dl2.net:4000

Connection Banner:

dl2.net:4000

Encoding

  • Effective encoding: cp437

  • Scanner detected: ascii

Telnet Fingerprint

6006bc87712f9c64…

This fingerprint is unique to this server.

Options requested from client: ECHO, NAWS

Data source: 6006bc87712f9c64/c84a3dfb8cf655fa.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "6006bc87712f9c64",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [],
      "requested-options": [
        "ECHO",
        "NAWS"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "",
      "banner_before_return": "\r\n\u001b[0m\u001b[H\u001b[J\r\n\r\n\r\n\r\n\r\n\r\n\r\nDistant Lands (Version 2.6.70) Awakening 1\r\nType 'new' to create a new account.\r\n\r\nLogin: ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": false,
          "SGA": false
        },
        "server_requested": {
          "ECHO": true,
          "NAWS": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.0,
        "total": 2.6088874340057373
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:33:40.832912+00:00",
      "host": "dl2.net",
      "ip": "149.154.42.83",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=dl2.net port=4000
INFO client_base.py:174 Connected to <Peer 149.154.42.83 4000>
DEBUG stream_writer.py:706 recv IAC WONT SGA
DEBUG stream_writer.py:2022 handle_wont(SGA)
DEBUG stream_writer.py:3167 remote_option[SGA] = False
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:2062 [SB + LINEMODE] unsolicited
DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x03' IAC SE
WARNING stream_writer.py:2551 ignoring LINEMODE-MODE b'\x03': LINEMODE not negotiated
DEBUG stream_writer.py:706 recv IAC WONT ECHO
DEBUG stream_writer.py:2022 handle_wont(ECHO)
DEBUG stream_writer.py:3167 remote_option[ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC DO ECHO
DEBUG stream_writer.py:1767 handle_do(ECHO)
DEBUG stream_writer.py:3167 local_option[ECHO] = False
DEBUG stream_writer.py:947 send IAC WONT ECHO
DEBUG stream_writer.py:3167 local_option[ECHO] = True
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 149.154.42.83 4000>
INFO fingerprinting.py:737 new server fingerprint 6006bc87712f9c64

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug dl2.net 4000