136.144.155.250

136.144.155.250:2000

Connection Banner:

136.144.155.250:2000

Encoding

  • Effective encoding: cp437

  • Scanner detected: ascii

Telnet Fingerprint

759aef872114a5f7…

This fingerprint is shared by 1 other server.

Options offered by server: ECHO, SGA

Options requested from client: LINEMODE

Data source: 759aef872114a5f7/fa6dfa09fb865cf0.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "759aef872114a5f7",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "SGA"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "LINEMODE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n\r\n  T H E   FFFF   FF   FFFF\r\n           FF   FFFF   FF\r\n           FF  FF  FF  FF      FFFF FF  FF    FF\r\n           FF FF    FF FF    FF    FF    FF  FF\r\n           FFFF      FFFF   FF     FF     FFFF\r\n           FFF        FFF    FF    FF      FF\r\n           FF          FF      FFFF FF     FF      O F   T H E\r\n\r\n          FFFFFFFFFFFF\r\n            FF\r\n            FF         FFFFFF   FF FFFF    FFFFFF   FF FFFF\r\n            FFFFFF    FF    FF   FFF  FF  FF    FF   FF\r\n            FF        FF    FF   FF       FF         FFFF\r\n            FF        FF    FF   FF       FF    FF   FF\r\n           FFFF        FFFFFF   FFFF       FFFFFF   FF FFFF\r\n\r\n\r\n\r\nName     : who\r\nPassword : ",
      "banner_before_return": "\u001b[2J\r\n\u001b[1;1H\u001b[1;1H\u001b[1mDGD 1.2.157-WOTF-NET / WOTF Kernel 0.84\u001b[0m\r\n\r\n\r\n\u001b[2J\r\n\u001b[1;1H\u001b[1m\u001b[1m\u001b[33m    T H E   W A Y   O F   T H E   F O R C E\u001b[0m\r\n\u001b[1m=================================================\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mWelcome to the Way of the Force, space traveller.\u001b[0m\r\n\u001b[1mThis mud is in development and is not open for\u001b[0m\r\n\u001b[1mfull gameplay yet. We do have a working game \u001b[0m\r\n\u001b[1mwith some areas however and new characters can \u001b[0m\r\n\u001b[1mbe created and you can do some playtesting in \u001b[0m\r\n\u001b[1mthe already available areas. \u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m=================================================\u001b[0m\r\n\u001b[1m\u001b[0m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mEnter menu option or your name:\u001b[0m\r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[1m  1\u001b[0m - Introduction to Way of the Force                                   \r\n\u001b[1m  2\u001b[0m - Login an existing character                                        \r\n\u001b[1m  n\u001b[0m - Create a new character                                             \r\n\u001b[1m  w\u001b[0m - Who is online?                                                     \r\n\u001b[1m  q\u001b[0m - disconnect                                                         \r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[0m\u001b[1m> \u001b[0m",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": true
        },
        "server_requested": {
          "LINEMODE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5069048404693604,
        "total": 5.021974325180054
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:27:02.415121+00:00",
      "host": "136.144.155.250",
      "ip": "136.144.155.250",
      "port": 2000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=136.144.155.250 port=2000
INFO client_base.py:174 Connected to <Peer 136.144.155.250 2000>
DEBUG stream_writer.py:706 recv IAC WONT ECHO
DEBUG stream_writer.py:2022 handle_wont(ECHO)
DEBUG stream_writer.py:3167 remote_option[ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = False
DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE
DEBUG stream_writer.py:1274 set Linemode <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False, remote:False,
    local:True>
DEBUG stream_writer.py:1277 send IAC SB LINEMODE LINEMODE-MODE <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False,
    remote:False, local:True> IAC SE
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:921 skip DO SGA; pending_option = True
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
INFO fingerprinting.py:737 new server fingerprint 759aef872114a5f7
INFO client_base.py:105 Connection closed to <Peer 136.144.155.250 2000>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 136.144.155.250 2000

136.144.155.250:8888

Connection Banner:

136.144.155.250:8888

Encoding

  • Effective encoding: cp437

  • Scanner detected: ascii

Telnet Fingerprint

759aef872114a5f7…

This fingerprint is shared by 1 other server.

