20.121.15.153 (phantasm.bbs.io)

phantasm.bbs.io:4489

Connection Banner:

phantasm.bbs.io:4489

Encoding

  • Effective encoding: cp437

  • Scanner detected: ascii

Telnet Fingerprint

c8e0f73ac58e04af…

This fingerprint is shared by 13 other servers.

Options offered by server: ECHO, SGA

Options requested from client: BINARY

Data source: c8e0f73ac58e04af/6bb1afaef012304f.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "c8e0f73ac58e04af",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "SGA"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "BINARY"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n\r\nEnter your Name: ",
      "banner_before_return": "\r\n/X Native Telnet:  Searching for free node...\r\n/X Native Telnet:  Successful connection to node 2\r\n\r\nCONNECT 19200\r\n**EMSI_IRQ8E08\r\n\r\n\u001b[0mWelcome to Phantasm, located in The UK\r\n\r\nRunning AmiExpress 5.6.2-dev Copyright \ufffd2018-2023 Darren Coles\r\nRegistration QTX-0001. You are connected to Node 2 at 19200 baud\r\nConnection occured at Mon 09-Feb-2026 19:26:16.\r\n\r\n\u001b[0m                   \u001b[32m/\u001b[33m-\u001b[34m/\u001b[37m kOOL fRONTEND V1.1 bY: rEBEL/QTX \u001b[34m\\\u001b[33m-\u001b[32m\\\r\n                         \u001b[32m\\\u001b[33m-\u001b[34m\\ \u001b[37mdES!GN bY: nOP!/STS \u001b[34m/\u001b[33m-\u001b[32m/\r\n     \u001b[35m.------------------------------------------------------------------.\r\n     \u001b[35m|\u001b[34mNode\u001b[35m| \u001b[34mHandle/Username \u001b[35m| \u001b[34mLocation/Group        \u001b[35m| \u001b[34mUser Ip Address   \u001b[35m|\r\n     \u001b[35m|----+-----------------+-----------------------+-------------------|\r\n \u001b[35m    | \u001b[32m00 \u001b[35m| \u001b[37mREbEL           \u001b[35m| \u001b[37m  * R E T I R E D *   \u001b[35m|\u001b[36m      PRIVATE      \u001b[35m|\r\n \u001b[35m    | \u001b[32m02 \u001b[35m| \u001b[37mConnecting      \u001b[35m| \u001b[37m                      \u001b[35m|\u001b[36m   64.227.40.173   \u001b[35m|\r\n \u001b[35m    | \u001b[32m03 \u001b[35m| \u001b[37mAwaiting Call   \u001b[35m| \u001b[37m                      \u001b[35m|\u001b[36m                   \u001b[35m|\r\n \u001b[35m    | \u001b[32m04 \u001b[35m| \u001b[37mAwaiting Call   \u001b[35m| \u001b[37m                      \u001b[35m|\u001b[36m                   \u001b[35m|\r\n    \u001b[35m `----\ufffd-----------------\ufffd-----------------------\ufffd-------------------|/-|/\r\n \u001b[32mYour Telnet Login Established from Host :  \u001b[37mN O T  A V A I L A B L E    \u001b[35m|\r\n \u001b[35m<<-----------.   <<----------------------------------------------------'\r\n              \u001b[35m|\u001b[32mCurrent iP of This System \u001b[32m:  \u001b[37m20.121.15.153\r\n              \u001b[35m`----------------------------------------------------------->>\r\n\u001b[0m\r\n\u001b[0mANSI, RIP or No graphics (A/r/n)? ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": true,
          "SGA": true,
          "STATUS": false
        },
        "server_requested": {
          "BINARY": true,
          "LINEMODE": false,
          "NAWS": false,
          "TSPEED": false
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5033543109893799,
        "total": 5.1630823612213135
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:26:23.727987+00:00",
      "host": "phantasm.bbs.io",
      "ip": "20.121.15.153",
      "port": 4489
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=phantasm.bbs.io port=4489
INFO client_base.py:174 Connected to <Peer 20.121.15.153 4489>
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC DONT NAWS
DEBUG stream_writer.py:1860 handle_dont(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:3167 local_option[NAWS] = False
DEBUG stream_writer.py:706 recv IAC WONT STATUS
DEBUG stream_writer.py:2022 handle_wont(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = False
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC DONT TSPEED
DEBUG stream_writer.py:1860 handle_dont(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:3167 local_option[TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DONT LINEMODE
DEBUG stream_writer.py:1860 handle_dont(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:3167 local_option[LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af
INFO client_base.py:105 Connection closed to <Peer 20.121.15.153 4489>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug phantasm.bbs.io 4489

scenewall.bbs.io:4000

Connection Banner:

scenewall.bbs.io:4000

Encoding

  • Effective encoding: cp437

  • Scanner detected: ascii

Telnet Fingerprint

c8e0f73ac58e04af…

This fingerprint is shared by 13 other servers.

Options offered by server: ECHO, SGA

Options requested from client: BINARY

Data source: c8e0f73ac58e04af/0a6f33791b6f1fd7.json

The complete JSON record collected during the scan, including Telnet negotiation results and banner data.

{
  "server-probe": {
    "fingerprint": "c8e0f73ac58e04af",
    "fingerprint-data": {
      "offered-options": [
        "ECHO",
        "SGA"
      ],
      "probed-protocol": "server",
      "refused-options": [
        "AARDWOLF",
        "ATCP",
        "BINARY",
        "CHARSET",
        "COM_PORT",
        "EOR",
        "GMCP",
        "MSDP",
        "MSP",
        "MSSP",
        "MXP",
        "STATUS",
        "ZMP"
      ],
      "requested-options": [
        "BINARY"
      ],
      "scan-type": "quick"
    },
    "session_data": {
      "banner_after_return": "\r\n\r\n\f\u001b[0m\u001b[36mThis is a private system for the exclusive use of our membership.\r\nIn accessing this system you agree to all terms and conditions stated herein,\r\nAll programming received is assumed within the Public Domain.\r\nNo person is to violate copyright, or other lawful rules and regulations.\r\nShould any member advise us to the contrary, we will investigate and remove\r\nmaterials not compatable with any of these rules and regulations this is the\r\nsole extent of our liability.\r\nWe reserve the right to one copy for the purposes of testing, archiving, and\r\nusage for the services we provide authors/members herein in communications.\r\nThe views expressed on this system are those of the membership.\r\nWhile every effort is made legally we can not guarantee or be held liable\r\ntherefore Material submitted is the sole responsibility of the members.\r\nWe assume no liability for content, usage, ownership, reliability, or accuracy\r\nthereof.\r\nAlso! Do not use illegal means to call this system, such as stolen credit cards\r\nor any other illegal means to call here.\r\nBy typing YES you have agreed to these terms anything else would be an act of\r\nentrapment. If you do not agree to anything above Hang up now!\r\n\u001b[34m______________________________________________________________________________\r\n\r\n\u001b[9C\u001b[33mIf you agree to these regulations.....please enter:  YES\r\n\u001b[34m______________________________________________________________________________\u001b[0m\r\n\u001b[0mDo You Agree: ",
      "banner_before_return": "\r\n/X Native Telnet:  Searching for free node...\r\n/X Native Telnet:  Successful connection to node 1\r\n\r\nCONNECT 19200\r\n**EMSI_IRQ8E08\r\n\r\n\u001b[0mWelcome to CEMENT CITY, located in THE CENTRE OF THE KINGDOM\r\n\r\nRunning AmiExpress 5.6.2-dev Copyright \ufffd2018-2023 Darren Coles\r\nRegistration NONE. You are connected to Node 1 at 19200 baud\r\nConnection occured at Mon 09-Feb-2026 19:26:58.\r\n\r\nANSI, RIP or No graphics (A/r/n)? ",
      "encoding": "ascii",
      "option_states": {
        "server_offered": {
          "ECHO": true,
          "SGA": true,
          "STATUS": false
        },
        "server_requested": {
          "BINARY": true,
          "LINEMODE": false,
          "NAWS": false,
          "TSPEED": false
        }
      },
      "scan_type": "quick",
      "timing": {
        "probe": 0.5038557052612305,
        "total": 5.165609836578369
      }
    }
  },
  "sessions": [
    {
      "connected": "2026-02-09T19:27:05.129762+00:00",
      "host": "scenewall.bbs.io",
      "ip": "20.121.15.153",
      "port": 4000
    }
  ]
}

Connection Log

Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.

DEBUG client.py:863 Fingerprint client: host=scenewall.bbs.io port=4000
INFO client_base.py:174 Connected to <Peer 20.121.15.153 4000>
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC DONT NAWS
DEBUG stream_writer.py:1860 handle_dont(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:3167 local_option[NAWS] = False
DEBUG stream_writer.py:706 recv IAC WONT STATUS
DEBUG stream_writer.py:2022 handle_wont(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = False
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC DONT TSPEED
DEBUG stream_writer.py:1860 handle_dont(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:3167 local_option[TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DONT LINEMODE
DEBUG stream_writer.py:1860 handle_dont(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:3167 local_option[LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af
INFO client_base.py:105 Connection closed to <Peer 20.121.15.153 4000>

Generated by telnetlib3-fingerprint

telnetlib3-fingerprint --loglevel=debug scenewall.bbs.io 4000