6562137ae62d452f

Seen (all time)
(past week)
1.2K times (0.00%)
112 times (0.00%)
Rank (all time)
(past week)
6239 / 7475267
3495 / 1163681
TLS VersionTLS 1.1
Handshake VersionTLS 1.1
Cipher Suites
exact match
TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA (0xc021)
TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA (0xc01a)
TLS_SRP_SHA_WITH_AES_128_CBC_SHA (0xc01d)
TLS_SRP_SHA_WITH_AES_256_CBC_SHA (0xc020)
Compression Methodsnull (0x00)
Extensions
exact match
ec_point_formats (0x000b)
supported_groups (0x000a)
Supported Groups
exact match
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
x25519 (0x001d)
ffdhe2048 (0x0100)
Signature Algorithms
exact match
EC Point Formatsuncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid7305422964117030191
Cluster Cluster #8
200 fingerprints, comprising 0.0% of connections
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0xc021,
		0xc01a,
		0xc01d,
		0xc020,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short sig_algs	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents