ptt2.cc:23
Connection Banner:
Ptt2 即日起關閉無加密的 telnet 連線方式。 請使用者轉換到安全的加密連線方式, 目前 Ptt2 支援 Websocket 與 ssh。 若您先前使用無加密的 telnet 連線方式, 建議您在轉換到加密連線後, 儘速更換您的密碼。
Encoding
Effective encoding: big5
Override: big5 (from bbslist.txt)
Scanner detected: big5
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/c672a7dacb3eda4b.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "Ptt2 \u5373\u65e5\u8d77\u95dc\u9589\u7121\u52a0\u5bc6\u7684 telnet \u9023\u7dda\u65b9\u5f0f\u3002\r\n\r\n\u8acb\u4f7f\u7528\u8005\u8f49\u63db\u5230\u5b89\u5168\u7684\u52a0\u5bc6\u9023\u7dda\u65b9\u5f0f\uff0c\r\n\u76ee\u524d Ptt2 \u652f\u63f4 Websocket \u8207 ssh\u3002\r\n\r\n\u82e5\u60a8\u5148\u524d\u4f7f\u7528\u7121\u52a0\u5bc6\u7684 telnet \u9023\u7dda\u65b9\u5f0f\uff0c\r\n\u5efa\u8b70\u60a8\u5728\u8f49\u63db\u5230\u52a0\u5bc6\u9023\u7dda\u5f8c\uff0c\r\n\u5118\u901f\u66f4\u63db\u60a8\u7684\u5bc6\u78bc\u3002\r\n\r\n",
"encoding": "big5",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5042784214019775,
"total": 5.011928081512451
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:36:27.905103+00:00",
"host": "ptt2.cc",
"ip": "140.112.172.12",
"port": 23
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=ptt2.cc port=23
INFO client_base.py:174 Connected to <Peer 140.112.172.12 23>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 140.112.172.12 23>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug ptt2.cc 23