8ba9fd763035e969

Seen (all time)
(past week)
194 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
9906 / 9992456
14698 / 1866985
TLS VersionTLS 1.0
Handshake VersionTLS 1.0
Cipher Suites
exact match
(0x0059)
TLS_ECDH_anon_WITH_NULL_SHA (0xc015)
TLS_ECDH_anon_WITH_RC4_128_SHA (0xc016)
(0x0058)
(0x004f)
(0x0052)
(0x0051)
(0x0050)
(0x0053)
(0x0056)
(0x0055)
(0x0054)
TLS_GOSTR341001_WITH_28147_CNT_IMIT (0x0081)
TLS_GOSTR341001_WITH_NULL_GOSTR3411 (0x0083)
TLS_GOSTR341094_WITH_28147_CNT_IMIT (0x0080)
TLS_GOSTR341094_WITH_NULL_GOSTR3411 (0x0082)
TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 (0x0029)
TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA (0x0026)
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5 (0x002a)
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA (0x0027)
TLS_KRB5_EXPORT_WITH_RC4_40_MD5 (0x002b)
TLS_KRB5_EXPORT_WITH_RC4_40_SHA (0x0028)
TLS_KRB5_WITH_3DES_EDE_CBC_MD5 (0x0023)
TLS_KRB5_WITH_3DES_EDE_CBC_SHA (0x001f)
TLS_KRB5_WITH_DES_CBC_MD5 (0x0022)
SSL_FORTEZZA_KEA_WITH_RC4_128_SHA (0x001e)
TLS_KRB5_WITH_IDEA_CBC_MD5 (0x0025)
TLS_KRB5_WITH_IDEA_CBC_SHA (0x0021)
TLS_KRB5_WITH_RC4_128_MD5 (0x0024)
TLS_KRB5_WITH_RC4_128_SHA (0x0020)
TLS_NULL_WITH_NULL_NULL (0x0000)
TLS_PSK_DHE_WITH_AES_128_CCM_8 (0xc0aa)
TLS_PSK_DHE_WITH_AES_256_CCM_8 (0xc0ab)
TLS_PSK_WITH_3DES_EDE_CBC_SHA (0x008b)
TLS_PSK_WITH_AES_128_CBC_SHA (0x008c)
TLS_PSK_WITH_AES_128_CBC_SHA256 (0x00ae)
TLS_PSK_WITH_AES_128_CCM (0xc0a4)
TLS_PSK_WITH_AES_128_CCM_8 (0xc0a8)
TLS_PSK_WITH_AES_128_GCM_SHA256 (0x00a8)
TLS_PSK_WITH_AES_256_CBC_SHA (0x008d)
TLS_PSK_WITH_AES_256_CBC_SHA384 (0x00af)
TLS_PSK_WITH_AES_256_CCM (0xc0a5)
TLS_PSK_WITH_AES_256_CCM_8 (0xc0a9)
TLS_PSK_WITH_AES_256_GCM_SHA384 (0x00a9)
TLS_PSK_WITH_ARIA_128_CBC_SHA256 (0xc064)
TLS_PSK_WITH_ARIA_128_GCM_SHA256 (0xc06a)
TLS_PSK_WITH_ARIA_256_CBC_SHA384 (0xc065)
TLS_PSK_WITH_ARIA_256_GCM_SHA384 (0xc06b)
TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 (0xc094)
TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 (0xc08e)
TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 (0xc095)
TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 (0xc08f)
TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 (0xccab)
TLS_PSK_WITH_NULL_SHA (0x002c)
TLS_PSK_WITH_NULL_SHA256 (0x00b0)
TLS_PSK_WITH_NULL_SHA384 (0x00b1)
TLS_PSK_WITH_RC4_128_SHA (0x008a)
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA (0x0062)
TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 (0x0061)
TLS_RSA_EXPORT1024_WITH_RC4_56_MD5 (0x0060)
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA (0x0064)
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0008)
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x0006)
TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x0003)
Compression Methodsnull (0x00)
Extensions
exact match
ec_point_formats (0x000b)
supported_groups (0x000a)
Supported Groups
exact match
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
x25519 (0x001d)
ffdhe2048 (0x0100)
Signature Algorithms
exact match
EC Point Formatsuncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-8382890547316659863
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0x0059,
		0xc015,
		0xc016,
		0x0058,
		0x004f,
		0x0052,
		0x0051,
		0x0050,
		0x0053,
		0x0056,
		0x0055,
		0x0054,
		0x0081,
		0x0083,
		0x0080,
		0x0082,
		0x0029,
		0x0026,
		0x002a,
		0x0027,
		0x002b,
		0x0028,
		0x0023,
		0x001f,
		0x0022,
		0x001e,
		0x0025,
		0x0021,
		0x0024,
		0x0020,
		0x0000,
		0xc0aa,
		0xc0ab,
		0x008b,
		0x008c,
		0x00ae,
		0xc0a4,
		0xc0a8,
		0x00a8,
		0x008d,
		0x00af,
		0xc0a5,
		0xc0a9,
		0x00a9,
		0xc064,
		0xc06a,
		0xc065,
		0xc06b,
		0xc094,
		0xc08e,
		0xc095,
		0xc08f,
		0xccab,
		0x002c,
		0x00b0,
		0x00b1,
		0x008a,
		0x0062,
		0x0061,
		0x0060,
		0x0064,
		0x0008,
		0x0006,
		0x0003,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short sig_algs	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents