play.ddgame.us:23
Connection Banner:
CARRIER DETECTED PC emulation enabled ...........|\...................../|................. Welcome to ........./ \..|\__ __/|......./ \............... Dank Domain ........./ / \.\ _ \/ _ /....../ \............. _ .........../ / / \.(-)\/(-)....../ / \ \............. (_) ..........| | | / \\/(oo)\/...../ // |\ \............. ..........| | | | \|v--v|\..../ / | || \|........... ............| | | | / \_^^_/ \../ / || || ||............. ......../ / / | | \/ \/ /| || || ||/\../\.... /\..../ / / / / |______/ /| \ \ || || \/ \ /\/\ /\/\/ \../ / / / / /\_____/ |/ /__\ \ \ \ \ / \ / \ /\ / \ / \/\ / / \.| | | / / /\______/ \ \__| \ \ \\/ \/ \/ \ \ \/\| | | | | |\______\_ \__|_| \/\ / \/| | ____ /\______ ____\_\ | // \| |/ /\_____ / \\__\ | \|/ | |\______ ||\___ \| | |\______ ||\_ _ ___/| |\______ ||/\ \ ___ / \_/\ \________\_ _\____/ / \__\_| \ ___/ ____/ /__/ /__ \__/__\__ _/ / \ / ___// ___/ \/ \|__ |||/|/|/|/\__ \\| Who dares to enter my dank domain <or NEW>? Invalid response. The guards eye you suspiciously. Who dares to enter my dank domain <or NEW>?
Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is unique to this server.
Options offered by server: ECHO, SGA
Options requested from client: NAWS, NEW_ENVIRON, SGA, TTYPE
Data source: dc428c0d4ea8d742/da23e8a676f893a7.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "dc428c0d4ea8d742",
"fingerprint-data": {
"offered-options": [
"ECHO",
"SGA"
],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"STATUS",
"ZMP"
],
"requested-options": [
"NAWS",
"NEW_ENVIRON",
"SGA",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\u001b[m\r\n\u0007Invalid response.\r\n\r\n\u001b[2mThe guards eye you suspiciously.\u001b[m\r\n\r\n\u001b[36mWho dares to enter my dank domain \u001b[m\u001b[2m<\u001b[22;1;37mor NEW\u001b[22;2m>\u001b[m? \u001b[37;1m",
"banner_before_return": "\u001b[m\u001b[31;1mC\u001b[33mA\u001b[32mR\u001b[36mR\u001b[34mI\u001b[35mE\u001b[37mR\u001b[22m \u001b[2mDETECTED\u001b[m\r\n\u001b[36;1mPC\u001b[22m emulation \u001b[2menabled\u001b[m\r\n\r\n\u001b[34m\u001b[12C...........\u001b[32m|\\\u001b[34m.....................\u001b[32m/|\u001b[34m................. \u001b[37mWelcome to\u001b[34m\r\n\u001b[13C.........\u001b[32m/ \\\u001b[34m..\u001b[32m|\\__ __/|\u001b[34m.......\u001b[32m/ \\\u001b[34m............... \u001b[37mDank Domain\u001b[34m\r\n\u001b[12C.........\u001b[32m/ / \\\u001b[34m.\u001b[32m\\ _ \\/ _ /\u001b[34m......\u001b[32m/ \\\u001b[34m.............\u001b[1;33m\r\n\u001b[6C_\u001b[0;34m ...........\u001b[32m/ / / \\\u001b[34m.\u001b[32m(\u001b[1;31m-\u001b[0;32m)\\/(\u001b[1;31m-\u001b[0;32m)\u001b[34m......\u001b[32m/ / \\ \\\u001b[34m.............\u001b[1;33m\r\n\u001b[5C(_)\u001b[0;34m ..........\u001b[32m| | | / \\\\/(\u001b[33moo\u001b[32m)\\/\u001b[34m.....\u001b[32m/ // |\\ \\\u001b[34m.............\r\n\u001b[10C..........\u001b[32m| | | | \\|\u001b[37mv--v\u001b[32m|\\\u001b[34m....\u001b[32m/ / | || \\|\u001b[34m...........\r\n\u001b[8C............\u001b[32m| | | | / \\_\u001b[37m^^\u001b[32m_/ \\\u001b[34m..\u001b[32m/ / || || ||\u001b[34m.............\r\n\u001b[11C........\u001b[32m/ / / | | \\/ \\/ /| || || ||\u001b[35m/\\\u001b[34m..\u001b[35m/\\\u001b[34m....\u001b[35m\r\n\u001b[12C/\\\u001b[34m....\u001b[32m/ / / / / |\u001b[1m______\u001b[0;32m/ /| \\ \\ || ||\u001b[35m \\/ \\ /\\\u001b[8C/\\\r\n /\\\u001b[6C/\\/ \\\u001b[34m..\u001b[32m/ / / / / /\u001b[1m\\_____\u001b[0;32m/ |/ /__\\ \\ \\ \\ \\\u001b[35m / \\ / \\ /\\ / \\\r\n/ \\/\\ / / \\\u001b[34m.\u001b[32m| | | / / /\u001b[1m\\______\u001b[0;32m/ \\ \\__| \\ \\ \\\u001b[35m\u001b[6C\\/ \\/ \\/ \\\r\n\u001b[4C\\ \\/\u001b[8C\\\u001b[32m| | | | | |\u001b[1m\\______\u001b[0;32m\u001b[7C\\_ \\__|_| \\\u001b[35m\u001b[5C/\u001b[6C\\ /\r\n\u001b[5C\\/\u001b[32m\u001b[10C| | ____ /\u001b[1m\\______\u001b[0;32m ____\u001b[5C\\_\u001b[7C\\ |\u001b[35m /\u001b[9C/\r\n\u001b[6C\\\u001b[32m\u001b[10C| |/ /\u001b[1m\\_____\u001b[0;32m / \\\u001b[6C\\__\u001b[5C\\ |\u001b[35m\r\n\u001b[7C\\\u001b[32m\u001b[9C|/ | |\u001b[1m\\______\u001b[0;32m |\u001b[6C|\u001b[8C\\___ \\|\r\n\u001b[20C| |\u001b[1m\\______\u001b[0;32m |\u001b[6C|\u001b[12C\\_\u001b[34m\r\n\u001b[12C_ ___/\u001b[32m| |\u001b[1m\\______\u001b[0;32m |\u001b[6C|\u001b[10C/\\ \\\u001b[34m ___\r\n\u001b[11C/ \\_/\u001b[32m\u001b[5C\\ \\________\\_ _\\____/ / \\__\\\u001b[34m_| \\\r\n\u001b[7C___/ __\u001b[32m\u001b[5C__/ /\u001b[7C__/ /\u001b[34m__\u001b[32m \\__/\u001b[34m\u001b[6C__\u001b[5C\\__\r\n\u001b[5C_/ / \\\u001b[32m / ___/\u001b[7C/ ___/\u001b[34m \\\u001b[12C/ \\\u001b[7C|__\r\n\u001b[4C|\u001b[5C|\u001b[37m\u001b[6C|/|/\u001b[10C|/|/\u001b[34m\u001b[8C\\__ \\\u001b[8C\\\u001b[9C|\u001b[m\r\n\u001b[m\r\n\u001b[36mWho dares to enter my dank domain \u001b[m\u001b[2m<\u001b[22;1;37mor NEW\u001b[22;2m>\u001b[m? \u001b[37;1m",
"encoding": "ascii",
"option_states": {
"server_offered": {
"ECHO": true,
"SGA": true
},
"server_requested": {
"ECHO": false,
"NAWS": true,
"NEW_ENVIRON": true,
"SGA": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.5044043064117432,
"total": 5.674188852310181
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:27:45.738350+00:00",
"host": "play.ddgame.us",
"ip": "35.208.43.57",
"port": 23
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=play.ddgame.us port=23
INFO client_base.py:174 Connected to <Peer 35.208.43.57 23>
DEBUG stream_writer.py:706 recv IAC DO NAWS
DEBUG stream_writer.py:1767 handle_do(NAWS)
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:947 send IAC WILL NAWS
DEBUG stream_writer.py:2339 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3167 local_option[NAWS] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:706 recv IAC DO SGA
DEBUG stream_writer.py:1767 handle_do(SGA)
DEBUG stream_writer.py:3167 pending_option[WILL + SGA] = True
DEBUG stream_writer.py:947 send IAC WILL SGA
DEBUG stream_writer.py:3167 local_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[WILL + SGA] = False
DEBUG stream_writer.py:706 recv IAC DO TTYPE
DEBUG stream_writer.py:1767 handle_do(TTYPE)
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:947 send IAC WILL TTYPE
DEBUG stream_writer.py:3167 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3167 local_option[TTYPE] = True
DEBUG stream_writer.py:3167 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:706 recv IAC DO NEW_ENVIRON
DEBUG stream_writer.py:1767 handle_do(NEW_ENVIRON)
DEBUG stream_writer.py:3167 pending_option[WILL + NEW_ENVIRON] = True
DEBUG stream_writer.py:947 send IAC WILL NEW_ENVIRON
DEBUG stream_writer.py:3167 pending_option[SB + NEW_ENVIRON] = True
DEBUG stream_writer.py:3167 local_option[NEW_ENVIRON] = True
DEBUG stream_writer.py:3167 pending_option[WILL + NEW_ENVIRON] = False
DEBUG stream_writer.py:706 recv IAC DONT ECHO
DEBUG stream_writer.py:1860 handle_dont(ECHO)
DEBUG stream_writer.py:3167 pending_option[WILL + ECHO] = False
DEBUG stream_writer.py:3167 local_option[ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL ECHO
DEBUG stream_writer.py:722 WILL ECHO unsolicited
DEBUG stream_writer.py:1897 handle_will(ECHO)
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 remote_option[ECHO] = True
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = False
DEBUG stream_writer.py:706 recv IAC WILL SGA
DEBUG stream_writer.py:722 WILL SGA unsolicited
DEBUG stream_writer.py:1897 handle_will(SGA)
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 remote_option[SGA] = True
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = False
DEBUG client_base.py:463 negotiation failed after 4.00s.
DEBUG client_base.py:470 failed-reply: 'SB TTYPE, SB NEW_ENVIRON'
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:737 new server fingerprint dc428c0d4ea8d742
INFO client_base.py:105 Connection closed to <Peer 35.208.43.57 23>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug play.ddgame.us 23