136.144.155.250
136.144.155.250:2000
Connection Banner:
DGD 1.2.157-WOTF-NET / WOTF Kernel 0.84 T H E W A Y O F T H E F O R C E ================================================= Welcome to the Way of the Force, space traveller. This mud is in development and is not open for full gameplay yet. We do have a working game with some areas however and new characters can be created and you can do some playtesting in the already available areas. ================================================= Enter menu option or your name: -------------------------------------------------------------------------- 1 - Introduction to Way of the Force 2 - Login an existing character n - Create a new character w - Who is online? q - disconnect -------------------------------------------------------------------------- > T H E FFFF FF FFFF FF FFFF FF FF FF FF FF FFFF FF FF FF FF FF FF FF FF FF FF FF FFFF FFFF FF FF FFFF FFF FFF FF FF FF FF FF FFFF FF FF O F T H E FFFFFFFFFFFF FF FF FFFFFF FF FFFF FFFFFF FF FFFF FFFFFF FF FF FFF FF FF FF FF FF FF FF FF FF FFFF FF FF FF FF FF FF FF FFFF FFFFFF FFFF FFFFFF FF FFFF Name : who Password :
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 1 other server.
Options offered by server: ECHO, SGA
Options requested from client: LINEMODE
Data source: 759aef872114a5f7/fa6dfa09fb865cf0.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "759aef872114a5f7",
"fingerprint-data": {
"offered-options": [
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"LINEMODE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\n T H E FFFF FF FFFF\r\n FF FFFF FF\r\n FF FF FF FF FFFF FF FF FF\r\n FF FF FF FF FF FF FF FF\r\n FFFF FFFF FF FF FFFF\r\n FFF FFF FF FF FF\r\n FF FF FFFF FF FF O F T H E\r\n\r\n FFFFFFFFFFFF\r\n FF\r\n FF FFFFFF FF FFFF FFFFFF FF FFFF\r\n FFFFFF FF FF FFF FF FF FF FF\r\n FF FF FF FF FF FFFF\r\n FF FF FF FF FF FF FF\r\n FFFF FFFFFF FFFF FFFFFF FF FFFF\r\n\r\n\r\n\r\nName : who\r\nPassword : ",
"banner_before_return": "\u001b[2J\r\n\u001b[1;1H\u001b[1;1H\u001b[1mDGD 1.2.157-WOTF-NET / WOTF Kernel 0.84\u001b[0m\r\n\r\n\r\n\u001b[2J\r\n\u001b[1;1H\u001b[1m\u001b[1m\u001b[33m T H E W A Y O F T H E F O R C E\u001b[0m\r\n\u001b[1m=================================================\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mWelcome to the Way of the Force, space traveller.\u001b[0m\r\n\u001b[1mThis mud is in development and is not open for\u001b[0m\r\n\u001b[1mfull gameplay yet. We do have a working game \u001b[0m\r\n\u001b[1mwith some areas however and new characters can \u001b[0m\r\n\u001b[1mbe created and you can do some playtesting in \u001b[0m\r\n\u001b[1mthe already available areas. \u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m=================================================\u001b[0m\r\n\u001b[1m\u001b[0m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mEnter menu option or your name:\u001b[0m\r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[1m 1\u001b[0m - Introduction to Way of the Force \r\n\u001b[1m 2\u001b[0m - Login an existing character \r\n\u001b[1m n\u001b[0m - Create a new character \r\n\u001b[1m w\u001b[0m - Who is online? \r\n\u001b[1m q\u001b[0m - disconnect \r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[0m\u001b[1m> \u001b[0m",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true
},
"server_requested": {
"LINEMODE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5069048404693604,
"total": 5.021974325180054
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:27:02.415121+00:00",
"host": "136.144.155.250",
"ip": "136.144.155.250",
"port": 2000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=136.144.155.250 port=2000
INFO client_base.py:174 Connected to <Peer 136.144.155.250 2000>
DEBUG stream_writer.py:706 recv IAC WONT ECHO
DEBUG stream_writer.py:2022 handle_wont(ECHO)
DEBUG stream_writer.py:3167 remote_option[ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = False
DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE
DEBUG stream_writer.py:1274 set Linemode <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False, remote:False,
local:True>
DEBUG stream_writer.py:1277 send IAC SB LINEMODE LINEMODE-MODE <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False,
remote:False, local:True> IAC SE
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:921 skip DO SGA; pending_option = True
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
INFO fingerprinting.py:737 new server fingerprint 759aef872114a5f7
INFO client_base.py:105 Connection closed to <Peer 136.144.155.250 2000>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 136.144.155.250 2000
136.144.155.250:8888
Connection Banner:
DGD 1.4.1 / WOTF Kernel 0.84 W E L C O M E T O ;;;||||||||| ;;;||||||| ;||||||| ,,,,,, __ __| | |||| ,||'' ''||, | __ \ _ \ ,,|||||||,,, |||' ||| | | | | __/ ,||'' '|||,,, ,,||' & | _| _| |_|\___| || & '''.'' | |||, ,,,,,,,'||','||',,,,,,, ,||| __ / ,||||||||||||||| || ,|, ||||||||||||||||||| / _ \ __ \ _ \ ;|||||||||| ,,|||||| ||||| '''|||||||||| / ( | | | | __/ ||||| |||||||||| ||||||| | ''|||| ____\___/ _| |_|\___| ' || ,|||||||||| ' |||||| ||| ,||''',,, ;'' ;', ,,, | | ,, |' ;| ' ; '| |' ,, ;| ' ' ;| (C) 1991-2008 Stool, Spork and Aidil of The_zone. Enter menu option or your name: -------------------------------------------------------------------------- 1 - Introduction to Way of the Force 2 - Login an existing character w - Who is online? q - disconnect -------------------------------------------------------------------------- > ;;;||||||||| ;;;||||||| ;||||||| ,,,,,, __ __| | |||| ,||'' ''||, | __ \ _ \ ,,|||||||,,, |||' ||| | | | | __/ ,||'' '|||,,, ,,||' & | _| _| |_|\___| || & '''.'' | |||, ,,,,,,,'||','||',,,,,,, ,||| __ / ,||||||||||||||| || ,|, ||||||||||||||||||| / _ \ __ \ _ \ ;|||||||||| ,,|||||| ||||| '''|||||||||| / ( | | | | __/ ||||| |||||||||| ||||||| | ''|||| ____\___/ _| |_|\___| ' || ,|||||||||| ' |||||| ||| ,||''',,, ;'' ;', ,,, | | ,, |' ;| ' ; '| |' ,, ;| ' ' ;| Name : who Password :
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 1 other server.
Options offered by server: ECHO, SGA
Options requested from client: LINEMODE
Data source: 759aef872114a5f7/6bc1d41ac39cb3bf.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "759aef872114a5f7",
"fingerprint-data": {
"offered-options": [
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"LINEMODE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n ;;;|||||||||\r\n ;;;|||||||\r\n ;||||||| ,,,,,, __ __| |\r\n |||| ,||'' ''||, | __ \\ _ \\\r\n ,,|||||||,,, |||' ||| | | | | __/\r\n ,||'' '|||,,, ,,||' & | _| _| |_|\\___|\r\n || & '''.'' |\r\n |||, ,,,,,,,'||','||',,,,,,, ,||| __ /\r\n ,||||||||||||||| || ,|, ||||||||||||||||||| / _ \\ __ \\ _ \\ \r\n ;|||||||||| ,,|||||| ||||| '''|||||||||| / ( | | | | __/\r\n ||||| |||||||||| ||||||| | ''|||| ____\\___/ _| |_|\\___|\r\n ' || ,|||||||||| ' |||||| |||\r\n ,||''',,, ;'' ;', ,,, | |\r\n ,, |' ;| ' ; '| |' ,,\r\n ;| ' ' ;|\r\n\r\nName : who\r\nPassword : ",
