20.121.15.153 (phantasm.bbs.io)
phantasm.bbs.io:4489
Connection Banner:
/X Native Telnet: Searching for free node...
/X Native Telnet: Successful connection to node 2
CONNECT 19200
**EMSI_IRQ8E08
Welcome to Phantasm, located in The UK
Running AmiExpress 5.6.2-dev Copyright 2018-2023 Darren Coles
Registration QTX-0001. You are connected to Node 2 at 19200 baud
Connection occured at Mon 09-Feb-2026 19:26:16.
/-/ kOOL fRONTEND V1.1 bY: rEBEL/QTX \-\
\-\ dES!GN bY: nOP!/STS /-/
.------------------------------------------------------------------.
|Node| Handle/Username | Location/Group | User Ip Address |
|----+-----------------+-----------------------+-------------------|
| 00 | REbEL | * R E T I R E D * | PRIVATE |
| 02 | Connecting | | 64.227.40.173 |
| 03 | Awaiting Call | | |
| 04 | Awaiting Call | | |
`---------------------------------------------------------------|/-|/
Your Telnet Login Established from Host : N O T A V A I L A B L E |
<<-----------. <<----------------------------------------------------'
|Current iP of This System : 20.121.15.153
`----------------------------------------------------------->>
ANSI, RIP or No graphics (A/r/n)?
Enter your Name:Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 13 other servers.
Options offered by server: ECHO, SGA
Options requested from client: BINARY
Data source: c8e0f73ac58e04af/6bb1afaef012304f.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "c8e0f73ac58e04af",
"fingerprint-data": {
"offered-options": [
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\nEnter your Name: ",
"banner_before_return": "\r\n/X Native Telnet: Searching for free node...\r\n/X Native Telnet: Successful connection to node 2\r\n\r\nCONNECT 19200\r\n**EMSI_IRQ8E08\r\n\r\n\u001b[0mWelcome to Phantasm, located in The UK\r\n\r\nRunning AmiExpress 5.6.2-dev Copyright \ufffd2018-2023 Darren Coles\r\nRegistration QTX-0001. You are connected to Node 2 at 19200 baud\r\nConnection occured at Mon 09-Feb-2026 19:26:16.\r\n\r\n\u001b[0m \u001b[32m/\u001b[33m-\u001b[34m/\u001b[37m kOOL fRONTEND V1.1 bY: rEBEL/QTX \u001b[34m\\\u001b[33m-\u001b[32m\\\r\n \u001b[32m\\\u001b[33m-\u001b[34m\\ \u001b[37mdES!GN bY: nOP!/STS \u001b[34m/\u001b[33m-\u001b[32m/\r\n \u001b[35m.------------------------------------------------------------------.\r\n \u001b[35m|\u001b[34mNode\u001b[35m| \u001b[34mHandle/Username \u001b[35m| \u001b[34mLocation/Group \u001b[35m| \u001b[34mUser Ip Address \u001b[35m|\r\n \u001b[35m|----+-----------------+-----------------------+-------------------|\r\n \u001b[35m | \u001b[32m00 \u001b[35m| \u001b[37mREbEL \u001b[35m| \u001b[37m * R E T I R E D * \u001b[35m|\u001b[36m PRIVATE \u001b[35m|\r\n \u001b[35m | \u001b[32m02 \u001b[35m| \u001b[37mConnecting \u001b[35m| \u001b[37m \u001b[35m|\u001b[36m 64.227.40.173 \u001b[35m|\r\n \u001b[35m | \u001b[32m03 \u001b[35m| \u001b[37mAwaiting Call \u001b[35m| \u001b[37m \u001b[35m|\u001b[36m \u001b[35m|\r\n \u001b[35m | \u001b[32m04 \u001b[35m| \u001b[37mAwaiting Call \u001b[35m| \u001b[37m \u001b[35m|\u001b[36m \u001b[35m|\r\n \u001b[35m `----\ufffd-----------------\ufffd-----------------------\ufffd-------------------|/-|/\r\n \u001b[32mYour Telnet Login Established from Host : \u001b[37mN O T A V A I L A B L E \u001b[35m|\r\n \u001b[35m<<-----------. <<----------------------------------------------------'\r\n \u001b[35m|\u001b[32mCurrent iP of This System \u001b[32m: \u001b[37m20.121.15.153\r\n \u001b[35m`----------------------------------------------------------->>\r\n\u001b[0m\r\n\u001b[0mANSI, RIP or No graphics (A/r/n)? ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true,
"STATUS": false
},
"server_requested": {
"BINARY": true,
"LINEMODE": false,
"NAWS": false,
"TSPEED": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5033543109893799,
"total": 5.1630823612213135
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:26:23.727987+00:00",
"host": "phantasm.bbs.io",
"ip": "20.121.15.153",
"port": 4489
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=phantasm.bbs.io port=4489
INFO client_base.py:174 Connected to <Peer 20.121.15.153 4489>
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC DONT NAWS
DEBUG stream_writer.py:1860 handle_dont(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:3167 local_option[NAWS] = False
DEBUG stream_writer.py:706 recv IAC WONT STATUS
DEBUG stream_writer.py:2022 handle_wont(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = False
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC DONT TSPEED
DEBUG stream_writer.py:1860 handle_dont(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:3167 local_option[TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DONT LINEMODE
DEBUG stream_writer.py:1860 handle_dont(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:3167 local_option[LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af
INFO client_base.py:105 Connection closed to <Peer 20.121.15.153 4489>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug phantasm.bbs.io 4489
scenewall.bbs.io:4000
Connection Banner:
/X Native Telnet: Searching for free node... /X Native Telnet: Successful connection to node 1 CONNECT 19200 **EMSI_IRQ8E08 Welcome to CEMENT CITY, located in THE CENTRE OF THE KINGDOM Running AmiExpress 5.6.2-dev Copyright 2018-2023 Darren Coles Registration NONE. You are connected to Node 1 at 19200 baud Connection occured at Mon 09-Feb-2026 19:26:58. ANSI, RIP or No graphics (A/r/n)? This is a private system for the exclusive use of our membership. In accessing this system you agree to all terms and conditions stated herein, All programming received is assumed within the Public Domain. No person is to violate copyright, or other lawful rules and regulations. Should any member advise us to the contrary, we will investigate and remove materials not compatable with any of these rules and regulations this is the sole extent of our liability. We reserve the right to one copy for the purposes of testing, archiving, and usage for the services we provide authors/members herein in communications. The views expressed on this system are those of the membership. While every effort is made legally we can not guarantee or be held liable therefore Material submitted is the sole responsibility of the members. We assume no liability for content, usage, ownership, reliability, or accuracy thereof. Also! Do not use illegal means to call this system, such as stolen credit cards or any other illegal means to call here. By typing YES you have agreed to these terms anything else would be an act of entrapment. If you do not agree to anything above Hang up now! ______________________________________________________________________________ If you agree to these regulations.....please enter: YES ______________________________________________________________________________ Do You Agree:
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 13 other servers.
Options offered by server: ECHO, SGA
Options requested from client: BINARY
Data source: c8e0f73ac58e04af/0a6f33791b6f1fd7.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "c8e0f73ac58e04af",
"fingerprint-data": {
"offered-options": [
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\n\f\u001b[0m\u001b[36mThis is a private system for the exclusive use of our membership.\r\nIn accessing this system you agree to all terms and conditions stated herein,\r\nAll programming received is assumed within the Public Domain.\r\nNo person is to violate copyright, or other lawful rules and regulations.\r\nShould any member advise us to the contrary, we will investigate and remove\r\nmaterials not compatable with any of these rules and regulations this is the\r\nsole extent of our liability.\r\nWe reserve the right to one copy for the purposes of testing, archiving, and\r\nusage for the services we provide authors/members herein in communications.\r\nThe views expressed on this system are those of the membership.\r\nWhile every effort is made legally we can not guarantee or be held liable\r\ntherefore Material submitted is the sole responsibility of the members.\r\nWe assume no liability for content, usage, ownership, reliability, or accuracy\r\nthereof.\r\nAlso! Do not use illegal means to call this system, such as stolen credit cards\r\nor any other illegal means to call here.\r\nBy typing YES you have agreed to these terms anything else would be an act of\r\nentrapment. If you do not agree to anything above Hang up now!\r\n\u001b[34m______________________________________________________________________________\r\n\r\n\u001b[9C\u001b[33mIf you agree to these regulations.....please enter: YES\r\n\u001b[34m______________________________________________________________________________\u001b[0m\r\n\u001b[0mDo You Agree: ",
"banner_before_return": "\r\n/X Native Telnet: Searching for free node...\r\n/X Native Telnet: Successful connection to node 1\r\n\r\nCONNECT 19200\r\n**EMSI_IRQ8E08\r\n\r\n\u001b[0mWelcome to CEMENT CITY, located in THE CENTRE OF THE KINGDOM\r\n\r\nRunning AmiExpress 5.6.2-dev Copyright \ufffd2018-2023 Darren Coles\r\nRegistration NONE. You are connected to Node 1 at 19200 baud\r\nConnection occured at Mon 09-Feb-2026 19:26:58.\r\n\r\nANSI, RIP or No graphics (A/r/n)? ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true,
"STATUS": false
},
"server_requested": {
"BINARY": true,
"LINEMODE": false,
"NAWS": false,
"TSPEED": false
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5038557052612305,
"total": 5.165609836578369
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:27:05.129762+00:00",
"host": "scenewall.bbs.io",
"ip": "20.121.15.153",
"port": 4000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=scenewall.bbs.io port=4000
INFO client_base.py:174 Connected to <Peer 20.121.15.153 4000>
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC DONT NAWS
DEBUG stream_writer.py:1860 handle_dont(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:3167 local_option[NAWS] = False
DEBUG stream_writer.py:706 recv IAC WONT STATUS
DEBUG stream_writer.py:2022 handle_wont(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = False
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC DONT TSPEED
DEBUG stream_writer.py:1860 handle_dont(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:3167 local_option[TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DONT LINEMODE
DEBUG stream_writer.py:1860 handle_dont(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:3167 local_option[LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af
INFO client_base.py:105 Connection closed to <Peer 20.121.15.153 4000>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug scenewall.bbs.io 4000