253bd989cc1db01b

Seen (all time)
(past week)
< 100 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
47919 / 575098
-1 / 8399
TLS VersionTLS 1.0
Handshake VersionTLS 1.0
Cipher Suites
exact match
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e)
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 (0xc029)
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 (0xc031)
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f)
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)
TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 (0xc04e)
TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 (0xc062)
TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 (0xc04f)
TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 (0xc063)
TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc078)
TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 (0xc08c)
TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc079)
TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 (0xc08d)
TLS_ECDH_RSA_WITH_NULL_SHA (0xc00b)
TLS_ECDH_RSA_WITH_RC4_128_SHA (0xc00c)
(0x005b)
(0x005c)
(0x0057)
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (0xc017)
(0x005a)
TLS_ECDH_anon_WITH_AES_128_CBC_SHA (0xc018)
TLS_ECDH_anon_WITH_AES_256_CBC_SHA (0xc019)
(0x0059)
TLS_ECDH_anon_WITH_NULL_SHA (0xc015)
TLS_ECDH_anon_WITH_RC4_128_SHA (0xc016)
(0x0058)
(0x004f)
(0x0052)
(0x0051)
(0x0050)
(0x0053)
(0x0056)
(0x0055)
(0x0054)
TLS_GOSTR341001_WITH_28147_CNT_IMIT (0x0081)
TLS_GOSTR341001_WITH_NULL_GOSTR3411 (0x0083)
TLS_GOSTR341094_WITH_28147_CNT_IMIT (0x0080)
TLS_GOSTR341094_WITH_NULL_GOSTR3411 (0x0082)
TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 (0x0029)
TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA (0x0026)
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5 (0x002a)
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA (0x0027)
TLS_KRB5_EXPORT_WITH_RC4_40_MD5 (0x002b)
TLS_KRB5_EXPORT_WITH_RC4_40_SHA (0x0028)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
supported_groups (0x000a)
ec_point_formats (0x000b)
Supported Groups
exact match
arbitrary_explicit_char2_curves (0xff02)
arbitrary_explicit_prime_curves (0xff01)
brainpoolP256r1 (0x001a)
brainpoolP384r1 (0x001b)
brainpoolP512r1 (0x001c)
x25519 (0x001d)
x448 (0x001e)
ffdhe2048 (0x0100)
ffdhe3072 (0x0101)
ffdhe4096 (0x0102)
ffdhe6144 (0x0103)
ffdhe8192 (0x0104)
secp160k1 (0x000f)
secp160r1 (0x0010)
secp160r2 (0x0011)
secp192k1 (0x0012)
secp192r1 (0x0013)
secp224k1 (0x0014)
secp224r1 (0x0015)
secp256k1 (0x0016)
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
sect163k1 (0x0001)
sect163r1 (0x0002)
sect163r2 (0x0003)
sect193r1 (0x0004)
sect193r2 (0x0005)
sect233k1 (0x0006)
sect233r1 (0x0007)
sect239k1 (0x0008)
sect283k1 (0x0009)
sect283r1 (0x000a)
sect409k1 (0x000b)
sect409r1 (0x000c)
sect571k1 (0x000d)
sect571r1 (0x000e)
Signature Algorithms
EC Point FormatsansiX962_compressed_char2 (0x02)
ansiX962_compressed_prime (0x01)
uncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid2682977188887506971
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0xc00e,
		0xc029,
		0xc031,
		0xc00f,
		0xc02a,
		0xc032,
		0xc04e,
		0xc062,
		0xc04f,
		0xc063,
		0xc078,
		0xc08c,
		0xc079,
		0xc08d,
		0xc00b,
		0xc00c,
		0x005b,
		0x005c,
		0x0057,
		0xc017,
		0x005a,
		0xc018,
		0xc019,
		0x0059,
		0xc015,
		0xc016,
		0x0058,
		0x004f,
		0x0052,
		0x0051,
		0x0050,
		0x0053,
		0x0056,
		0x0055,
		0x0054,
		0x0081,
		0x0083,
		0x0080,
		0x0082,
		0x0029,
		0x0026,
		0x002a,
		0x0027,
		0x002b,
		0x0028,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short sig_algs	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents