be7a916f7b1bb1f6

Seen (all time)
(past week)
< 100 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
86614 / 912720
-1 / 13875
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
(0xab98)
(0xb47c)
(0xf1a1)
(0xc64c)
(0x6a53)
(0xc105)
(0xf126)
TLS_DHE_RSA_WITH_AES_256_CCM_8 (0xc0a3)
(0xeab7)
(0x4154)
(0x575d)
(0x9cd7)
(0x4bec)
(0x44e5)
(0x2d2d)
(0x7d8b)
(0x4a4d)
(0x2e7e)
(0x6fdd)
(0xdf74)
(0x8f8e)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
application_layer_protocol_negotiation (0x0010)
Supported Groups
exact match
Signature Algorithms?_? (0x2775)
?_? (0x6d4c)
?_? (0xb604)
?_? (0xb924)
EC Point Formatsuncompressed (0x00)
ALPNh2
http/1.1
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-4721301351351733770
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0xab98,
		0xb47c,
		0xf1a1,
		0xc64c,
		0x6a53,
		0xc105,
		0xf126,
		0xc0a3,
		0xeab7,
		0x4154,
		0x575d,
		0x9cd7,
		0x4bec,
		0x44e5,
		0x2d2d,
		0x7d8b,
		0x4a4d,
		0x2e7e,
		0x6fdd,
		0xdf74,
		0x8f8e,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short curves	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents