0d0c47fa938cb3a3

Seen (all time)
(past week)
304 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
19204 / 952333
-1 / 8483
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
LEGACY_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcc13)
LEGACY_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcc15)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc077)
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0x00c4)
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc076)
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0x00be)
TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x009a)
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0045)
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016)
TLS_DHE_RSA_WITH_DES_CBC_SHA (0x0015)
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0014)
TLS_ECDHE_RSA_WITH_NULL_SHA (0xc010)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression MethodsDEFLATE (0x01)
null (0x00)
Extensions
exact match
ec_point_formats (0x000b)
supported_groups (0x000a)
SessionTicket TLS (0x0023)
signature_algorithms (0x000d)
status_request (0x0005)
heartbeat (0x000f)
Supported Groups
exact match
sect571r1 (0x000e)
sect571k1 (0x000d)
secp521r1 (0x0019)
brainpoolP512r1 (0x001c)
sect409k1 (0x000b)
sect409r1 (0x000c)
brainpoolP384r1 (0x001b)
secp384r1 (0x0018)
sect283k1 (0x0009)
sect283r1 (0x000a)
brainpoolP256r1 (0x001a)
secp256k1 (0x0016)
secp256r1 (0x0017)
sect239k1 (0x0008)
sect233k1 (0x0006)
sect233r1 (0x0007)
secp224k1 (0x0014)
secp224r1 (0x0015)
sect193r1 (0x0004)
sect193r2 (0x0005)
secp192k1 (0x0012)
secp192r1 (0x0013)
sect163k1 (0x0001)
sect163r1 (0x0002)
sect163r2 (0x0003)
secp160k1 (0x000f)
secp160r1 (0x0010)
secp160r2 (0x0011)
Signature Algorithmsrsa_pkcs1_sha512 (0x0601)
dsa_sha512 (0x0602)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha384 (0x0501)
dsa_sha384 (0x0502)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_secp256r1_sha256 (0x0403)
rsa_sha224 (0x0301)
dsa_sha224 (0x0302)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
ecdsa_sha1 (0x0203)
EC Point Formatsuncompressed (0x00)
ansiX962_compressed_prime (0x01)
ansiX962_compressed_char2 (0x02)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid940205563756458915
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
		0xcc15,
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.DISABLED_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
		0x009f,
		0x006b,
		0x0039,
		0xc077,
		0x00c4,
		0x0088,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		0x009e,
		0x0067,
		0x0033,
		0xc076,
		0x00be,
		0x009a,
		0x0045,
		tls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,
		tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
		0x0016,
		0x0015,
		0x0014,
		0xc010,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x01
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
			0x01
			0x02
		}},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			0x000e,
			0x000d,
			tls.CurveP521,
			0x001c,
			0x000b,
			0x000c,
			0x001b,
			tls.CurveP384,
			0x0009,
			0x000a,
			0x001a,
			0x0016,
			tls.CurveP256,
			0x0008,
			0x0006,
			0x0007,
			0x0014,
			0x0015,
			0x0004,
			0x0005,
			0x0012,
			0x0013,
			0x0001,
			0x0002,
			0x0003,
			0x000f,
			0x0010,
			0x0011,
		}},
		&tls.SessionTicketExtension{},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.PKCS1WithSHA512,
			0x0602,
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA384,
			0x0502,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA256,
			0x0402,
			tls.ECDSAWithP256AndSHA256,
			0x0301,
			0x0302,
			0x0303,
			tls.PKCS1WithSHA1,
			0x0202,
			tls.ECDSAWithSHA1,
		},},
		&tls.StatusRequestExtension{},
		&tls.GenericExtension {id: 0x000f}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents