2172e8393ba826e8

Seen (all time)
(past week)
41K times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
4350 / 955617
-1 / 11716
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_AES_128_GCM_SHA256 (0x1301)
TLS_AES_256_GCM_SHA384 (0x1302)
TLS_CHACHA20_POLY1305_SHA256 (0x1303)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
supported_groups (0x000a)
SessionTicket TLS (0x0023)
application_layer_protocol_negotiation (0x0010)
extended_master_secret (0x0017)
signature_algorithms (0x000d)
supported_versions (0x002b)
psk_key_exchange_modes (0x002d)
key_share (0x0033)
Supported Groups
exact match
x25519 (0x001d)
secp256r1 (0x0017)
Signature Algorithmsecdsa_secp256r1_sha256 (0x0403)
rsa_pss_rsae_sha256 (0x0804)
EC Point Formatsuncompressed (0x00)
ansiX962_compressed_prime (0x01)
ansiX962_compressed_char2 (0x02)
ALPNh2
h2-fb
http/1.1
Key Share x25519 (0x001d) - 32-byte key
PSK Key Exchange Modes psk_dhe_ke (0x01)
psk_ke (0x00)
Supported Versions
exact match
TLS 1.3-draft-26 (0x7f1a)
(0xfb1a)
TLS 1.3-draft-23 (0x7f17)
(0xfb17)
Certificate Compression Algorithms
Record Size Limit
nid2410244083108292328
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_AES_128_GCM_SHA256,
		tls.TLS_AES_256_GCM_SHA384,
		tls.TLS_CHACHA20_POLY1305_SHA256,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SNIExtension{},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
			0x01
			0x02
		}},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.X25519,
			tls.CurveP256,
		}},
		&tls.SessionTicketExtension{},
		&tls.ALPNExtension{AlpnProtocols: []string{"h2","h2-fb","http/1.1"}},
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.ECDSAWithP256AndSHA256,
			tls.PSSWithSHA256,
		},},
		&tls.SupportedVersionsExtension{[]uint16{
			0x7f1a,
			0xfb1a,
			0x7f17,
			0xfb17,
		}},
		&tls.PSKKeyExchangeModesExtension{[]uint8{
			tls.PskModeDHE,
			tls.PskModePlain,
		}},
		&tls.KeyShareExtension{[]tls.KeyShare{
			{Group: tls.X25519},
		}},
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents