34a6aa46e6529e6c

Seen (all time)
(past week)
983K times (0.01%)
22K times (0.00%)
Rank (all time)
(past week)
505 / 9111698
663 / 1831336
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_AES_256_GCM_SHA384 (0x1302)
TLS_CHACHA20_POLY1305_SHA256 (0x1303)
TLS_AES_128_GCM_SHA256 (0x1301)
TLS_AES_128_CCM_SHA256 (0x1304)
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9)
TLS_ECDHE_ECDSA_WITH_AES_256_CCM (0xc0ad)
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_ECDSA_WITH_AES_128_CCM (0xc0ac)
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
TLS_RSA_WITH_AES_256_CCM (0xc09d)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_128_CCM (0xc09c)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xccaa)
TLS_DHE_RSA_WITH_AES_256_CCM (0xc09f)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
TLS_DHE_RSA_WITH_AES_128_CCM (0xc09e)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
Compression Methodsnull (0x00)
Extensions
exact match
status_request (0x0005)
supported_groups (0x000a)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
application_layer_protocol_negotiation (0x0010)
encrypt_then_mac (0x0016)
extended_master_secret (0x0017)
key_share (0x0033)
supported_versions (0x002b)
renegotiation_info (0xff01)
server_name (0x0000)
record_size_limit (0x001c)
Supported Groups
exact match
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
x25519 (0x001d)
x448 (0x001e)
ffdhe2048 (0x0100)
ffdhe3072 (0x0101)
ffdhe4096 (0x0102)
ffdhe6144 (0x0103)
ffdhe8192 (0x0104)
Signature Algorithms
exact match
rsa_pkcs1_sha256 (0x0401)
rsa_pss_pss_sha256 (0x0809)
rsa_pss_rsae_sha256 (0x0804)
ecdsa_secp256r1_sha256 (0x0403)
ed25519 (0x0807)
rsa_pkcs1_sha384 (0x0501)
rsa_pss_pss_sha384 (0x080a)
rsa_pss_rsae_sha384 (0x0805)
ecdsa_secp384r1_sha384 (0x0503)
ed448 (0x0808)
rsa_pkcs1_sha512 (0x0601)
rsa_pss_pss_sha512 (0x080b)
rsa_pss_rsae_sha512 (0x0806)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha1 (0x0201)
ecdsa_sha1 (0x0203)
EC Point Formatsuncompressed (0x00)
ALPNh2
http/1.1
Key Share secp256r1 (0x0017) - 65-byte key
x25519 (0x001d) - 32-byte key
PSK Key Exchange Modes
Supported Versions
exact match
TLS 1.3 (0x0304)
TLS 1.2 (0x0303)
TLS 1.1 (0x0302)
TLS 1.0 (0x0301)
Certificate Compression Algorithms
Record Size Limit16385
nid3793906957594828396
Cluster Cluster #75
30 fingerprints, comprising 0.1% of connections
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_AES_256_GCM_SHA384,
		tls.TLS_CHACHA20_POLY1305_SHA256,
		tls.TLS_AES_128_GCM_SHA256,
		0x1304,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
		0xc0ad,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		0xc0ac,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
		0xc09d,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		0xc09c,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		0x009f,
		0xccaa,
		0xc09f,
		0x0039,
		0x009e,
		0xc09e,
		0x0033,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.StatusRequestExtension{},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.CurveP256,
			tls.CurveP384,
			tls.CurveP521,
			tls.X25519,
			0x001e,
			0x0100,
			0x0101,
			0x0102,
			0x0103,
			0x0104,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []tls.SignatureScheme{
			tls.PKCS1WithSHA256,
			0x0809,
			tls.PSSWithSHA256,
			tls.ECDSAWithP256AndSHA256,
			0x0807,
			tls.PKCS1WithSHA384,
			0x080a,
			tls.PSSWithSHA384,
			tls.ECDSAWithP384AndSHA384,
			0x0808,
			tls.PKCS1WithSHA512,
			0x080b,
			tls.PSSWithSHA512,
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA1,
			tls.ECDSAWithSHA1,
		},},
		&tls.ALPNExtension{AlpnProtocols: []string{"h2","http/1.1"}},
		&tls.GenericExtension {Id: 0x0016}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.KeyShareExtension{[]tls.KeyShare{
			{Group: tls.CurveP256},
			{Group: tls.X25519},
		}},
		&tls.SupportedVersionsExtension{[]uint16{
			tls.VersionTLS13,
			tls.VersionTLS12,
			tls.VersionTLS11,
			tls.VersionTLS10,
		}},
		&tls.RenegotiationInfoExtension{Renegotiation: tls.RenegotiateOnceAsClient},
		&tls.SNIExtension{},
		&tls.FakeRecordSizeLimitExtension{16385},

	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents