I'm sorry to give you such a big headache, dante696, I'm doing my best to provide accurate information. I don't know how to check the teamspeak server db, but I'll ask to the TeamSpeak administrator where i'm doing my tests. About your question:
- Is this reproducable without any 3rd party QueryTool (Except Telnet & Putty)?
YES. I just downloaded Putty and I tried myself. BUG appeared again. I knew it should be able to be replicated with just telnet, since (as you can see later in the wireshark log) all what python does is just to send Telnet commands. I didn't tried on different servers or computers but the bug is easily replicated in my computer also with just PuTTY.
This is a PuTTY test that I have done a few minutes ago. Notice how after the delay of 60 seconds where i say "funcionas", the next texts are not received by PuTTY:

I am using Windows 7 Home Premium Service Pack 1 and Python 3.4.1 to send the Telnet Commands.
The TeamSpeak server is using:
Build: 1413356791
Platform: Linux
Version: 3.0.11.1
Adress: 37.187.39.202
Port used to connect: 10011
Test2
This is what it looks like as a client:

And this is what appears in the telnet file with all the TCP that wireshark captured (Thank you numma_cway to let me know about wireshark):
Code:
TS3
Welcome to the TeamSpeak 3 ServerQuery interface, type "help" for a list of commands and "help <command>" for information on a specific command.
login client_login_name=BotDeAens client_login_password=xxxxxxxx
error id=0 msg=ok
use sid=1
error id=0 msg=ok
channelfind pattern=[Pruebas]\sBots
cid=9931 channel_name=[Pruebas]\sBots
error id=0 msg=ok
clientupdate client_nickname=TestingBot
error id=0 msg=ok
whoami
virtualserver_status=online virtualserver_id=1 virtualserver_unique_identifier=aD9WUddNDWJs6sDsTghzHEV9iX4= virtualserver_port=9987 client_id=146 client_channel_id=1 client_nickname=TestingBot client_database_id=14909 client_login_name=BotDeAens client_unique_identifier=6yj3hyXUCWt0xOUlWIh\/1NpnAWo= client_origin_server_id=1
error id=0 msg=ok
clientmove cid=9931 cpw= clid=146
error id=0 msg=ok
servernotifyregister id=9931 event=textchannel
error id=0 msg=ok
servernotifyregister id=9931 event=channel
error id=0 msg=ok
notifytextmessage targetmode=2 msg=This\sis\sa\stest invokerid=141 invokername=[Rata]Aens\sWindstorm invokeruid=6yj3hyXUCWt0xOUlWIh\/1NpnAWo=
notifytextmessage targetmode=2 msg=!uptime invokerid=141 invokername=[Rata]Aens\sWindstorm invokeruid=6yj3hyXUCWt0xOUlWIh\/1NpnAWo=
sendtextmessage targetmode=2 target=9931 msg=Since\s[color=gray]2014-11-20\s15:50:19[\/color],\si've\sbeen\s[b][color=green]0:00:08\s[\/color][\/b]Hours\/minutes\/seconds\sonline.
notifytextmessage targetmode=2 msg=Since\s[color=gray]2014-11-20\s15:50:19[\/color],\si've\sbeen\s[b][color=green]0:00:08\s[\/color][\/b]Hours\/minutes\/seconds\sonline. invokerid=146 invokername=TestingBot invokeruid=6yj3hyXUCWt0xOUlWIh\/1NpnAWo=
error id=0 msg=ok
notifytextmessage targetmode=2 msg=perfect invokerid=141 invokername=[Rata]Aens\sWindstorm invokeruid=6yj3hyXUCWt0xOUlWIh\/1NpnAWo=
notifytextmessage targetmode=2 msg=now\si\swait\s60\sseconds\smore\sor\sless invokerid=141 invokername=[Rata]Aens\sWindstorm invokeruid=6yj3hyXUCWt0xOUlWIh\/1NpnAWo=
I don't get more notifications if I stop sending messages to that channel for at least 60 seconds. The connection is not closed and i can keep using comm past those 60 seconds, so it can't be just that connection got closed. Isn't either the event "servernotifyunregister" or it would appear sent in the wireshark packets log.
Note: The serverquery client doesn't connect with all the permissions. It has almost no permissions except for a few features (not sure if that would make any difference).