"banner_before_return": "\u001b[2J\r\n\u001b[1;1H\u001b[1;1H\u001b[1mDGD 1.4.1 / WOTF Kernel 0.84\u001b[0m\r\n\r\n\r\n\u001b[2J\r\n\u001b[1;1H\u001b[1m\u001b[1m\u001b[33m\u001b[0m\r\n\u001b[1m W E L C O M E T O\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m ;;;|||||||||\u001b[0m\r\n\u001b[1m ;;;|||||||\u001b[0m\r\n\u001b[1m ;||||||| ,,,,,, __ __| |\u001b[0m\r\n\u001b[1m |||| ,||'' ''||, | __ \\ _ \\\u001b[0m\r\n\u001b[1m ,,|||||||,,, |||' ||| | | | | __/\u001b[0m\r\n\u001b[1m ,||'' '|||,,, ,,||' & | _| _| |_|\\___|\u001b[0m\r\n\u001b[1m || & '''.'' |\u001b[0m\r\n\u001b[1m |||, ,,,,,,,'||','||',,,,,,, ,||| __ /\u001b[0m\r\n\u001b[1m ,||||||||||||||| || ,|, ||||||||||||||||||| / _ \\ __ \\ _ \\ \u001b[0m\r\n\u001b[1m ;|||||||||| ,,|||||| ||||| '''|||||||||| / ( | | | | __/\u001b[0m\r\n\u001b[1m ||||| |||||||||| ||||||| | ''|||| ____\\___/ _| |_|\\___|\u001b[0m\r\n\u001b[1m ' || ,|||||||||| ' |||||| |||\u001b[0m\r\n\u001b[1m ,||''',,, ;'' ;', ,,, | |\u001b[0m\r\n\u001b[1m ,, |' ;| ' ; '| |' ,,\u001b[0m\r\n\u001b[1m ;| ' ' ;|\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m (C) 1991-2008 Stool, Spork and Aidil\u001b[0m\r\n\u001b[1m of The_zone.\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1m\u001b[0m\u001b[0m\r\n\u001b[1m\u001b[0m\r\n\u001b[1mEnter menu option or your name:\u001b[0m\r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[1m 1\u001b[0m - Introduction to Way of the Force \r\n\u001b[1m 2\u001b[0m - Login an existing character \r\n\u001b[1m w\u001b[0m - Who is online? \r\n\u001b[1m q\u001b[0m - disconnect \r\n\u001b[1m--------------------------------------------------------------------------\u001b[0m\r\n\u001b[0m\u001b[1m> \u001b[0m",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true
},
"server_requested": {
"LINEMODE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5051991939544678,
"total": 5.0198023319244385
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:28:44.432093+00:00",
"host": "136.144.155.250",
"ip": "136.144.155.250",
"port": 8888
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=136.144.155.250 port=8888
INFO client_base.py:174 Connected to <Peer 136.144.155.250 8888>
DEBUG stream_writer.py:706 recv IAC WONT ECHO
DEBUG stream_writer.py:2022 handle_wont(ECHO)
DEBUG stream_writer.py:3167 remote_option[ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB LINEMODE
DEBUG stream_writer.py:685 sub-negotiation cmd LINEMODE SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = False
DEBUG stream_writer.py:2537 recv IAC SB LINEMODE LINEMODE-MODE b'\x01' IAC SE
DEBUG stream_writer.py:1274 set Linemode <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False, remote:False,
local:True>
DEBUG stream_writer.py:1277 send IAC SB LINEMODE LINEMODE-MODE <b'\x05': lit_echo:False, soft_tab:False, ack:True, trapsig:False,
remote:False, local:True> IAC SE
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:921 skip DO SGA; pending_option = True
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
INFO fingerprinting.py:746 connection for server fingerprint 759aef872114a5f7
INFO client_base.py:105 Connection closed to <Peer 136.144.155.250 8888>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug 136.144.155.250 8888