01ee7f9af2db58fc

Seen (all time)
(past week)
3.3M times (0.02%)
4.7K times (0.01%)
Rank (all time)
(past week)
341 / 449629
673 / 11858
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
supported_groups (0x000a)
SessionTicket TLS (0x0023)
signature_algorithms (0x000d)
application_layer_protocol_negotiation (0x0010)
Supported Groups
exact match
sect571r1 (0x000e)
sect571k1 (0x000d)
secp521r1 (0x0019)
sect409k1 (0x000b)
sect409r1 (0x000c)
secp384r1 (0x0018)
sect283k1 (0x0009)
sect283r1 (0x000a)
secp256k1 (0x0016)
secp256r1 (0x0017)
sect239k1 (0x0008)
sect233k1 (0x0006)
sect233r1 (0x0007)
secp224k1 (0x0014)
secp224r1 (0x0015)
sect193r1 (0x0004)
sect193r2 (0x0005)
secp192k1 (0x0012)
secp192r1 (0x0013)
sect163k1 (0x0001)
sect163r1 (0x0002)
sect163r2 (0x0003)
secp160k1 (0x000f)
secp160r1 (0x0010)
secp160r2 (0x0011)
Signature Algorithms
exact match
rsa_pkcs1_sha512 (0x0601)
dsa_sha512 (0x0602)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha384 (0x0501)
dsa_sha384 (0x0502)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_secp256r1_sha256 (0x0403)
rsa_sha224 (0x0301)
dsa_sha224 (0x0302)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
ecdsa_sha1 (0x0203)
EC Point Formatsuncompressed (0x00)
ansiX962_compressed_prime (0x01)
ansiX962_compressed_char2 (0x02)
ALPNh2
http/1.1
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid139188941971216636
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SNIExtension{},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
			0x01
			0x02
		}},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			0x000e,
			0x000d,
			tls.CurveP521,
			0x000b,
			0x000c,
			tls.CurveP384,
			0x0009,
			0x000a,
			0x0016,
			tls.CurveP256,
			0x0008,
			0x0006,
			0x0007,
			0x0014,
			0x0015,
			0x0004,
			0x0005,
			0x0012,
			0x0013,
			0x0001,
			0x0002,
			0x0003,
			0x000f,
			0x0010,
			0x0011,
		}},
		&tls.SessionTicketExtension{},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []tls.SignatureScheme{
			tls.PKCS1WithSHA512,
			0x0602,
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA384,
			0x0502,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA256,
			0x0402,
			tls.ECDSAWithP256AndSHA256,
			0x0301,
			0x0302,
			0x0303,
			tls.PKCS1WithSHA1,
			0x0202,
			tls.ECDSAWithSHA1,
		},},
		&tls.ALPNExtension{AlpnProtocols: []string{"h2","http/1.1"}},
	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents