a926d1a0b29bb676

Seen (all time)
(past week)
< 100 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
86614 / 912729
-1 / 13869
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_AES_128_CCM_SHA256 (0x1304)
TLS_AES_128_CCM_8_SHA256 (0x1305)
Compression Methodsnull (0x00)
Extensions
exact match
supported_groups (0x000a)
server_name (0x0000)
signature_algorithms (0x000d)
supported_versions (0x002b)
key_share (0x0033)
renegotiation_info (0xff01)
status_request (0x0005)
Supported Groups
exact match
secp160k1 (0x000f)
secp160r1 (0x0010)
secp160r2 (0x0011)
secp192k1 (0x0012)
secp192r1 (0x0013)
secp224k1 (0x0014)
secp224r1 (0x0015)
secp256k1 (0x0016)
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
sect163k1 (0x0001)
sect163r1 (0x0002)
sect163r2 (0x0003)
sect193r1 (0x0004)
sect193r2 (0x0005)
sect233k1 (0x0006)
sect233r1 (0x0007)
sect239k1 (0x0008)
sect283k1 (0x0009)
sect283r1 (0x000a)
sect409k1 (0x000b)
sect409r1 (0x000c)
sect571k1 (0x000d)
sect571r1 (0x000e)
x25519 (0x001d)
x448 (0x001e)
brainpoolP256r1 (0x001a)
brainpoolP384r1 (0x001b)
brainpoolP512r1 (0x001c)
Signature Algorithmsrsa_pkcs1_sha256 (0x0401)
rsa_pkcs1_sha384 (0x0501)
rsa_pkcs1_sha512 (0x0601)
ecdsa_secp256r1_sha256 (0x0403)
ecdsa_secp384r1_sha384 (0x0503)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pss_pss_sha256 (0x0809)
rsa_pss_pss_sha384 (0x080a)
rsa_pss_pss_sha512 (0x080b)
rsa_pss_rsae_sha256 (0x0804)
rsa_pss_rsae_sha384 (0x0805)
rsa_pss_rsae_sha512 (0x0806)
EC Point Formats
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
exact match
TLS 1.3 (0x0304)
Certificate Compression Algorithms
Record Size Limit
nid-6258084144063203722
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0x1304,
		0x1305,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short pt_fmts	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents