bbs.hackishack.online:6401
Connection Banner:
ATA YOU'RE IN!: MON FEB 9, 1996 1:31 PM C-NET 64 DEVELOPERS SYSTEM-2 VERSION 2.5 SYSTEM: HACKI SHACK CALLS: 59 PRESS BACKSPACE/DELETE:
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/91fa106551269157.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\nYOU'RE IN!: MON FEB 9, 1996 1:31 PM\r\n\r\nC-NET 64 DEVELOPERS SYSTEM-2\r\nVERSION 2.5\r\n\r\n\r\n\r\nSYSTEM: HACKI SHACK\r\n CALLS: 59\u0007\r\n\r\n\r\n\r\n\r\nPRESS BACKSPACE/DELETE:\u0007",
"banner_before_return": "ATA\r\n\f\r\n\r\n",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5042061805725098,
"total": 8.148518085479736
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:31:59.714085+00:00",
"host": "bbs.hackishack.online",
"ip": "73.51.149.33",
"port": 6401
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=bbs.hackishack.online port=6401
INFO client_base.py:174 Connected to <Peer 73.51.149.33 6401>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 73.51.149.33 6401>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bbs.hackishack.online 6401