82744e344093fca3

Seen (all time)
(past week)
133K times (0.00%)
6.3K times (0.00%)
Rank (all time)
(past week)
1806 / 348726
985 / 20547
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
TLS_RSA_WITH_AES_256_CCM (0xc09d)
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
TLS_RSA_WITH_AES_256_CCM_8 (0xc0a1)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_128_CCM (0xc09c)
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_RSA_WITH_AES_128_CCM_8 (0xc0a0)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 (0x00ad)
TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 (0x00b7)
TLS_RSA_PSK_WITH_AES_256_CBC_SHA (0x0095)
TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 (0x00ac)
TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 (0x00b6)
TLS_RSA_PSK_WITH_AES_128_CBC_SHA (0x0094)
TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA (0x0093)
TLS_PSK_WITH_AES_256_GCM_SHA384 (0x00a9)
TLS_PSK_WITH_AES_256_CCM (0xc0a5)
TLS_PSK_WITH_AES_256_CBC_SHA384 (0x00af)
TLS_PSK_WITH_AES_256_CBC_SHA (0x008d)
TLS_PSK_WITH_AES_256_CCM_8 (0xc0a9)
TLS_PSK_WITH_AES_128_GCM_SHA256 (0x00a8)
TLS_PSK_WITH_AES_128_CCM (0xc0a4)
TLS_PSK_WITH_AES_128_CBC_SHA256 (0x00ae)
TLS_PSK_WITH_AES_128_CBC_SHA (0x008c)
TLS_PSK_WITH_AES_128_CCM_8 (0xc0a8)
TLS_PSK_WITH_3DES_EDE_CBC_SHA (0x008b)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
signature_algorithms (0x000d)
encrypt_then_mac (0x0016)
extended_master_secret (0x0017)
Supported Groups
exact match
Signature Algorithmsrsa_pkcs1_sha512 (0x0601)
rsa_pkcs1_sha384 (0x0501)
rsa_pkcs1_sha256 (0x0401)
rsa_sha224 (0x0301)
rsa_pkcs1_sha1 (0x0201)
EC Point Formats
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-9046519765151777629
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
		0xc09d,
		tls.DISABLED_TLS_RSA_WITH_AES_256_CBC_SHA256,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
		0xc0a1,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		0xc09c,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA256,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		0xc0a0,
		tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
		0x00ad,
		0x00b7,
		0x0095,
		0x00ac,
		0x00b6,
		0x0094,
		0x0093,
		0x00a9,
		0xc0a5,
		0x00af,
		0x008d,
		0xc0a9,
		0x00a8,
		0xc0a4,
		0x00ae,
		0x008c,
		0xc0a8,
		0x008b,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short curves	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents