56bae624275d16ab

Seen (all time)
(past week)
261 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
8938 / 6530048
6831 / 320395
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_GOSTR341112_256_WITH_NULL_GOSTR3411 (0xff87)
(0xff86)
SSL_RSA_WITH_3DES_EDE_CBC_MD5 (0xff83)
SSL_RSA_WITH_DES_CBC_MD5 (0xff82)
(0xff37)
(0xff36)
(0xff33)
(0xff32)
(0xff17)
(0xff16)
(0xff13)
(0xff12)
(0xff07)
(0xff06)
(0xff03)
(0xff02)
TLS_GOSTR341112_256_WITH_28147_CNT_IMIT (0xff85)
(0xff84)
SSL_RSA_WITH_IDEA_CBC_MD5 (0xff81)
SSL_RSA_WITH_RC2_CBC_MD5 (0xff80)
(0xff35)
(0xff34)
(0xff31)
(0xff30)
(0xff15)
(0xff14)
(0xff11)
(0xff10)
(0xff05)
(0xff04)
(0xff01)
(0xff00)
(0xff57)
(0xff56)
(0xff55)
(0xff54)
(0xff53)
(0xff52)
(0xff51)
(0xff50)
(0xff97)
(0xff96)
(0xff95)
(0xff94)
(0xff93)
(0xff92)
(0xff91)
(0xff90)
(0xff77)
(0xff76)
(0xff75)
(0xff74)
(0xff73)
(0xff72)
(0xff71)
(0xff70)
(0xff67)
(0xff66)
(0xff65)
(0xff64)
(0xff63)
(0xff62)
(0xff61)
(0xff60)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
DEFLATE (0x01)
Extensions
exact match
supported_groups (0x000a)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
application_layer_protocol_negotiation (0x0010)
extended_master_secret (0x0017)
padding (0x0015)
Supported Groups
exact match
x448 (0x001e)
x25519 (0x001d)
secp384r1 (0x0018)
secp256r1 (0x0017)
secp521r1 (0x0019)
sect571r1 (0x000e)
sect571k1 (0x000d)
brainpoolP512r1 (0x001c)
sect409r1 (0x000c)
sect409k1 (0x000b)
brainpoolP384r1 (0x001b)
sect283r1 (0x000a)
sect283k1 (0x0009)
secp256k1 (0x0016)
brainpoolP256r1 (0x001a)
sect239k1 (0x0008)
sect233r1 (0x0007)
sect233k1 (0x0006)
secp224r1 (0x0015)
secp224k1 (0x0014)
sect193r1 (0x0004)
sect193r2 (0x0005)
secp192r1 (0x0013)
secp192k1 (0x0012)
sect163r1 (0x0002)
sect163r2 (0x0003)
sect163k1 (0x0001)
secp160r1 (0x0010)
secp160r2 (0x0011)
secp160k1 (0x000f)
Signature Algorithms
exact match
ed448 (0x0808)
ed25519 (0x0807)
rsa_pss_pss_sha512 (0x080b)
rsa_pss_pss_sha384 (0x080a)
rsa_pss_pss_sha256 (0x0809)
rsa_pss_rsae_sha512 (0x0806)
rsa_pss_rsae_sha384 (0x0805)
rsa_pss_rsae_sha256 (0x0804)
ecdsa_secp521r1_sha512 (0x0603)
ecdsa_secp384r1_sha384 (0x0503)
ecdsa_secp256r1_sha256 (0x0403)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha512 (0x0601)
rsa_pkcs1_sha384 (0x0501)
rsa_pkcs1_sha256 (0x0401)
rsa_sha224 (0x0301)
ecdsa_sha1 (0x0203)
dsa_sha1 (0x0202)
rsa_pkcs1_sha1 (0x0201)
rsa_md5 (0x0101)
EC Point Formatsuncompressed (0x00)
ALPNhttp/1.1
h2
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid6249560475883607723
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0xff87,
		0xff86,
		0xff83,
		0xff82,
		0xff37,
		0xff36,
		0xff33,
		0xff32,
		0xff17,
		0xff16,
		0xff13,
		0xff12,
		0xff07,
		0xff06,
		0xff03,
		0xff02,
		0xff85,
		0xff84,
		0xff81,
		0xff80,
		0xff35,
		0xff34,
		0xff31,
		0xff30,
		0xff15,
		0xff14,
		0xff11,
		0xff10,
		0xff05,
		0xff04,
		0xff01,
		0xff00,
		0xff57,
		0xff56,
		0xff55,
		0xff54,
		0xff53,
		0xff52,
		0xff51,
		0xff50,
		0xff97,
		0xff96,
		0xff95,
		0xff94,
		0xff93,
		0xff92,
		0xff91,
		0xff90,
		0xff77,
		0xff76,
		0xff75,
		0xff74,
		0xff73,
		0xff72,
		0xff71,
		0xff70,
		0xff67,
		0xff66,
		0xff65,
		0xff64,
		0xff63,
		0xff62,
		0xff61,
		0xff60,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
		0x01
	},
	Extensions: []tls.TLSExtension{
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			0x001e,
			tls.X25519,
			tls.CurveP384,
			tls.CurveP256,
			tls.CurveP521,
			0x000e,
			0x000d,
			0x001c,
			0x000c,
			0x000b,
			0x001b,
			0x000a,
			0x0009,
			0x0016,
			0x001a,
			0x0008,
			0x0007,
			0x0006,
			0x0015,
			0x0014,
			0x0004,
			0x0005,
			0x0013,
			0x0012,
			0x0002,
			0x0003,
			0x0001,
			0x0010,
			0x0011,
			0x000f,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []tls.SignatureScheme{
			0x0808,
			0x0807,
			0x080b,
			0x080a,
			0x0809,
			tls.PSSWithSHA512,
			tls.PSSWithSHA384,
			tls.PSSWithSHA256,
			tls.ECDSAWithP521AndSHA512,
			tls.ECDSAWithP384AndSHA384,
			tls.ECDSAWithP256AndSHA256,
			0x0303,
			tls.PKCS1WithSHA512,
			tls.PKCS1WithSHA384,
			tls.PKCS1WithSHA256,
			0x0301,
			tls.ECDSAWithSHA1,
			0x0202,
			tls.PKCS1WithSHA1,
			0x0101,
		},},
		&tls.ALPNExtension{AlpnProtocols: []string{"http/1.1","h2"}},
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.UtlsPaddingExtension{GetPaddingLen: tls.BoringPaddingStyle},
	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents