104.173.38.226 (borderlinebbs.dyndns.org)

borderlinebbs.dyndns.org:6400

Connection Banner:

borderline bbs -- press return/enter to continue connecting... 2400 BAUD USER DETECTED ARE YOU USING A COMMODORE COLOR GRAPHICS TERMINAL PROGRAM C=! OK (y/n)? yYes Ö  [[[ ╔╬╙┼╥╘ ╧╬┼-╠╔╬┼╥ ╚┼╥┼ ]]] ƒ╘ODAY'S DATE IS :26/03/06 û├URRENT ╘IME IS :20:16:29 Ü╠AST CALLER WAS: ╦ING ─IAMOND ₧╠OGGED OFF AT: 191813 Ö  Ü╫ELCOME TO ┬ORDERLINE ┬┬╙!Æ ₧╔═╨╧╥╘┴╬╘ ╬╧╘╔├┼:Æ É  ╧N ─ECEMBER 21, 2025, THE USER DATABASE FILE BECAME CORRUPTED AND HAD TO BE RESET. ╘HEREFORE, ALL USERS WHO SIGNED UP FOR AN ACCOUNT PRIOR TO THAT DATE WILL NEED TO SIGN UP AS A NEW USER. ╔ APOLOGIZE FOR THE INCONVENIENCE.  ƒ┬ALZABAAR IS ╧╒╘  ╨RESS <╥┼╘╒╥╬>ÅÆ IF NEW USER. ╧THERS ENTER THEIR ╒╙┼╥ # OR PHONE NUMBER WITH AREA CODE. -​-==>>951-652-1690Æ <<=​=-- -​-==>> ₧╙╫╔╘├╚ ╘╧ ┴╙├╔╔! Pause...press any key to continue...

Server URLs

Server Location: 🇺🇸 United States (GeoIP)

Listing

  • BBS Name: Borderline BBS (from listing)

  • Sysop: Andrew Wiskow

  • Listed Location: Hemet, CA, USA

BBS Software

Reported: All American

Encoding

  • Effective encoding: cp437

  • Scanner detected: cp437

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 99 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r 2400 BAUD USER DETECTED\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\r\nARE YOU USING A COMMODORE COLOR\r\nGRAPHICS TERMINAL PROGRAM C=!\r\n\n\r\n\rOK (y/n)? y\b\u0000\u0000Yes\n\r\u0014\u0012\u00d6\n\r\r\n\u0014\n\r[[[ \u2554\u256c\u2559\u253c\u2565\u2558 \u2567\u256c\u253c-\u2560\u2554\u256c\u253c\u2565 \u255a\u253c\u2565\u253c ]]]\u000e\n\r\n\r\u000e\u0192\u2558ODAY'S DATE IS   :26/03/06\n\r\u00fb\u251cURRENT \u2558IME IS   :20:16:29\n\r\n\r\u0012\u00dc\u2560AST CALLER WAS: \u2566ING \u2500IAMOND\n\r  \u0012\u20a7\u2560OGGED OFF AT: 191813\n\r\u0014\u0012\u00d6\n\r\n\u0014\n\r\u001f\u00dc\u0012\u256bELCOME TO \u252cORDERLINE \u252c\u252c\u2559!\u00c6\n\r \n\r\u20a7\u0012\u2554\u2550\u2568\u2567\u2565\u2558\u2534\u256c\u2558 \u256c\u2567\u2558\u2554\u251c\u253c:\u00c6 \n\r \u00c9 \u0005 \n\r\u2567N \u2500ECEMBER 21, 2025, THE USER \n\rDATABASE FILE BECAME CORRUPTED AND\n\rHAD TO BE RESET. \u2558HEREFORE, ALL USERS\n\rWHO SIGNED UP FOR AN ACCOUNT PRIOR TO\n\rTHAT DATE WILL NEED TO SIGN UP AS A\n\rNEW USER. \u2554 APOLOGIZE FOR THE \n\rINCONVENIENCE. \n\r \u000e\n\r\n\r\u0012\u0192\u252cALZABAAR IS \u2567\u2552\u2558\n\r\n\r\u000e\u001e\u2568RESS \u0005\u0012\u000f<\u2565\u253c\u2558\u2552\u2565\u256c>\u00c5\u00c6\u001e IF NEW USER.\n\r\u2567THERS ENTER THEIR \u2552\u2559\u253c\u2565 #\n\rOR PHONE NUMBER WITH AREA CODE.\n\r--==>>\u0012\u0005951-652-1690\u00c6\u001e<<==--\n\r--==>>\u0012\r\n\n\r\n\r\u0012\u20a7\u2559\u256b\u2554\u2558\u251c\u255a \u2558\u2567 \u2534\u2559\u251c\u2554\u2554!\n\rPause...press any key to continue...",
      "banner_before_return": "borderline bbs -- press return/enter to continue\r\n\r\nconnecting...\r\n",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "cp437",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5054593086242676,
        "total": 33.16734266281128
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:16:48.546267+00:00",
      "host": "borderlinebbs.dyndns.org",
      "ip": "104.173.38.226",
      "port": 6400
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug borderlinebbs.dyndns.org 6400
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=borderlinebbs.dyndns.org port=6400
INFO client_base.py:186 Connected to <Peer 104.173.38.226 6400>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
    WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
    DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:118 Connection closed to <Peer 104.173.38.226 6400>

cottonwoodbbs.dyndns.org:6502

Connection Banner:

─█▜▜█▀○██▗ ││♥ ─█▀▀▖─▜▟▀▝... atao connection successfully established. press return/enter to continue  connected at 2400 baud! are you using a commodore graphic terminal program (y/n)? y Welcome to Cottonwood BBS! We've been delighting users with speeds of up to 2400 baud since 1987! -​------------------------------------- Note from: WAMMY ───────────────────────────────── Can I stay for some of the peril? ───────────────────────────────── Enter your membership number or NEW (? to list all membership numbers) > Membership List New members will not appear in the Membership List until their account has been validated by the SysOp. While the list is being displayed, you can press CTRL-S to pause or CTRL-P to abort. g Membership list as of 03/02/26 2: BALZABAAR 3: FOXIPSO 4: ANTTI 5: SYSFAIL 6: FRATM 7: BOARD RIDER/CSD 8: MATRIX 9: C64ER 10: YAKSKIIS 11: ALEXC 12: SCICLONE 13: LUMIX 14: DELMOKO 15: MARKOK 16: DR.DOOM/RAD 17: MAC388 18: JEFF DAIGLE 19: GIMLE 20: AH 21: MILESPROWER1992 22: FARDMARK RED FOX 23: PRO 24: HERSHEY 25: DARRELLH89 26: RAHU OM CHAN 27: INIDRAKI 28: GIOCURTI 29: CODEY/2D 30: CETMEGUY 31: SMUFTE 32: ZILOG345 33: SUSANFOREMAN 34: MISAN 35: BONEAPPLETEETHIIC 36: FRAPEI 37: BBSING 38: RCGRABBAG 39: LORD ULTRANOX 40: GIGINO 41: GWYDDIEN 42: NC 43: APORAM 44: AUBERGINE 45: TMA-1 46: RUMPROAST 47: RAL-CLAN 48: LYCAR 49: SNAKEYEZ11 50: CHRISTIAN 51: STEFAN 52: CHESHIRE-CAT 53: JOLTGUY 54: MICHAEL RIGHTMAN 55: MEUER26 56: FIRSTBASE 57: DISSECTION 58: LOBSTERPARTY 59: NINCOLLIN 60: TURBIO 61: LUBEL 62: SOFTWARE RAIDER 63: TEMPEST1977 64: PYRODRAKE 65: ADM JABA 66: LANGLEY59 67: ACERISODD 68: IGGYPOP 69: SEBCTTNWD 70: RAGGE 71: FATCAT 72: CTHULHU 73: WINDO 74: ORIEL 75: FEELGOOD 76: TCRDREW 77: JAXOM 78: FLEMINGSBERG 79: C4EVER 80: EOMER 81: CHAMELEON/IMSI 82: MCBAIN 83: DDMD7 84: MADZAP1970 85: MUNCHOLAKE

