285911560059,
"total": 12.490842580795288
}
}
},
"sessions": [
{
"connected": "2026-03-07T04:18:40.169725+00:00",
"host": "67.190.218.57",
"ip": "67.190.218.57",
"port": 2323
},
{
"connected": "2026-04-05T19:33:06.444468+00:00",
"host": "67.190.218.57",
"ip": "67.190.218.57",
"port": 2323
},
{
"connected": "2026-04-07T06:18:00.826471+00:00",
"host": "67.190.218.57",
"ip": "67.190.218.57",
"port": 2323
},
{
"connected": "2026-04-08T17:03:18.774841+00:00",
"host": "67.190.218.57",
"ip": "67.190.218.57",
"port": 2323
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 67.190.218.57 2323
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=67.190.218.57 port=2323
ERROR client.py:1296 67.190.218.57:2323: [Errno 113] Connect call failed ('67.190.218.57', 2323)