9569b22d3d880ec4

Seen (all time)
(past week)
< 100 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
42792 / 6489162
-1 / 295348
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
(0x8e01)
(0x430a)
(0xc746)
(0x0dcd)
(0x5946)
(0x36ed)
(0x9dbb)
(0xe8fb)
(0x3932)
(0x4fe8)
(0xc0b5)
(0x0308)
TLS_GOSTR341112_256_WITH_NULL_GOSTR3411 (0xff87)
(0xb800)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
application_layer_protocol_negotiation (0x0010)
Supported Groups
exact match
Signature Algorithms
exact match
?_? (0xf92a)
?_? (0x9362)
?_? (0x9969)
?_? (0x3641)
?_? (0xf718)
?_? (0xe2da)
?_? (0x8127)
?_? (0x9ca9)
?_? (0x735a)
?_? (0x8157)
EC Point Formatsuncompressed (0x00)
ALPNh2
http/1.1
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-7680411782128070972
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0x8e01,
		0x430a,
		0xc746,
		0x0dcd,
		0x5946,
		0x36ed,
		0x9dbb,
		0xe8fb,
		0x3932,
		0x4fe8,
		0xc0b5,
		0x0308,
		0xff87,
		0xb800,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short curves	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents