72.132.47.20 (sanctumbbs.com)
sanctumbbs.com:6502
Connection Banner:
Connect at [2400] baud!
+------ +------ +--- +-- +----- +-------- +-- +-- +--- +---
+-- +-- +-- +-- +---- +-- +-- +-- +-- +-- +-- +---- +----
+-- +-- +-- +--+-- +-- +-- +-- +-- +-- +-- +-- +--
+------ +-------- +-- +-- +-- +-- +-- +-- +-- +-- + +--
+-- +-- +-- +-- +--+-- +-- +-- +-- +-- +-- +--
+-- +-- +-- +-- +---- +-- +-- +-- +-- +-- +--
+-- +-- +-- +-- +-- +--- +-- +-- +-- +-- --- +-- +--
+------ +-- +-- +-- +-- +------ +-- +------ +-- +--
Online since 1982 +----- +----- Running GBBS Pro 1.3j
Hardware History: +--- +--- Using the ACOS compiler
Apple ][+ 1 Mhz +--- +--- Running on AppleWin
And then we had a bunch +--- +--- Translating Telnet to
of Windows PCs from +--- +--- an emulated 9600 baud
a 286 through a quad +--- +--- modem via NetSerial
core Xeon. But now? +--- +--- from PC Microsystems
Apple //e! 1 mhz FTW! +----- +----- Big thanks to Skip and JD!
New users type "NEW", and please remember your user number you are given.
You will need it in order to log on again!
Enter your Account Number or NEW if you are a new user:
-->Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 3 other servers.
Options offered by server: COM_PORT, ECHO, SGA
Options requested from client: BINARY
Data source: e1726bffaa9086d0/7e6cd1e6e8232177.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "e1726bffaa9086d0",
"fingerprint-data": {
"offered-options": [
"COM_PORT",
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\f\r\nConnect at [2400] baud!\r\n\r\n\r\n +------ +------ +--- +-- +----- +-------- +-- +-- +--- +---\r\n +-- +-- +-- +-- +---- +-- +-- +-- +-- +-- +-- +---- +----\r\n +-- +-- +-- +--+-- +-- +-- +-- +-- +-- +-- +-- +--\r\n +------ +-------- +-- +-- +-- +-- +-- +-- +-- +-- + +--\r\n +-- +-- +-- +-- +--+-- +-- +-- +-- +-- +-- +--\r\n +-- +-- +-- +-- +---- +-- +-- +-- +-- +-- +--\r\n +-- +-- +-- +-- +-- +--- +-- +-- +-- +-- --- +-- +--\r\n +------ +-- +-- +-- +-- +------ +-- +------ +-- +--\r\n\r\n Online since 1982 +----- +----- Running GBBS Pro 1.3j\r\n Hardware History: +--- +--- Using the ACOS compiler\r\n Apple ][+ 1 Mhz +--- +--- Running on AppleWin\r\n And then we had a bunch +--- +--- Translating Telnet to\r\n of Windows PCs from +--- +--- an emulated 9600 baud\r\n a 286 through a quad +--- +--- modem via NetSerial\r\n core Xeon. But now? +--- +--- from PC Microsystems\r\n Apple //e! 1 mhz FTW! +----- +----- Big thanks to Skip and JD!\r\n\r\nNew users type \"NEW\", and please remember your user number you are given.\r\nYou will need it in order to log on again!\r\n\r\nEnter your Account Number or NEW if you are a new user:\r\n-->",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true
},
"server_requested": {
"BINARY": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.505218505859375,
"total": 5.870160818099976
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:28:19.454346+00:00",
"host": "sanctumbbs.com",
"ip": "72.132.47.20",
"port": 6502
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=sanctumbbs.com port=6502
INFO client_base.py:174 Connected to <Peer 72.132.47.20 6502>
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:921 skip DO SGA; pending_option = True
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC WONT STATUS
DEBUG stream_writer.py:2022 handle_wont(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = False
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC WONT CHARSET
DEBUG stream_writer.py:2022 handle_wont(CHARSET)
DEBUG stream_writer.py:3167 remote_option[CHARSET] = False
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:706 recv IAC WONT EOR
DEBUG stream_writer.py:2022 handle_wont(EOR)
DEBUG stream_writer.py:3167 remote_option[EOR] = False
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = False
DEBUG stream_writer.py:706 recv IAC WILL COM_PORT_OPTION
DEBUG stream_writer.py:1897 handle_will(COM_PORT_OPTION)
DEBUG stream_writer.py:921 skip DO COM_PORT_OPTION; pending_option = True
DEBUG stream_writer.py:3167 remote_option[COM_PORT_OPTION] = True
DEBUG stream_writer.py:1061 send IAC SB COM-PORT-OPTION SIGNATURE IAC SE
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:706 recv IAC WONT GMCP
DEBUG stream_writer.py:2022 handle_wont(GMCP)
DEBUG stream_writer.py:3167 remote_option[GMCP] = False
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSDP
DEBUG stream_writer.py:2022 handle_wont(MSDP)
DEBUG stream_writer.py:3167 remote_option[MSDP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSSP
DEBUG stream_writer.py:2022 handle_wont(MSSP)
DEBUG stream_writer.py:3167 remote_option[MSSP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSP
DEBUG stream_writer.py:2022 handle_wont(MSP)
DEBUG stream_writer.py:3167 remote_option[MSP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = False
DEBUG stream_writer.py:706 recv IAC WONT MXP
DEBUG stream_writer.py:2022 handle_wont(MXP)
DEBUG stream_writer.py:3167 remote_option[MXP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = False
DEBUG stream_writer.py:706 recv IAC WONT ZMP
DEBUG stream_writer.py:2022 handle_wont(ZMP)
DEBUG stream_writer.py:3167 remote_option[ZMP] = False
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:706 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2022 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3167 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:706 recv IAC WONT ATCP
DEBUG stream_writer.py:2022 handle_wont(ATCP)
DEBUG stream_writer.py:3167 remote_option[ATCP] = False
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint e1726bffaa9086d0
INFO client_base.py:105 Connection closed to <Peer 72.132.47.20 6502>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug sanctumbbs.com 6502
telnet.sanctumbbs.com:23
Connection Banner:
Mystic BBS v1.10 for Windows Node 1 Copyright (C) 1997-2015 By James Coyle Detecting terminal emulation:
BBS Software
Detected: Mystic BBS
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 13 other servers.
Options offered by server: ECHO, SGA
Options requested from client: BINARY
Data source: c8e0f73ac58e04af/938bf73ec74b0c70.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "c8e0f73ac58e04af",
"fingerprint-data": {
"offered-options": [
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"BINARY"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\fMystic BBS v1.10 for Windows Node 1\r\nCopyright (C) 1997-2015 By James Coyle\r\n\r\nDetecting terminal emulation: \u001b[6n",
"banner_before_return": "",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true
},
"server_requested": {
"BINARY": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.507530927658081,
"total": 5.3295533657073975
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:35:06.293460+00:00",
"host": "telnet.sanctumbbs.com",
"ip": "72.132.47.20",
"port": 23
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=telnet.sanctumbbs.com port=23
INFO client_base.py:174 Connected to <Peer 72.132.47.20 23>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG stream_writer.py:706 recv IAC DO BINARY
DEBUG stream_writer.py:1767 handle_do(BINARY)
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = True
DEBUG stream_writer.py:947 send IAC WILL BINARY
DEBUG stream_writer.py:3167 local_option[BINARY] = True
DEBUG stream_writer.py:3167 pending_option[WILL + BINARY] = False
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
DEBUG stream_writer.py:706 recv IAC WONT STATUS
DEBUG stream_writer.py:2022 handle_wont(STATUS)
DEBUG stream_writer.py:3167 remote_option[STATUS] = False
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = False
DEBUG stream_writer.py:706 recv IAC WONT CHARSET
DEBUG stream_writer.py:2022 handle_wont(CHARSET)
DEBUG stream_writer.py:3167 remote_option[CHARSET] = False
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = False
DEBUG stream_writer.py:706 recv IAC WONT EOR
DEBUG stream_writer.py:2022 handle_wont(EOR)
DEBUG stream_writer.py:3167 remote_option[EOR] = False
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = False
DEBUG stream_writer.py:706 recv IAC WONT COM_PORT_OPTION
DEBUG stream_writer.py:2022 handle_wont(COM_PORT_OPTION)
DEBUG stream_writer.py:3167 remote_option[COM_PORT_OPTION] = False
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = False
DEBUG stream_writer.py:706 recv IAC WONT GMCP
DEBUG stream_writer.py:2022 handle_wont(GMCP)
DEBUG stream_writer.py:3167 remote_option[GMCP] = False
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSDP
DEBUG stream_writer.py:2022 handle_wont(MSDP)
DEBUG stream_writer.py:3167 remote_option[MSDP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSSP
DEBUG stream_writer.py:2022 handle_wont(MSSP)
DEBUG stream_writer.py:3167 remote_option[MSSP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = False
DEBUG stream_writer.py:706 recv IAC WONT MSP
DEBUG stream_writer.py:2022 handle_wont(MSP)
DEBUG stream_writer.py:3167 remote_option[MSP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = False
DEBUG stream_writer.py:706 recv IAC WONT MXP
DEBUG stream_writer.py:2022 handle_wont(MXP)
DEBUG stream_writer.py:3167 remote_option[MXP] = False
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = False
DEBUG stream_writer.py:706 recv IAC WONT ZMP
DEBUG stream_writer.py:2022 handle_wont(ZMP)
DEBUG stream_writer.py:3167 remote_option[ZMP] = False
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = False
DEBUG stream_writer.py:706 recv IAC WONT AARDWOLF
DEBUG stream_writer.py:2022 handle_wont(AARDWOLF)
DEBUG stream_writer.py:3167 remote_option[AARDWOLF] = False
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = False
DEBUG stream_writer.py:706 recv IAC WONT ATCP
DEBUG stream_writer.py:2022 handle_wont(ATCP)
DEBUG stream_writer.py:3167 remote_option[ATCP] = False
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = False
INFO fingerprinting.py:746 connection for server fingerprint c8e0f73ac58e04af
INFO client_base.py:105 Connection closed to <Peer 72.132.47.20 23>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug telnet.sanctumbbs.com 23