0cb2ec9a43791ed8

Seen (all time)
(past week)
< 100 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
27764 / 580642
-1 / 8764
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_AES_128_GCM_SHA256 (0x1301)
TLS_CHACHA20_POLY1305_SHA256 (0x1303)
TLS_AES_256_GCM_SHA384 (0x1302)
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9)
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
extended_master_secret (0x0017)
renegotiation_info (0xff01)
supported_groups (0x000a)
ec_point_formats (0x000b)
SessionTicket TLS (0x0023)
application_layer_protocol_negotiation (0x0010)
status_request (0x0005)
(0x0022)
key_share (0x0033)
supported_versions (0x002b)
signature_algorithms (0x000d)
psk_key_exchange_modes (0x002d)
record_size_limit (0x001c)
padding (0x0015)
Supported Groups
exact match
x25519 (0x001d)
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
ffdhe2048 (0x0100)
ffdhe3072 (0x0101)
Signature Algorithmsecdsa_secp256r1_sha256 (0x0403)
ecdsa_secp384r1_sha384 (0x0503)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pss_rsae_sha256 (0x0804)
rsa_pss_rsae_sha384 (0x0805)
rsa_pss_rsae_sha512 (0x0806)
rsa_pkcs1_sha256 (0x0401)
rsa_pkcs1_sha384 (0x0501)
rsa_pkcs1_sha512 (0x0601)
ecdsa_sha1 (0x0203)
rsa_pkcs1_sha1 (0x0201)
EC Point Formatsuncompressed (0x00)
ALPNhttp/1.1
Key Share x25519 (0x001d) - 32-byte key
secp256r1 (0x0017) - 65-byte key
PSK Key Exchange Modes psk_dhe_ke (0x01)
Supported Versions
exact match
TLS 1.3 (0x0304)
TLS 1.2 (0x0303)
TLS 1.1 (0x0302)
TLS 1.0 (0x0301)
Certificate Compression Algorithms
Record Size Limit16385
nid915053821610761944
Related 6bfedc5d5c740d58 (compare) Seen 224447 times (0.00%)
64c740b672d6251a (compare) Seen 11029 times (0.00%)
99e9125362d505b2 (compare) Seen 32072 times (0.00%)
52ea8011142fba93 (compare) Seen 195568 times (0.00%)
9a23b0f57856134c (compare) Seen 21351 times (0.00%)
cc5e5f8d4364c766 (compare) Seen 27313 times (0.00%)
99f1c3a0fca092ea (compare) Seen 12745 times (0.00%)
4d578e2d2851f526 (compare) Seen 2794142 times (0.01%)
f12f97771360c701 (compare) Seen 53175 times (0.00%)
e0067e5c5c529c0d (compare) Seen 15448 times (0.00%)
841b7bbbbed94261 (compare) Seen 275668 times (0.00%)
b9ed1c806b7c21c2 (compare) Seen 71087 times (0.00%)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_AES_128_GCM_SHA256,
		tls.TLS_CHACHA20_POLY1305_SHA256,
		tls.TLS_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
		tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
		0x0033,
		0x0039,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SNIExtension{},
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.RenegotiationInfoExtension{renegotiation: tls.RenegotiateOnceAsClient},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.X25519,
			tls.CurveP256,
			tls.CurveP384,
			tls.CurveP521,
			0x0100,
			0x0101,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SessionTicketExtension{},
		&tls.ALPNExtension{AlpnProtocols: []string{"http/1.1"}},
		&tls.StatusRequestExtension{},
		&tls.GenericExtension {id: 0x0022}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
		&tls.KeyShareExtension{[]tls.KeyShare{
			{Group: tls.X25519},
			{Group: tls.CurveP256},
		}},
		&tls.SupportedVersionsExtension{[]uint16{
			tls.VersionTLS13,
			tls.VersionTLS12,
			tls.VersionTLS11,
			tls.VersionTLS10,
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.ECDSAWithP256AndSHA256,
			tls.ECDSAWithP384AndSHA384,
			tls.ECDSAWithP521AndSHA512,
			tls.PSSWithSHA256,
			tls.PSSWithSHA384,
			tls.PSSWithSHA512,
			tls.PKCS1WithSHA256,
			tls.PKCS1WithSHA384,
			tls.PKCS1WithSHA512,
			tls.ECDSAWithSHA1,
			tls.PKCS1WithSHA1,
		},},
		&tls.PSKKeyExchangeModesExtension{[]uint8{
			tls.PskModeDHE,
		}},
		&tls.FakeRecordSizeLimitExtension{16385},

		&tls.UtlsPaddingExtension{GetPaddingLen: BoringPaddingStyle},
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents