crackintimebbs.ddns.net:2323

Connection Banner:

Synchronet BBS for Win32 Version 3.10 Connection from: 64.227.40.173 Resolving hostname... __?HTML?_ Synchronet BBS for Win32 Version 3.10 Copyright 2003 Rob Swindell CLIENT >>>>CONN: Telnet >>>>ADDR: 1984.ws [64.227.40.173] SERVER >>>>NAME: The Crack in Time BBS >>>>ADDR: crackintimebbs.ddns.net >>>>NODE: 1 (of 4) >>>>DATE: 03/06/26 >>>>TIME: 11:20 pm >>>>ADMN: The Punisher If you are a new user to the system, type "New" now. Otherwise, enter your user name or number now. Enter Name, Number, 'New', or 'Guest' NN:

Server URLs

Server Location: πŸ‡ΊπŸ‡Έ United States (GeoIP)

Listing

  • BBS Name: Crack In Time BBS (from listing)

  • Listed Location: Ridgewood, NJ, USA

BBS Software

Detected: Synchronet

Encoding

  • Effective encoding: ascii

  • Scanner detected: cp437

Telnet Fingerprint

4305c7e02be02e5d

This fingerprint is shared by 29 other servers.

Options offered by server: ECHO, SGA

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

Show JSON
{
  "server-probe": {
    "fingerprint": "4305c7e02be02e5d",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "SGA"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n\r\nEnter Name, Number, '\u001b[1mNew\u001b[0m', or '\u001b[1mGuest\u001b[0m'\r\nNN: ",
      "banner_before_return": "\r\nSynchronet BBS for Win32  Version 3.10\r\nConnection from: 64.227.40.173\r\nResolving hostname...\r\n\r\n\u001b[s\u001b[99B_\u001b[6n\u001b[u\u001b[!_\u001b[0t_\u0002\u0002?HTML?\u001b[0m_\u001b[2J\u001b[H\f\r      Synchronet BBS for Win32  Version 3.10  Copyright 2003 Rob Swindell\r\n\r\n\u001b[1mCLIENT >>>>\b\b\b\b\u001b[0m\u001b[36mCONN: \u001b[1mTelnet\r\n\u001b[0m\u001b[1m       >>>>\b\b\b\b\u001b[0m\u001b[36mADDR: \u001b[1m1984.ws [64.227.40.173]\r\n\u001b[0m\u001b[1mSERVER >>>>\b\b\b\b\u001b[0m\u001b[36mNAME: \u001b[1m\u001b[33mThe Crack in Time BBS\r\n\u001b[0m\u001b[1m       >>>>\b\b\b\b\u001b[0m\u001b[36mADDR: \u001b[1mcrackintimebbs.ddns.net\r\n\u001b[0m\u001b[1m       >>>>\b\b\b\b\u001b[0m\u001b[36mNODE: \u001b[1m1 \u001b[0m\u001b[36m(of \u001b[1m4\u001b[0m\u001b[36m)\r\n\u001b[0m\u001b[1m       >>>>\b\b\b\b\u001b[0m\u001b[36mDATE: \u001b[1m03/06/26\r\n\u001b[0m\u001b[1m       >>>>\b\b\b\b\u001b[0m\u001b[36mTIME: \u001b[1m11:20 pm\r\n\u001b[0m\u001b[1m       >>>>\b\b\b\b\u001b[0m\u001b[36mADMN: \u001b[1mThe Punisher\r\n\r\n\u001b[34mIf you are a new user to the system, type \u001b[36m\"New\"\u001b[34m now.\r\nOtherwise, enter your user name or number now.\r\n\u001b[33m\u001b[0m\r\nEnter Name, Number, '\u001b[1mNew\u001b[0m', or '\u001b[1mGuest\u001b[0m'\r\nNN: ",
      "dsr_replies": 1,
      "dsr_requests": 1,
      "encoding": "cp437",
      "option_states": {
        "server_offered": {
          "ECHO": true,
          "SGA": true
        },
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5048925876617432,
        "total": 13.070318698883057
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:21:05.385302+00:00",
      "host": "crackintimebbs.ddns.net",
      "ip": "68.195.140.207",
      "port": 2323
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug crackintimebbs.ddns.net 2323
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=crackintimebbs.ddns.net port=2323
INFO client_base.py:186 Connected to <Peer 68.195.140.207 2323>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
    WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
    DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:768 recv IAC WILL ECHO
DEBUG stream_writer.py:784 WILL ECHO unsolicited
DEBUG stream_writer.py:1994 handle_will(ECHO)
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 remote_option[ECHO] = True
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:768 recv IAC WILL SGA
DEBUG stream_writer.py:784 WILL SGA unsolicited
DEBUG stream_writer.py:1994 handle_will(SGA)
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 remote_option[SGA] = True
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = False
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint 4305c7e02be02e5d
INFO client_base.py:118 Connection closed to <Peer 68.195.140.207 2323>