Server URLs

Server Location: 🇺🇸 United States (GeoIP)

Listing

  • BBS Name: Cottonwood BBS (from listing)

  • Sysop: Andrew Wiskow

  • Listed Location: Hemet, CA, USA

BBS Software

Reported: Color 64

Encoding

  • Effective encoding: petscii

  • Override: petscii (from bbslist.txt)

  • Scanner detected: petscii

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 99 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u0007\n\n\n      connected at 2400 baud!\n\n\n\n\n\n\n\nare you using a commodore\ngraphic terminal program (y/n)? y\n\n\nWelcome to Cottonwood BBS! We've been\ndelighting users with speeds of up to\n2400 baud since 1987!\n\n--------------------------------------\n\n\n\nNote from: WAMMY\n\n\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\nCan I stay for some of the peril?\n\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\n\n\nEnter your membership number or NEW\n(? to list all membership numbers)\n\n>\n\n\nMembership List\n\n\nNew members will not appear in the\nMembership List until their account\nhas been validated by the SysOp.\n\nWhile the list is being displayed, you\ncan press CTRL-S to pause or CTRL-P to\nabort.\n \ng\n\n\nMembership list as of 03/02/26\n\n 2: BALZABAAR\n 3: FOXIPSO\n 4: ANTTI\n 5: SYSFAIL\n 6: FRATM\n 7: BOARD RIDER/CSD\n 8: MATRIX\n 9: C64ER\n 10: YAKSKIIS\n 11: ALEXC\n 12: SCICLONE\n 13: LUMIX\n 14: DELMOKO\n 15: MARKOK\n 16: DR.DOOM/RAD\n 17: MAC388\n 18: JEFF DAIGLE\n 19: GIMLE\n 20: AH\n 21: MILESPROWER1992\n 22: FARDMARK RED FOX\n 23: PRO\n 24: HERSHEY\n 25: DARRELLH89\n 26: RAHU OM CHAN\n 27: INIDRAKI\n 28: GIOCURTI\n 29: CODEY/2D\n 30: CETMEGUY\n 31: SMUFTE\n 32: ZILOG345\n 33: SUSANFOREMAN\n 34: MISAN\n 35: BONEAPPLETEETHIIC\n 36: FRAPEI\n 37: BBSING\n 38: RCGRABBAG\n 39: LORD ULTRANOX\n 40: GIGINO\n 41: GWYDDIEN\n 42: NC\n 43: APORAM\n 44: AUBERGINE\n 45: TMA-1\n 46: RUMPROAST\n 47: RAL-CLAN\n 48: LYCAR\n 49: SNAKEYEZ11\n 50: CHRISTIAN\n 51: STEFAN\n 52: CHESHIRE-CAT\n 53: JOLTGUY\n 54: MICHAEL RIGHTMAN\n 55: MEUER26\n 56: FIRSTBASE\n 57: DISSECTION\n 58: LOBSTERPARTY\n 59: NINCOLLIN\n 60: TURBIO\n 61: LUBEL\n 62: SOFTWARE RAIDER\n 63: TEMPEST1977\n 64: PYRODRAKE\n 65: ADM JABA\n 66: LANGLEY59\n 67: ACERISODD\n 68: IGGYPOP\n 69: SEBCTTNWD\n 70: RAGGE\n 71: FATCAT\n 72: CTHULHU\n 73: WINDO\n 74: ORIEL\n 75: FEELGOOD\n 76: TCRDREW\n 77: JAXOM\n 78: FLEMINGSBERG\n 79: C4EVER\n 80: EOMER\n 81: CHAMELEON/IMSI\n 82: MCBAIN\n 83: DDMD7\n 84: MADZAP1970\n 85: MUNCHOLAKE\n",
      "banner_before_return": "\u2500\u2588\u259c\u259c\u2588\u2580\u25cb\u2588\u2588\u2597 \u2502\u2502\u2665\n\n\u2500\u2588\u2580\u2580\u2596\u2500\u259c\u259f\u2580\u259d...\natao\n\n\nconnection successfully established.\n\n\n   press return/enter to continue",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "petscii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5040621757507324,
        "total": 45.4100341796875
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:07:28.692387+00:00",
      "host": "cottonwoodbbs.dyndns.org",
      "ip": "104.173.38.226",
      "port": 6502
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug cottonwoodbbs.dyndns.org 6502
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=cottonwoodbbs.dyndns.org port=6502
INFO client_base.py:186 Connected to <Peer 104.173.38.226 6502>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
    WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
    DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:118 Connection closed to <Peer 104.173.38.226 6502>

otherworldbbs.dyndns.org:6502

Connection Banner:

─█▜▜█▀○██▗ ││♥ ─█▀▀▖─▜▟▀▝... atao connection successfully established. press return/enter to continue  connected at 2400 baud! are you using a commodore graphic terminal program (y/n)? y Welcome to Cottonwood BBS! We've been delighting users with speeds of up to 2400 baud since 1987! -​------------------------------------- Note from: WAMMY ───────────────────────────────── Can I stay for some of the peril? ───────────────────────────────── Enter your membership number or NEW (? to list all membership numbers) > Membership List New members will not appear in the Membership List until their account has been validated by the SysOp. While the list is being displayed, you can press CTRL-S to pause or CTRL-P to abort. Membership list as of 03/02/26 2: BALZABAAR 3: FOXIPSO 4: ANTTI 5: SYSFAIL 6: FRATM 7: BOARD RIDER/CSD 8: MATRIX 9: C64ER 10: YAKSKIIS 11: ALEXC 12: SCICLONE 13: LUMIX 14: DELMOKO 15: MARKOK 16: DR.DOOM/RAD 17: MAC388 18: JEFF DAIGLE 19: GIMLE 20: AH 21: MILESPROWER1992 22: FARDMARK RED FOX 23: PRO 24: HERSHEY 25: DARRELLH89 26: RAHU OM CHAN 27: INIDRAKI 28: GIOCURTI 29: CODEY/2D 30: CETMEGUY 31: SMUFTE 32: ZILOG345 33: SUSANFOREMAN 34: MISAN 35: BONEAPPLETEETHIIC 36: FRAPEI 37: BBSING 38: RCGRABBAG 39: LORD ULTRANOX 40: GIGINO 41: GWYDDIEN 42: NC 43: APORAM 44: AUBERGINE 45: TMA-1 46: RUMPROAST 47: RAL-CLAN 48: LYCAR 49: SNAKEYEZ11 50: CHRISTIAN 51: STEFAN 52: CHESHIRE-CAT 53: JOLTGUY 54: MICHAEL RIGHTMAN 55: MEUER26 56: FIRSTBASE 57: DISSECTION 58: LOBSTERPARTY 59: NINCOLLIN 60: TURBIO 61: LUBEL 62: SOFTWARE RAIDER 63: TEMPEST1977 64: PYRODRAKE 65: ADM JABA 66: LANGLEY59 67: ACERISODD 68: IGGYPOP 69: SEBCTTNWD 70: RAGGE 71: FATCAT 72: CTHULHU 73: WINDO 74: ORIEL 75: FEELGOOD 76: TCRDREW 77: JAXOM 78: FLEMINGSBERG 79: C4EVER 80: EOMER 81: CHAMELEON/IMSI 82: MCBAIN 83: DDMD7

Server URLs

Server Location: 🇺🇸 United States (GeoIP)

Encoding

  • Effective encoding: petscii

  • Override: petscii (from bbslist.txt)

  • Scanner detected: petscii

Telnet Fingerprint

e89ffa4fe5c32389

This fingerprint is shared by 99 other servers.

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

Show JSON
{
  "server-probe": {
    "fingerprint": "e89ffa4fe5c32389",
    "fingerprint-data": {
      "offered-options": [],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "ECHO",
        "EOR",
        "GMCP",
        "MCCP2",
        "MCCP3",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "SGA",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\u0007\n\n\n      connected at 2400 baud!\n\n\n\n\n\n\n\nare you using a commodore\ngraphic terminal program (y/n)? y\n\n\nWelcome to Cottonwood BBS! We've been\ndelighting users with speeds of up to\n2400 baud since 1987!\n\n--------------------------------------\n\n\n\nNote from: WAMMY\n\n\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\nCan I stay for some of the peril?\n\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\n\n\nEnter your membership number or NEW\n(? to list all membership numbers)\n\n>\u000b\n\nMembership List\n\n\nNew members will not appear in the\nMembership List until their account\nhas been validated by the SysOp.\n\nWhile the list is being displayed, you\ncan press CTRL-S to pause or CTRL-P to\nabort.\n \n\n\nMembership list as of 03/02/26\n\n 2: BALZABAAR\n 3: FOXIPSO\n 4: ANTTI\n 5: SYSFAIL\n 6: FRATM\n 7: BOARD RIDER/CSD\n 8: MATRIX\n 9: C64ER\n 10: YAKSKIIS\n 11: ALEXC\n 12: SCICLONE\n 13: LUMIX\n 14: DELMOKO\n 15: MARKOK\n 16: DR.DOOM/RAD\n 17: MAC388\n 18: JEFF DAIGLE\n 19: GIMLE\n 20: AH\n 21: MILESPROWER1992\n 22: FARDMARK RED FOX\n 23: PRO\n 24: HERSHEY\n 25: DARRELLH89\n 26: RAHU OM CHAN\n 27: INIDRAKI\n 28: GIOCURTI\n 29: CODEY/2D\n 30: CETMEGUY\n 31: SMUFTE\n 32: ZILOG345\n 33: SUSANFOREMAN\n 34: MISAN\n 35: BONEAPPLETEETHIIC\n 36: FRAPEI\n 37: BBSING\n 38: RCGRABBAG\n 39: LORD ULTRANOX\n 40: GIGINO\n 41: GWYDDIEN\n 42: NC\n 43: APORAM\n 44: AUBERGINE\n 45: TMA-1\n 46: RUMPROAST\n 47: RAL-CLAN\n 48: LYCAR\n 49: SNAKEYEZ11\n 50: CHRISTIAN\n 51: STEFAN\n 52: CHESHIRE-CAT\n 53: JOLTGUY\n 54: MICHAEL RIGHTMAN\n 55: MEUER26\n 56: FIRSTBASE\n 57: DISSECTION\n 58: LOBSTERPARTY\n 59: NINCOLLIN\n 60: TURBIO\n 61: LUBEL\n 62: SOFTWARE RAIDER\n 63: TEMPEST1977\n 64: PYRODRAKE\n 65: ADM JABA\n 66: LANGLEY59\n 67: ACERISODD\n 68: IGGYPOP\n 69: SEBCTTNWD\n 70: RAGGE\n 71: FATCAT\n 72: CTHULHU\n 73: WINDO\n 74: ORIEL\n 75: FEELGOOD\n 76: TCRDREW\n 77: JAXOM\n 78: FLEMINGSBERG\n 79: C4EVER\n 80: EOMER\n 81: CHAMELEON/IMSI\n 82: MCBAIN\n 83: DDMD7\n",
      "banner_before_return": "\u2500\u2588\u259c\u259c\u2588\u2580\u25cb\u2588\u2588\u2597 \u2502\u2502\u2665\n\n\u2500\u2588\u2580\u2580\u2596\u2500\u259c\u259f\u2580\u259d...\natao\n\n\nconnection successfully established.\n\n\n   press return/enter to continue",
      "dsr_replies": 0,
      "dsr_requests": 0,
      "encoding": "petscii",
      "option_states": {
        "server_offered": {},
        "server_requested": {}
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5101935863494873,
        "total": 44.710269927978516
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-03-07T04:11:57.027586+00:00",
      "host": "otherworldbbs.dyndns.org",
      "ip": "104.173.38.226",
      "port": 6502
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug otherworldbbs.dyndns.org 6502
Show Logfile
DEBUG client.py:1193 Fingerprint client: host=otherworldbbs.dyndns.org port=6502
INFO client_base.py:186 Connected to <Peer 104.173.38.226 6502>
