Top Clusters (past week)
About clusters
We group fingerprints into clusters based on similarity.
TLS implementations often produce multiple fingerprint variants, because they may send slightly different extensions, data, or cipher suites in different contexts. To identify fingerprints likely made by the same implementation, we place an edge between fingerprints if they are within 5 Levenshtein edit distance from another fingerprint in a cluster.
344 clusters, comprising 2300 fingerprints / 0.5% connections.