9d0e7bd0da303095

Seen (all time)
(past week)
979 times (0.00%)
583 times (0.00%)
Rank (all time)
(past week)
9638 / 406128
2143 / 13319
TLS VersionTLS 1.0
Handshake VersionTLS 1.1
Cipher Suites
exact match
TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 (0x0017)
TLS_DH_anon_WITH_RC4_128_MD5 (0x0018)
TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA (0x0019)
TLS_DH_anon_WITH_DES_CBC_SHA (0x001a)
TLS_DH_anon_WITH_3DES_EDE_CBC_SHA (0x001b)
TLS_DH_anon_WITH_AES_128_CBC_SHA (0x0034)
TLS_DH_anon_WITH_AES_256_CBC_SHA (0x003a)
TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA (0x0046)
TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA (0x0089)
TLS_DH_anon_WITH_SEED_CBC_SHA (0x009b)
TLS_ECDH_anon_WITH_NULL_SHA (0xc015)
TLS_ECDH_anon_WITH_RC4_128_SHA (0xc016)
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (0xc017)
TLS_ECDH_anon_WITH_AES_128_CBC_SHA (0xc018)
TLS_ECDH_anon_WITH_AES_256_CBC_SHA (0xc019)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression MethodsDEFLATE (0x01)
null (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
supported_groups (0x000a)
SessionTicket TLS (0x0023)
heartbeat (0x000f)
Supported Groups
exact match
secp256r1 (0x0017)
secp521r1 (0x0019)
brainpoolP512r1 (0x001c)
brainpoolP384r1 (0x001b)
secp384r1 (0x0018)
brainpoolP256r1 (0x001a)
secp256k1 (0x0016)
sect571r1 (0x000e)
sect571k1 (0x000d)
sect409k1 (0x000b)
sect409r1 (0x000c)
sect283k1 (0x0009)
sect283r1 (0x000a)
Signature Algorithms
EC Point Formatsuncompressed (0x00)
ansiX962_compressed_prime (0x01)
ansiX962_compressed_char2 (0x02)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-7129625023136911211
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0x0017,
		0x0018,
		0x0019,
		0x001a,
		0x001b,
		0x0034,
		0x003a,
		0x0046,
		0x0089,
		0x009b,
		0xc015,
		0xc016,
		0xc017,
		0xc018,
		0xc019,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x01
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short sig_algs	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents