theoldnet.com:6400
Connection Banner:
tHEoLDnET.COM LOADING
.COM
bLOG / nEWS 1 wIRED 2 hOMEaWESOMATION 3 sys64738.ORG 4 vc fEDERATION 5
rETRO cAMPUS 6 iNDIErETROnEWS 7 oPEN oNLINEsERVICES i iNTERNET! b bbs
dIRECTORY c cHAT m mAIL d fILES [csdB] f fILES [cbm] k csdB TO sd2iec p
pETSCII aRTgAMES x tic-tac-toe y connect-4 z magic-15uSERS oNLINE (1) .
lOGOFFcommand:Encoding
Effective encoding: cp437
Scanner detected: ascii
Telnet Fingerprint
This fingerprint is shared by 169 other servers.
Data source: a8a260cc4662430c/54e3fa1e46b45e76.json
The complete JSON record collected during the scan, including Telnet negotiation results and banner data.
{
"server-probe": {
"fingerprint": "a8a260cc4662430c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [
"AARDWOLF",
"ATCP",
"BINARY",
"CHARSET",
"COM_PORT",
"ECHO",
"EOR",
"GMCP",
"MSDP",
"MSP",
"MSSP",
"MXP",
"SGA",
"STATUS",
"ZMP"
],
"requested-options": [],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "",
"banner_before_return": "\ufffd\u000e\btHEoLDnET.COM\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u001c\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\u001e\ufffd\ufffd\ufffd\ufffd\ufffd\u0012 LOADING \u001f\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\u0005\ufffd\ufffd\ufffd\ufffd\ufffd \ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd \ufffd\u0012 \u0005\ufffd\ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\ufffd \u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \ufffd \ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd \ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\ufffd \u0012 \u0005\ufffd\ufffd\ufffd\u0012 \ufffd\ufffd \ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd \ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \ufffd\ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\ufffd \u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd\u0012 \u0005\ufffd\ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\u001c\u0012 \u0005\ufffd\ufffd\ufffd \u001c\u0012 \u0005\ufffd\ufffd\u001e.COM\ufffd \r\u0013\u0011\u0011\u0011\u0011\u0011\u0005bLOG / nEWS\ufffd\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 1 \ufffd wIRED\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 2 \ufffd hOMEaWESOMATION\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 3 \ufffd sys64738.ORG\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 4 \ufffd vc fEDERATION\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 5 \ufffd rETRO cAMPUS\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 6 \ufffd iNDIErETROnEWS\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 7 \ufffd oPEN oNLINE\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0005sERVICES\u001e\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 i \ufffd iNTERNET!\ufffd\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 b \ufffd bbs dIRECTORY\ufffd\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 c \ufffd cHAT\ufffd\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 m \ufffd mAIL\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 d \ufffd fILES [csdB]\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 f \ufffd fILES [cbm]\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 k \ufffd csdB TO sd2iec\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 p \ufffd pETSCII aRT\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0005gAMES\ufffd\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 x \ufffd tic-tac-toe\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 y \ufffd connect-4\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 z \ufffd magic-15\u0005\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011uSERS oNLINE (1)\ufffd\u0013\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u001d\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0012 . \ufffd lOGOFF\ufffd\u0013\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\u0011\ufffdcommand:",
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {}
},
"scan_type": "quick",
"timing": {
"probe": 0.5038807392120361,
"total": 5.008127212524414
}
}
},
"sessions": [
{
"connected": "2026-02-09T19:35:07.050509+00:00",
"host": "theoldnet.com",
"ip": "159.203.14.9",
"port": 6400
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
DEBUG client.py:863 Fingerprint client: host=theoldnet.com port=6400
INFO client_base.py:174 Connected to <Peer 159.203.14.9 6400>
DEBUG client_base.py:460 negotiation complete after 2.00s.
DEBUG stream_writer.py:3167 pending_option[DO + BINARY] = True
DEBUG stream_writer.py:947 send IAC DO BINARY
DEBUG stream_writer.py:3167 pending_option[DO + SGA] = True
DEBUG stream_writer.py:947 send IAC DO SGA
DEBUG stream_writer.py:3167 pending_option[DO + ECHO] = True
DEBUG stream_writer.py:947 send IAC DO ECHO
DEBUG stream_writer.py:3167 pending_option[DO + STATUS] = True
DEBUG stream_writer.py:947 send IAC DO STATUS
DEBUG stream_writer.py:3167 pending_option[DO + CHARSET] = True
DEBUG stream_writer.py:947 send IAC DO CHARSET
DEBUG stream_writer.py:3167 pending_option[DO + EOR] = True
DEBUG stream_writer.py:947 send IAC DO EOR
DEBUG stream_writer.py:3167 pending_option[DO + COM_PORT_OPTION] = True
DEBUG stream_writer.py:947 send IAC DO COM_PORT_OPTION
DEBUG stream_writer.py:3167 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:947 send IAC DO GMCP
DEBUG stream_writer.py:3167 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:947 send IAC DO MSDP
DEBUG stream_writer.py:3167 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:947 send IAC DO MSSP
DEBUG stream_writer.py:3167 pending_option[DO + MSP] = True
DEBUG stream_writer.py:947 send IAC DO MSP
DEBUG stream_writer.py:3167 pending_option[DO + MXP] = True
DEBUG stream_writer.py:947 send IAC DO MXP
DEBUG stream_writer.py:3167 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:947 send IAC DO ZMP
DEBUG stream_writer.py:3167 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:947 send IAC DO AARDWOLF
DEBUG stream_writer.py:3167 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:947 send IAC DO ATCP
INFO fingerprinting.py:746 connection for server fingerprint a8a260cc4662430c
INFO client_base.py:105 Connection closed to <Peer 159.203.14.9 6400>
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug theoldnet.com 6400