DEBUG stream_writer.py:3330 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1019 send IAC WILL MXP
DEBUG stream_writer.py:3330 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1019 send IAC WILL ATCP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1019 send IAC WILL GMCP
DEBUG stream_writer.py:3330 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3330 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSP
DEBUG stream_writer.py:3330 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSDP
DEBUG stream_writer.py:3330 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1019 send IAC WILL MSSP
DEBUG stream_writer.py:3330 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1019 send IAC WILL ZMP
DEBUG stream_writer.py:3330 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1019 send IAC DO MXP
DEBUG stream_writer.py:3330 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1019 send IAC DO ATCP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3330 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1019 send IAC DO GMCP
DEBUG stream_writer.py:3330 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1019 send IAC DO AARDWOLF
DEBUG stream_writer.py:3330 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSP
DEBUG stream_writer.py:3330 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1019 send IAC DO MSDP
DEBUG stream_writer.py:3330 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1019 send IAC DO MSSP
DEBUG stream_writer.py:3330 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1019 send IAC DO ZMP
DEBUG stream_writer.py:3330 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1019 send IAC DO MCCP2_COMPRESS
DEBUG client_base.py:499 negotiation failed after 4.00s.
DEBUG client_base.py:505 failed-reply: 'WILL MXP, WILL ATCP, WILL MCCP3_COMPRESS, WILL GMCP, WILL AARDWOLF, WILL MSP, WILL MSDP,
    WILL MSSP, WILL ZMP, WILL MCCP2_COMPRESS, DO MXP, DO ATCP, DO MCCP3_COMPRESS, DO GMCP, DO AARDWOLF, DO MSP, DO MSDP, DO MSSP,
    DO ZMP, DO MCCP2_COMPRESS'
DEBUG stream_writer.py:3330 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:1019 send IAC DO BINARY
DEBUG stream_writer.py:3330 pending_option[DO + SGA] = True
DEBUG stream_writer.py:1019 send IAC DO SGA
DEBUG stream_writer.py:3330 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:1019 send IAC DO ECHO
DEBUG stream_writer.py:3330 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:1019 send IAC DO STATUS
DEBUG stream_writer.py:3330 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:1019 send IAC DO CHARSET
DEBUG stream_writer.py:3330 pending_option[DO + EOR] = True
DEBUG stream_writer.py:1019 send IAC DO EOR
DEBUG stream_writer.py:3330 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:1019 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:993 skip DO MCCP2_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO MCCP3_COMPRESS; pending_option = True
DEBUG stream_writer.py:993 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MSP; pending_option = True
DEBUG stream_writer.py:993 skip DO MXP; pending_option = True
DEBUG stream_writer.py:993 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:993 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:993 skip DO ATCP; pending_option = True
INFO fingerprinting.py:755 connection for server fingerprint e89ffa4fe5c32389
INFO client_base.py:118 Connection closed to <Peer 104.173.38.226 6502>