216.226.144.124 (ataribbs.ddns.net)
ataribbs.ddns.net:6502
Connection Banner:
Press RETURN to continue... __ _____ __ ___ _ / \_ _/ \| _ \ | | /\ || || /\ | v / | |_||_||_||_||_|_|_\_| _____ __ / ___/__ _/ /____ _ _____ ___ __ / (_ / _ `/ __/ -_) |/|/ / _ `/ // / \___/\_,_/\__/\__/|__,__/\_,_/\_, / Southern Amis Projects 2026 /___/ ======================================== Atari BBS Gateway v8.5 (2026-02-08) Select a BBS: Page 1/2 (H) Help (Q) Quit (2) AMIS XE (4) Basement BBS (5) Boot Factory (6) Alcatraz (8) Area 52 (<) Prev Page (>) Next Page Selection:
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/2689eaf1fd58ea40.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\f __ _____ __ ___ _ \r\n / \\_ _/ \\| _ \\ | \r\n| /\\ || || /\\ | v / | \r\n|_||_||_||_||_|_|_\\_| \r\n _____ __ \r\n / ___/__ _/ /____ _ _____ ___ __\r\n/ (_ / _ `/ __/ -_) |/|/ / _ `/ // /\r\n\\___/\\_,_/\\__/\\__/|__,__/\\_,_/\\_, / \r\n Southern Amis Projects 2026 /___/ \r\n\r\n========================================\r\nAtari BBS Gateway v8.5 (2026-02-08)\r\n\r\nSelect a BBS: Page 1/2 (H) Help (Q) Quit\r\n\r\n (2) AMIS XE\r\n (4) Basement BBS\r\n (5) Boot Factory\r\n (6) Alcatraz\r\n (8) Area 52\r\n\r\n (<) Prev Page (>) Next Page\r\n\r\nSelection: ",
"banner_before_return": "\r\nPress RETURN to continue...\r\n",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5051839351654053,
"total": 5.178776741027832
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:33:53.381132+00:00",
"host": "ataribbs.ddns.net",
"ip": "216.226.144.124",
"port": 6502
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=ataribbs.ddns.net port=6502
INFO client_base.py:174 Connected to <Peer 216.226.144.124 6502>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 216.226.144.124 6502>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug ataribbs.ddns.net 6502
nitelite.ddns.net:9000
Connection Banner:
Connected to Nite Lite #50166 XEGo ATASCII - Hit RETURN:
NiteLite BBS V5.0 (c) 1985 Ascii Mode
^
_______ ^^^
Working Late |xxxxxxx| _^^^^^_
At The Nite |xxxxxxx| | [][] |
Lite BBS ______xxxxx| |[][][] |
|++++++|xxxx| | [][][]|
|++++++|xxxx| |[][][] |
|++++++|_________ [][]|
|++++++|=|=|=|=|=| [] |
|++++++|=|=|=|=|=|[][]|
___________|++HH++| _HHHH__| _______
_______________ ____________
__________________ ___________ ____
This BBS is best used with Atari Screen
mode in SyncTerm or Native Hardware
FujiNet or WiModem in Atascii.
Type OFF as the User Name/Handle and
log back on the bbs in Atascii or
SyncTerm Atari Screen Mode
Enter Your Handle:Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/59e649c509288288.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\ufffdNiteLite BBS V5.0 (c) 1985 Ascii Mode\r\n\r\n ^\r\n _______ ^^^\r\nWorking Late |xxxxxxx| _^^^^^_\r\nAt The Nite |xxxxxxx| | [][] |\r\nLite BBS ______xxxxx| |[][][] |\r\n |++++++|xxxx| | [][][]|\r\n |++++++|xxxx| |[][][] |\r\n |++++++|_________ [][]|\r\n |++++++|=|=|=|=|=| [] |\r\n |++++++|=|=|=|=|=|[][]|\r\n___________|++HH++| _HHHH__| _______\r\n _______________ ____________\r\n__________________ ___________ ____\r\n\r\nThis BBS is best used with Atari Screen\r\nmode in SyncTerm or Native Hardware\r\nFujiNet or WiModem in Atascii.\r\n\r\nType OFF as the User Name/Handle and\r\nlog back on the bbs in Atascii or\r\nSyncTerm Atari Screen Mode\r\n\r\nEnter Your Handle: ",
"banner_before_return": "Connected to Nite Lite #50166 XE\ufffdGo ATASCII - Hit RETURN: ",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5048828125,
"total": 10.060946702957153
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:34:38.164871+00:00",
"host": "nitelite.ddns.net",
"ip": "216.226.144.124",
"port": 9000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=nitelite.ddns.net port=9000
INFO client_base.py:174 Connected to <Peer 216.226.144.124 9000>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 216.226.144.124 9000>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug nitelite.ddns.net 9000