78b8e70e1aaa9d56

Seen (all time)
(past week)
6.0K times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
7505 / 786971
-1 / 32661
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_KRB5_WITH_3DES_EDE_CBC_MD5 (0x0023)
TLS_KRB5_WITH_RC4_128_SHA (0x0020)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
TLS_KRB5_WITH_3DES_EDE_CBC_SHA (0x001f)
TLS_RSA_WITH_RC4_128_SHA (0x0005)
TLS_KRB5_WITH_DES_CBC_MD5 (0x0022)
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x0040)
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x006a)
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
TLS_DHE_DSS_WITH_DES_CBC_SHA (0x0012)
SSL_FORTEZZA_KEA_WITH_RC4_128_SHA (0x001e)
TLS_RSA_WITH_NULL_MD5 (0x0001)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)
TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_DHE_RSA_WITH_DES_CBC_SHA (0x0015)
TLS_RSA_WITH_NULL_SHA256 (0x003b)
TLS_RSA_WITH_NULL_SHA (0x0002)
TLS_KRB5_WITH_RC4_128_MD5 (0x0024)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
TLS_RSA_WITH_DES_CBC_SHA (0x0009)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
TLS_RSA_WITH_RC4_128_MD5 (0x0004)
TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x0013)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
Compression Methodsnull (0x00)
Extensions
exact match
signature_algorithms (0x000d)
server_name (0x0000)
Supported Groups
exact match
Signature Algorithmsecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha512 (0x0601)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha384 (0x0501)
ecdsa_secp256r1_sha256 (0x0403)
rsa_pkcs1_sha256 (0x0401)
ecdsa_sha224 (0x0303)
rsa_sha224 (0x0301)
ecdsa_sha1 (0x0203)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
rsa_md5 (0x0101)
EC Point Formats
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid8698956728029060438
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0x0023,
		0x0020,
		0x0033,
		0x0016,
		0x0039,
		0x001f,
		tls.TLS_RSA_WITH_RC4_128_SHA,
		0x0022,
		0x0040,
		0x006a,
		tls.DISABLED_TLS_RSA_WITH_AES_256_CBC_SHA256,
		0x0067,
		0x0012,
		0x001e,
		0x0001,
		0x006b,
		0x0038,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		0x0015,
		0x003b,
		0x0002,
		0x0024,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
		0x0009,
		0x00ff,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA256,
		0x0004,
		0x0032,
		0x0013,
		tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short curves	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents