23663831d55b84e3

Seen (all time)
(past week)
376K times (0.00%)
2.1K times (0.00%)
Rank (all time)
(past week)
1365 / 460063
1304 / 12723
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
Compression Methodsnull (0x00)
Extensions
exact match
supported_groups (0x000a)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
extended_master_secret (0x0017)
server_name (0x0000)
status_request_v2 (0x0011)
status_request (0x0005)
renegotiation_info (0xff01)
Supported Groups
exact match
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
sect283k1 (0x0009)
sect283r1 (0x000a)
sect409k1 (0x000b)
sect409r1 (0x000c)
sect571k1 (0x000d)
sect571r1 (0x000e)
secp256k1 (0x0016)
Signature Algorithmsecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha512 (0x0601)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha384 (0x0501)
ecdsa_secp256r1_sha256 (0x0403)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_sha224 (0x0303)
rsa_sha224 (0x0301)
dsa_sha224 (0x0302)
ecdsa_sha1 (0x0203)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
EC Point Formatsuncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid2550788025636062435
Cluster Cluster #54
6 fingerprints, comprising 0.0% of connections
Related bbb08f5c09bde20e (compare) Seen 30287 times (0.00%)
81e59dc38b81daf3 (compare) Seen 12975 times (0.00%)
3b3c3f3faf7290c1 (compare) Seen 13677 times (0.00%)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.CurveP256,
			tls.CurveP384,
			tls.CurveP521,
			0x0009,
			0x000a,
			0x000b,
			0x000c,
			0x000d,
			0x000e,
			0x0016,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA512,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA384,
			tls.ECDSAWithP256AndSHA256,
			tls.PKCS1WithSHA256,
			0x0402,
			0x0303,
			0x0301,
			0x0302,
			tls.ECDSAWithSHA1,
			tls.PKCS1WithSHA1,
			0x0202,
		},},
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.SNIExtension{},
		&tls.GenericExtension {id: 0x0011}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
		&tls.StatusRequestExtension{},
		&tls.RenegotiationInfoExtension{renegotiation: tls.RenegotiateOnceAsClient},
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents