bbs.whitewing.gr.jp:23
Connection Banner:
『WhiteWing』へようこそ! 『User ID』と『Password』を入力してください。 ゲストでログインする場合はGUESTと入力してください。 User ID = Password =
Encoding
Effective encoding: shift-jis
Override: shift-jis (from bbslist.txt)
Scanner detected: shift-jis
Telnet Fingerprint
This fingerprint is unique to this server.
Options offered by server: BINARY, ECHO
Data source: 5189113c238482e3/6d2176ac168a55f9.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "5189113c238482e3",
"fingerprint-data": {
"offered-options": [
"BINARY",
"ECHO"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nPassword =",
"banner_before_return": "\u300e\uff37\uff48\uff49\uff54\uff45\uff37\uff49\uff4e\uff47\u300f\u3078\u3088\u3046\u3053\u305d\uff01\r\n\r\n\u300eUser ID\u300f\u3068\u300ePassword\u300f\u3092\u5165\u529b\u3057\u3066\u304f\u3060\u3055\u3044\u3002\r\n\u30b2\u30b9\u30c8\u3067\u30ed\u30b0\u30a4\u30f3\u3059\u308b\u5834\u5408\u306fGUEST\u3068\u5165\u529b\u3057\u3066\u304f\u3060\u3055\u3044\u3002\r\nUser ID =",
"encoding": "shift-jis",
"option_states": {
"server_offered": {
"BINARY": true,
"ECHO": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5051605701446533,
"total": 5.533593654632568
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:26:04.812618+00:00",
"host": "bbs.whitewing.gr.jp",
"ip": "61.120.15.91",
"port": 23
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=bbs.whitewing.gr.jp port=23
INFO client_base.py:174 Connected to <Peer 61.120.15.91 23>
DEBUG stream_writer.py:706 recv IAC WILL BINARY
DEBUG stream_writer.py:722 WILL BINARY unsolicited
DEBUG stream_writer.py:1897 handle_will(BINARY)
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 remote_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:737 new server fingerprint 5189113c238482e3
INFO client_base.py:105 Connection closed to <Peer 61.120.15.91 23>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug bbs.whitewing.gr.jp 23