Options offered by server: ECHO, SGA

Options requested from client: LINEMODE

Data source: 759aef872114a5f7/6bc1d41ac39cb3bf.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "759aef872114a5f7",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "SGA"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "LINEMODE"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n                 ;;;|||||||||\r\n             ;;;|||||||\r\n           ;|||||||                 ,,,,,,          __ __| |\r\n         ||||                   ,||''   ''||,          |   __ \\   _ \\\r\n       ,,|||||||,,,          |||'          |||         |   | | |  __/\r\n     ,||''        '|||,,, ,,||'       &     |         _|  _| |_|\\___|\r\n    ||     &         '''.''                |\r\n    |||,     ,,,,,,,'||','||',,,,,,,     ,|||      __  /\r\n   ,||||||||||||||| || ,|, |||||||||||||||||||        /  _ \\  __ \\   _ \\ \r\n    ;||||||||||  ,,|||||| |||||   '''||||||||||      /  (   | | | |  __/\r\n    |||||     |||||||||| |||||||  |    ''||||      ____\\___/ _| |_|\\___|\r\n     '   || ,||||||||||  ' ||||||    |||\r\n           ,||''',,, ;'' ;', ,,,   |  |\r\n           ,, |' ;|   '  ;   '|  |' ,,\r\n           ;|     '           '     ;|\r\n\r\nName     : who\r\nPassword : ",
      "banner_before_return": "\u001b[2J\r\n\u001b[1;1H\u001b[1;1H\u001b[1mDGD 1.4.1 / WOTF Kernel 0.84\u001b[0m\r\n\r\n\r\n\u001b[2J\r\n\u001b[1;1H\u001b[1m\u001b[1m\u001b[33m\u001b[0m\r\n\u001b[1m                         W E L C O M E   T O\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m                 ;;;|||||||||\u001b[0m\r\n\u001b[1m             ;;;|||||||\u001b[0m\r\n\u001b[1m           ;|||||||                 ,,,,,,          __ __| |\u001b[0m\r\n\u001b[1m         ||||                   ,||''   ''||,          |   __ \\   _ \\\u001b[0m\r\n\u001b[1m       ,,|||||||,,,          |||'          |||         |   | | |  __/\u001b[0m\r\n\u001b[1m     ,||''        '|||,,, ,,||'       &     |         _|  _| |_|\\___|\u001b[0m\r\n\u001b[1m    ||     &         '''.''                |\u001b[0m\r\n\u001b[1m    |||,     ,,,,,,,'||','||',,,,,,,     ,|||      __  /\u001b[0m\r\n\u001b[1m   ,||||||||||||||| || ,|, |||||||||||||||||||        /  _ \\  __ \\   _ \\ \u001b[0m\r\n\u001b[1m    ;||||||||||  ,,|||||| |||||   '''||||||||||      /  (   | | | |  __/\u001b[0m\r\n\u001b[1m    |||||     |||||||||| |||||||  |    ''||||      ____\\___/ _| |_|\\___|\u001b[0m\r\n\u001b[1m     '   || ,||||||||||  ' ||||||    |||\u001b[0m\r\n\u001b[1m           ,||''',,, ;'' ;', ,,,   |  |\u001b[0m\r\n\u001b[1m           ,, |' ;|   '  ;   '|  |' ,,\u001b[0m\r\n\u001b[1m           ;|     '           '     ;|\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m                                     (C) 1991-2008 Stool, Spork and Aidil\u001b[0m\r\n\u001b[1m                                               of The_zone.\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m\u001b[0m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mEnter menu option or your name:\u001b[0m\r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[1m  1\u001b[0m - Introduction to Way of the Force                                   \r\n\u001b[1m  2\u001b[0m - Login an existing character                                        \r\n\u001b[1m  w\u001b[0m - Who is online?                                                     \r\n\u001b[1m  q\u001b[0m - disconnect                                                         \r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[0m\u001b[1m> \u001b[0m",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": true
        },
        "server_requested": {
          "LINEMODE": true
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5051991939544678,
        "total": 5.0198023319244385
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:28:44.432093+00:00",
      "host": "136.144.155.250",
      "ip": "136.144.155.250",
      "port": 8888
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=136.144.155.250 port=8888
INFO client_base.py:174 Connected to <Peer 136.144.155.250 8888>
DEBUG stream_writer.py:706 recv IAC WONT ECHO
DEBUG stream_writer.py:2022 handle_wont(ECHO)
DEBUG stream_writer.py:3167 remote_option[ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = False
DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE
DEBUG stream_writer.py:1274 set Linemode <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False, remote:False,
    local:True>
DEBUG stream_writer.py:1277 send IAC SB LINEMODE LINEMODE-MODE <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False,
    remote:False, local:True> IAC SE
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:921 skip DO SGA; pending_option = True
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
INFO fingerprinting.py:746 connection for server fingerprint 759aef872114a5f7
INFO client_base.py:105 Connection closed to <Peer 136.144.155.250 8888>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug 136.144.155.250 8888