c680de15d10299de

Seen (all time)
(past week)
24K times (0.00%)
4.2K times (0.00%)
Rank (all time)
(past week)
4562 / 688300
1241 / 19469
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_AES_128_GCM_SHA256 (0x1301)
Compression Methodsnull (0x00)
Extensions
exact match
signature_algorithms (0x000d)
supported_groups (0x000a)
psk_key_exchange_modes (0x002d)
supported_versions (0x002b)
signature_algorithms_cert (0x0032)
server_name (0x0000)
key_share (0x0033)
Supported Groups
exact match
secp256r1 (0x0017)
Signature Algorithmsecdsa_secp256r1_sha256 (0x0403)
EC Point Formats
ALPN
Key Share secp256r1 (0x0017) - 65-byte key
PSK Key Exchange Modes psk_dhe_ke (0x01)
Supported Versions
exact match
TLS 1.3 (0x0304)
(0xfb1a)
Certificate Compression Algorithms
Record Size Limit
nid-4143067471898568226
Cluster Cluster #295
2 fingerprints, comprising 0.0% of connections
Related 37683b8f495f1b5a (compare) Seen 20971 times (0.00%)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_AES_128_GCM_SHA256,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short pt_fmts	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents