36f3dc3b5f42585f

Seen (all time)
(past week)
445 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
9118 / 449629
4705 / 11858
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f)
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)
TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 (0xc04e)
TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 (0xc062)
TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 (0xc04f)
TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 (0xc063)
TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc078)
TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 (0xc08c)
TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc079)
TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 (0xc08d)
TLS_ECDH_RSA_WITH_NULL_SHA (0xc00b)
TLS_ECDH_RSA_WITH_RC4_128_SHA (0xc00c)
(0x005b)
(0x005c)
(0x0057)
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (0xc017)
(0x005a)
TLS_ECDH_anon_WITH_AES_128_CBC_SHA (0xc018)
TLS_ECDH_anon_WITH_AES_256_CBC_SHA (0xc019)
(0x0059)
TLS_ECDH_anon_WITH_NULL_SHA (0xc015)
TLS_ECDH_anon_WITH_RC4_128_SHA (0xc016)
(0x0058)
(0x004f)
(0x0052)
(0x0051)
(0x0050)
(0x0053)
(0x0056)
(0x0055)
(0x0054)
TLS_GOSTR341001_WITH_28147_CNT_IMIT (0x0081)
TLS_GOSTR341001_WITH_NULL_GOSTR3411 (0x0083)
TLS_GOSTR341094_WITH_28147_CNT_IMIT (0x0080)
TLS_GOSTR341094_WITH_NULL_GOSTR3411 (0x0082)
(0xc102)
(0xc100)
(0xc103)
(0xc105)
(0xc101)
(0xc104)
(0xc106)
TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 (0x0029)
TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA (0x0026)
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5 (0x002a)
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA (0x0027)
TLS_KRB5_EXPORT_WITH_RC4_40_MD5 (0x002b)
TLS_KRB5_EXPORT_WITH_RC4_40_SHA (0x0028)
TLS_KRB5_WITH_3DES_EDE_CBC_MD5 (0x0023)
TLS_KRB5_WITH_3DES_EDE_CBC_SHA (0x001f)
TLS_KRB5_WITH_DES_CBC_MD5 (0x0022)
SSL_FORTEZZA_KEA_WITH_RC4_128_SHA (0x001e)
TLS_KRB5_WITH_IDEA_CBC_MD5 (0x0025)
TLS_KRB5_WITH_IDEA_CBC_SHA (0x0021)
TLS_KRB5_WITH_RC4_128_MD5 (0x0024)
TLS_KRB5_WITH_RC4_128_SHA (0x0020)
TLS_NULL_WITH_NULL_NULL (0x0000)
TLS_PSK_DHE_WITH_AES_128_CCM_8 (0xc0aa)
Compression Methodsnull (0x00)
Extensions
exact match
supported_groups (0x000a)
ec_point_formats (0x000b)
server_name (0x0000)
signature_algorithms (0x000d)
Supported Groups
exact match
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
x25519 (0x001d)
ffdhe2048 (0x0100)
Signature Algorithms
exact match
rsa_md5 (0x0101)
rsa_pkcs1_sha1 (0x0201)
rsa_sha224 (0x0301)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_secp256r1_sha256 (0x0403)
ed25519_sha256 (0x0407)
ed448_sha256 (0x0408)
rsa_pkcs1_sha512 (0x0601)
dsa_sha512 (0x0602)
ecdsa_secp521r1_sha512 (0x0603)
ed25519_sha512 (0x0607)
ed448_sha512 (0x0608)
EC Point Formatsuncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid3959750644948162655
Related b84ba1e648a58be1 (compare)
4256f8f1727d7dc7 (compare)
30b0cc403e6bdca2 (compare)
aa241e6a72e3f439 (compare)
eadbc3a5d0e3d6ae (compare)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0xc00f,
		0xc02a,
		0xc032,
		0xc04e,
		0xc062,
		0xc04f,
		0xc063,
		0xc078,
		0xc08c,
		0xc079,
		0xc08d,
		0xc00b,
		0xc00c,
		0x005b,
		0x005c,
		0x0057,
		0xc017,
		0x005a,
		0xc018,
		0xc019,
		0x0059,
		0xc015,
		0xc016,
		0x0058,
		0x004f,
		0x0052,
		0x0051,
		0x0050,
		0x0053,
		0x0056,
		0x0055,
		0x0054,
		0x0081,
		0x0083,
		0x0080,
		0x0082,
		0xc102,
		0xc100,
		0xc103,
		0xc105,
		0xc101,
		0xc104,
		0xc106,
		0x0029,
		0x0026,
		0x002a,
		0x0027,
		0x002b,
		0x0028,
		0x0023,
		0x001f,
		0x0022,
		0x001e,
		0x0025,
		0x0021,
		0x0024,
		0x0020,
		0x0000,
		0xc0aa,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.CurveP256,
			tls.CurveP384,
			tls.CurveP521,
			tls.X25519,
			0x0100,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SNIExtension{},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []tls.SignatureScheme{
			0x0101,
			tls.PKCS1WithSHA1,
			0x0301,
			tls.PKCS1WithSHA256,
			0x0402,
			tls.ECDSAWithP256AndSHA256,
			0x0407,
			0x0408,
			tls.PKCS1WithSHA512,
			0x0602,
			tls.ECDSAWithP521AndSHA512,
			0x0607,
			0x0608,
		},},
	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents