68.197.140.28 (twb.wrgnbr.com)
twb.wrgnbr.com:6896
Connection Banner:
CONNECTED TO THE TIMEWARP BBS!
HIT RETURN
@\[!
commodore petscii graphics? (y/n)?Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/ac58cae92f38a7e6.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u0007\r\r\n\ufffd@\\\t\u001b[!\u001b[5n\u000e\u0002\ufffd\ufffd\ufffd\u001e\r\n\r\n\r\b\b\b\b\b\b\b\u001c\rcommodore petscii graphics? (y/n)? ",
"banner_before_return": "\r\n\rCONNECTED TO THE TIMEWARP BBS!\r\r\n\n\r\u0007 HIT RETURN",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5038070678710938,
"total": 7.199013948440552
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:28:09.525008+00:00",
"host": "twb.wrgnbr.com",
"ip": "68.197.140.28",
"port": 6896
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=twb.wrgnbr.com port=6896
INFO client_base.py:174 Connected to <Peer 68.197.140.28 6896>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 68.197.140.28 6896>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug twb.wrgnbr.com 6896
wn2.wrgnbr.com:6405
Connection Banner:
Synchronet BBS for Win32 Version 3.19
Telnet connection from: 64.227.40.173
_[!_
_
Synchronet BBS for Win32 Version 3.19 Copyright 2022 Rob Swindell
CLIENT >>>>CONN: Telnet
>>>>ADDR: <no name> [64.227.40.173]
SERVER >>>>NAME: Wrong Number Family Server
>>>>ADDR: wn2.duckdns.org
>>>>NODE: 1 (of 20)
>>>>TIME: Mon Feb 09 2026 02:33 pm EST
>>>>ADMN: Al DeRosa
If you are a new user to the system, type "New" now.
Otherwise, enter your user name or number now.
Enter User Name or Number or 'New'
Login:BBS Software
Detected: Synchronet
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 232 other servers.
Options offered by server: AARDWOLF, ATCP, BINARY, CHARSET, COM_PORT, ECHO, EOR, GMCP, MSDP, MSP, MSSP, MXP, SGA, STATUS, ZMP
Options requested from client: NAWS, NEW_ENVIRON, TSPEED, TTYPE
Data source: d06e080c36c73c6a/b6cddc299f835351.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "d06e080c36c73c6a",
"fingerprint-data": {
"offered-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"NAWS",
"NEW_ENVIRON",
"TSPEED",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\nEnter User Name or Number or 'New'\r\nLogin: ",
"banner_before_return": "\r\nSynchronet BBS for Win32 Version 3.19\r\nTelnet connection from: 64.227.40.173\r\n\r\n\u001b[s\u001b[0c\u001b[255B\u001b[255C\b_\u001b[6n\u001b[u\u001b[!_\r\ufffd\ufffd\ufffd\u001b[6n\u001b[0m_\u001b[2J\u001b[H\f\r\r Synchronet BBS for Win32 Version 3.19 Copyright 2022 Rob Swindell\r\nCLIENT >>>>\b\b\b\bCONN: Telnet\r\n >>>>\b\b\b\bADDR: <no name> [64.227.40.173]\r\nSERVER >>>>\b\b\b\bNAME: Wrong Number Family Server\r\n >>>>\b\b\b\bADDR: wn2.duckdns.org\r\n >>>>\b\b\b\bNODE: 1 (of 20)\r\n >>>>\b\b\b\bTIME: Mon Feb 09 2026 02:33 pm EST\r\n >>>>\b\b\b\bADMN: Al DeRosa\r\n\r\nIf you are a new user to the system, type \"New\" now.\r\nOtherwise, enter your user name or number now.\r\n\r\nEnter User Name or Number or 'New'\r\nLogin: ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true
},
"server_requested": {
"NAWS": true,
"NEW_ENVIRON": true,
"SNDLOC": false,
"TSPEED": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.20245862007141113,
"total": 6.992478370666504
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:33:29.260876+00:00",
"host": "wn2.wrgnbr.com",
"ip": "68.197.140.28",
"port": 6405
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=wn2.wrgnbr.com port=6405
INFO client_base.py:174 Connected to <Peer 68.197.140.28 6405>
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC DO TTYPE
DEBUG stream_writer.py:1767 handle_do(TTYPE)
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:947 send IAC WILL TTYPE
DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3167 local_option[TTYPE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:706 recv IAC DO TSPEED
DEBUG stream_writer.py:1767 handle_do(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = True
DEBUG stream_writer.py:947 send IAC WILL TSPEED
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = True
DEBUG stream_writer.py:3167 local_option[TSPEED] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DO SNDLOC
DEBUG stream_writer.py:1767 handle_do(SNDLOC)
DEBUG stream_writer.py:1845 DO SNDLOC not supported.
DEBUG stream_writer.py:3167 local_option[SNDLOC] = False
DEBUG stream_writer.py:947 send IAC WONT SNDLOC
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:706 recv IAC DO NEW_ENVIRON
DEBUG stream_writer.py:1767 handle_do(NEW_ENVIRON)
DEBUG stream_writer.py:3167 pending_option[WILL + NEW_ENVIRON] = True
DEBUG stream_writer.py:947 send IAC WILL NEW_ENVIRON
DEBUG stream_writer.py:3167 pending_option[SB + NEW_ENVIRON] = True
DEBUG stream_writer.py:3167 local_option[NEW_ENVIRON] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NEW_ENVIRON] = False
DEBUG stream_writer.py:706 recv IAC DONT SNDLOC
DEBUG stream_writer.py:1860 handle_dont(SNDLOC)
DEBUG stream_writer.py:3167 pending_option[WILL + SNDLOC] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:685 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2234 recv TTYPE SEND: b''
DEBUG stream_writer.py:2247 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG stream_writer.py:698 begin sub-negotiation SB TSPEED
DEBUG stream_writer.py:685 sub-negotiation cmd TSPEED SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = False
DEBUG stream_writer.py:2166 recv TSPEED SEND: b''
DEBUG stream_writer.py:2197 send: IAC SB TSPEED IS b'38400',b'38400' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB NEW_ENVIRON'
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL BINARY
DEBUG stream_writer.py:1897 handle_will(BINARY)
DEBUG stream_writer.py:921 skip DO BINARY; pending_option = True
DEBUG stream_writer.py:3167 remote_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL STATUS
DEBUG stream_writer.py:1897 handle_will(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = True
DEBUG stream_writer.py:1038 send IAC SB STATUS SEND IAC SE
DEBUG stream_writer.py:3167 pending_option[SB + STATUS] = True
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC WILL CHARSET
DEBUG stream_writer.py:1897 handle_will(CHARSET)
DEBUG stream_writer.py:921 skip DO CHARSET; pending_option = True
DEBUG stream_writer.py:3167 remote_option[CHARSET] = True
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:706 recv IAC WILL EOR
DEBUG stream_writer.py:1897 handle_will(EOR)
DEBUG stream_writer.py:921 skip DO EOR; pending_option = True
DEBUG stream_writer.py:3167 remote_option[EOR] = True
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = False
DEBUG stream_writer.py:706 recv IAC WILL COM_PORT_OPTION
DEBUG stream_writer.py:1897 handle_will(COM_PORT_OPTION)
DEBUG stream_writer.py:921 skip DO COM_PORT_OPTION; pending_option = True
DEBUG stream_writer.py:3167 remote_option[COM_PORT_OPTION] = True
DEBUG stream_writer.py:1061 send IAC SB COM-PORT-OPTION SIGNATURE IAC SE
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:706 recv IAC WILL GMCP
DEBUG stream_writer.py:1897 handle_will(GMCP)
DEBUG stream_writer.py:921 skip DO GMCP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[GMCP] = True
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:706 recv IAC WILL MSDP
DEBUG stream_writer.py:1897 handle_will(MSDP)
DEBUG stream_writer.py:921 skip DO MSDP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[MSDP] = True
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:706 recv IAC WILL MSSP
DEBUG stream_writer.py:1897 handle_will(MSSP)
DEBUG stream_writer.py:921 skip DO MSSP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[MSSP] = True
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:706 recv IAC WILL MSP
DEBUG stream_writer.py:1897 handle_will(MSP)
DEBUG stream_writer.py:921 skip DO MSP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[MSP] = True
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = False
DEBUG stream_writer.py:706 recv IAC WILL MXP
DEBUG stream_writer.py:1897 handle_will(MXP)
DEBUG stream_writer.py:921 skip DO MXP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[MXP] = True
DEBUG stream_writer.py:3167 pending_option[SB + MXP] = True
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = False
DEBUG stream_writer.py:706 recv IAC WILL ZMP
DEBUG stream_writer.py:1897 handle_will(ZMP)
DEBUG stream_writer.py:921 skip DO ZMP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[ZMP] = True
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:706 recv IAC WILL AARDWOLF
DEBUG stream_writer.py:1897 handle_will(AARDWOLF)
DEBUG stream_writer.py:921 skip DO AARDWOLF; pending_option = True
DEBUG stream_writer.py:3167 remote_option[AARDWOLF] = True
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:706 recv IAC WILL ATCP
DEBUG stream_writer.py:1897 handle_will(ATCP)
DEBUG stream_writer.py:921 skip DO ATCP; pending_option = True
DEBUG stream_writer.py:3167 remote_option[ATCP] = True
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint d06e080c36c73c6a
INFO client_base.py:105 Connection closed to <Peer 68.197.140.28 6405>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug wn2.wrgnbr.com 6405
wn3.wrgnbr.com:6400
Connection Banner:
telnetd.device: Waiting for unit to answer. telnetd.device: Connected to TCP/IP port 6400 unit 1.
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 18 other servers.
Options offered by server: BINARY, ECHO, SGA, STATUS
Options requested from client: BINARY, LINEMODE, NAWS, TSPEED
Data source: 0e8c326f7449f30f/d915cca980c24925.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "0e8c326f7449f30f",
"fingerprint-data": {
"offered-options": [
"BINARY",
"ECHO",
"SGA",
"STATUS"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"ZMP"
],
"requested-options": [
"BINARY",
"LINEMODE",
"NAWS",
"TSPEED"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\r\ntelnetd.device: Waiting for unit to answer.\r\ntelnetd.device: Connected to TCP/IP port 6400 unit 1.\r\n\u0007\r\n",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true,
"STATUS": true
},
"server_requested": {
"BINARY": true,
"LINEMODE": true,
"NAWS": true,
"TSPEED": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.30544233322143555,
"total": 5.850842475891113
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:33:45.869984+00:00",
"host": "wn3.wrgnbr.com",
"ip": "68.197.140.28",
"port": 6400
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=wn3.wrgnbr.com port=6400
INFO client_base.py:174 Connected to <Peer 68.197.140.28 6400>
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:706 recv IAC WILL STATUS
DEBUG stream_writer.py:722 WILL STATUS unsolicited
DEBUG stream_writer.py:1897 handle_will(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = True
DEBUG stream_writer.py:1038 send IAC SB STATUS SEND IAC SE
DEBUG stream_writer.py:3167 pending_option[SB + STATUS] = True
DEBUG stream_writer.py:706 recv IAC DO TSPEED
DEBUG stream_writer.py:1767 handle_do(TSPEED)
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = True
DEBUG stream_writer.py:947 send IAC WILL TSPEED
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = True
DEBUG stream_writer.py:3167 local_option[TSPEED] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TSPEED] = False
DEBUG stream_writer.py:706 recv IAC DO LINEMODE
DEBUG stream_writer.py:1767 handle_do(LINEMODE)
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = True
DEBUG stream_writer.py:947 send IAC WILL LINEMODE
DEBUG stream_writer.py:3167 pending_option[SB + LINEMODE] = True
DEBUG stream_writer.py:3167 local_option[LINEMODE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + LINEMODE] = False
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:698 begin sub-negotiation SB TSPEED
DEBUG stream_writer.py:685 sub-negotiation cmd TSPEED SE completion byte
DEBUG stream_writer.py:3167 pending_option[SB + TSPEED] = False
DEBUG stream_writer.py:2166 recv TSPEED SEND: b''
DEBUG stream_writer.py:2197 send: IAC SB TSPEED IS b'38400',b'38400' IAC SE
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB STATUS, SB LINEMODE'
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL BINARY
DEBUG stream_writer.py:1897 handle_will(BINARY)
DEBUG stream_writer.py:921 skip DO BINARY; pending_option = True
DEBUG stream_writer.py:3167 remote_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WONT CHARSET
DEBUG stream_writer.py:2022 handle_wont(CHARSET)
DEBUG stream_writer.py:3167 remote_option[CHARSET] = False
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:706 recv IAC WONT EOR
DEBUG stream_writer.py:2022 handle_wont(EOR)
DEBUG stream_writer.py:3167 remote_option[EOR] = False
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = False
DEBUG stream_writer.py:706 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2022 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3167 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:706 recv IAC WONT GMCP
DEBUG stream_writer.py:2022 handle_wont(GMCP)
DEBUG stream_writer.py:3167 remote_option[GMCP] = False
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSDP
DEBUG stream_writer.py:2022 handle_wont(MSDP)
DEBUG stream_writer.py:3167 remote_option[MSDP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSSP
DEBUG stream_writer.py:2022 handle_wont(MSSP)
DEBUG stream_writer.py:3167 remote_option[MSSP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSP
DEBUG stream_writer.py:2022 handle_wont(MSP)
DEBUG stream_writer.py:3167 remote_option[MSP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = False
DEBUG stream_writer.py:706 recv IAC WONT MXP
DEBUG stream_writer.py:2022 handle_wont(MXP)
DEBUG stream_writer.py:3167 remote_option[MXP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = False
DEBUG stream_writer.py:706 recv IAC WONT ZMP
DEBUG stream_writer.py:2022 handle_wont(ZMP)
DEBUG stream_writer.py:3167 remote_option[ZMP] = False
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:706 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2022 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3167 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:706 recv IAC WONT ATCP
DEBUG stream_writer.py:2022 handle_wont(ATCP)
DEBUG stream_writer.py:3167 remote_option[ATCP] = False
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint 0e8c326f7449f30f
INFO client_base.py:105 Connection closed to <Peer 68.197.140.28 6400>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug wn3.wrgnbr.com 6400
wn4.wrgnbr.com:3000
Connection Banner:
BOTS BEWARE! A CUBE INC. FILE! PRESS / TWICE TO CONTINUE: ADIOS! IF YOU DIDN'T GET A CHANCE TO LOGIN, USE WN4.WRGNBR.COM:6482!!
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 46 other servers.
Data source: c2dd7d4e76383b41/66820b00c5775400.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "c2dd7d4e76383b41",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\nADIOS! IF YOU DIDN'T GET A CHANCE \r\n\r\nTO LOGIN, USE WN4.WRGNBR.COM:6482!!\r\n\r\n\r\n\r\n",
"banner_before_return": "\u001b[2J\u001b[H\r\n\r\nBOTS BEWARE! A CUBE INC. FILE! \r\n\r\nPRESS / TWICE TO CONTINUE: ",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true
},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 2.592890977859497
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:29:20.015507+00:00",
"host": "wn4.wrgnbr.com",
"ip": "68.197.140.28",
"port": 3000
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=wn4.wrgnbr.com port=3000
INFO client_base.py:174 Connected to <Peer 68.197.140.28 3000>
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG client_base.py:88 EOF from server, closing.
INFO client_base.py:105 Connection closed to <Peer 68.197.140.28 3000>
INFO fingerprinting.py:746 connection for server fingerprint c2dd7d4e76383b41
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug wn4.wrgnbr.com 3000
wn6.wrgnbr.com:6411
Connection Banner:
IMAGE BBS V1.2 S# G0001
(C)1989 NEW IMAGE SOFTWARE, INC.
19200 baud connection confirmed.
[smack delete]:
ASCII Mode On.
Do You Want ANSI Color?Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/4a664fdc1f467d84.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\n\r\n ASCII Mode On. \r\n\r\nDo You Want ANSI Color? ",
"banner_before_return": "\n\r\n\r\n\u0007\r\n IMAGE BBS V1.2 S# G0001\r\n (C)1989 NEW IMAGE SOFTWARE, INC.\r\n\r\n\r\n19200 baud connection confirmed.\r\n\u001b[6n\r\n[smack delete]: \u0007",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5063505172729492,
"total": 8.046867847442627
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:27:10.837890+00:00",
"host": "wn6.wrgnbr.com",
"ip": "68.197.140.28",
"port": 6411
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=wn6.wrgnbr.com port=6411
INFO client_base.py:174 Connected to <Peer 68.197.140.28 6411>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 68.197.140.28 6411>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug wn6.wrgnbr.com 6411