27145272cfb51df4

Seen (all time)
(past week)
49M times (0.18%)
2.3M times (0.45%)
Rank (all time)
(past week)
81 / 348726
27 / 20547
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)
TLS_DH_DSS_WITH_AES_256_GCM_SHA384 (0x00a5)
TLS_DH_RSA_WITH_AES_256_GCM_SHA384 (0x00a1)
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)
TLS_DH_RSA_WITH_AES_256_CBC_SHA256 (0x0069)
TLS_DH_DSS_WITH_AES_256_CBC_SHA256 (0x0068)
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02e)
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 (0xc026)
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)
TLS_DH_DSS_WITH_AES_128_GCM_SHA256 (0x00a4)
TLS_DH_RSA_WITH_AES_128_GCM_SHA256 (0x00a0)
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
TLS_DH_RSA_WITH_AES_128_CBC_SHA256 (0x003f)
TLS_DH_DSS_WITH_AES_128_CBC_SHA256 (0x003e)
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 (0xc031)
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02d)
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 (0xc029)
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 (0xc025)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
supported_groups (0x000a)
SessionTicket TLS (0x0023)
signature_algorithms (0x000d)
heartbeat (0x000f)
Supported Groups
exact match
secp256r1 (0x0017)
secp521r1 (0x0019)
brainpoolP512r1 (0x001c)
brainpoolP384r1 (0x001b)
secp384r1 (0x0018)
brainpoolP256r1 (0x001a)
secp256k1 (0x0016)
sect571r1 (0x000e)
sect571k1 (0x000d)
sect409k1 (0x000b)
sect409r1 (0x000c)
sect283k1 (0x0009)
sect283r1 (0x000a)
Signature Algorithmsrsa_pkcs1_sha512 (0x0601)
dsa_sha512 (0x0602)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha384 (0x0501)
dsa_sha384 (0x0502)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_secp256r1_sha256 (0x0403)
rsa_sha224 (0x0301)
dsa_sha224 (0x0302)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
ecdsa_sha1 (0x0203)
EC Point Formatsuncompressed (0x00)
ansiX962_compressed_prime (0x01)
ansiX962_compressed_char2 (0x02)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid2815966320077905396
Cluster Cluster #202
2 fingerprints, comprising 0.5% of connections
Related 8efac5455b910bdf (compare) Seen 103875 times (0.00%)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
		tls.DISABLED_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
		tls.DISABLED_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
		0x00a5,
		0x00a1,
		0x009f,
		0x006b,
		0x0069,
		0x0068,
		0xc032,
		0xc02e,
		0xc02a,
		0xc026,
		tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
		tls.DISABLED_TLS_RSA_WITH_AES_256_CBC_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
		0x00a4,
		0x00a0,
		0x009e,
		0x0067,
		0x003f,
		0x003e,
		0xc031,
		0xc02d,
		0xc029,
		0xc025,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA256,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SNIExtension{},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
			0x01
			0x02
		}},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.CurveP256,
			tls.CurveP521,
			0x001c,
			0x001b,
			tls.CurveP384,
			0x001a,
			0x0016,
			0x000e,
			0x000d,
			0x000b,
			0x000c,
			0x0009,
			0x000a,
		}},
		&tls.SessionTicketExtension{},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.PKCS1WithSHA512,
			0x0602,
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA384,
			0x0502,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA256,
			0x0402,
			tls.ECDSAWithP256AndSHA256,
			0x0301,
			0x0302,
			0x0303,
			tls.PKCS1WithSHA1,
			0x0202,
			tls.ECDSAWithSHA1,
		},},
		&tls.GenericExtension {id: 0x000f}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents