cbd7b8736791b6fe

Seen (all time)
(past week)
1.3M times (0.01%)
45K times (0.01%)
Rank (all time)
(past week)
637 / 348703
370 / 20867
TLS VersionTLS 1.0
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_AES_256_GCM_SHA384 (0x1302)
TLS_CHACHA20_POLY1305_SHA256 (0x1303)
TLS_AES_128_GCM_SHA256 (0x1301)
TLS_AES_128_CCM_SHA256 (0x1304)
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9)
TLS_ECDHE_ECDSA_WITH_AES_256_CCM (0xc0ad)
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_ECDSA_WITH_AES_128_CCM (0xc0ac)
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)
TLS_RSA_WITH_AES_256_CCM (0xc09d)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_128_CCM (0xc09c)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xccaa)
TLS_DHE_RSA_WITH_AES_256_CCM (0xc09f)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
TLS_DHE_RSA_WITH_AES_128_CCM (0xc09e)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
Compression Methodsnull (0x00)
Extensions
exact match
status_request (0x0005)
supported_groups (0x000a)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
encrypt_then_mac (0x0016)
extended_master_secret (0x0017)
SessionTicket TLS (0x0023)
key_share (0x0033)
supported_versions (0x002b)
renegotiation_info (0xff01)
server_name (0x0000)
psk_key_exchange_modes (0x002d)
record_size_limit (0x001c)
Supported Groups
exact match
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
x25519 (0x001d)
ffdhe2048 (0x0100)
ffdhe3072 (0x0101)
ffdhe4096 (0x0102)
ffdhe6144 (0x0103)
ffdhe8192 (0x0104)
Signature Algorithmsrsa_pkcs1_sha256 (0x0401)
rsa_pss_pss_sha256 (0x0809)
rsa_pss_rsae_sha256 (0x0804)
ecdsa_secp256r1_sha256 (0x0403)
ed25519 (0x0807)
rsa_pkcs1_sha384 (0x0501)
rsa_pss_pss_sha384 (0x080a)
rsa_pss_rsae_sha384 (0x0805)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha512 (0x0601)
rsa_pss_pss_sha512 (0x080b)
rsa_pss_rsae_sha512 (0x0806)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha1 (0x0201)
ecdsa_sha1 (0x0203)
EC Point Formatsuncompressed (0x00)
ALPN
Key Share secp256r1 (0x0017) - 65-byte key
x25519 (0x001d) - 32-byte key
PSK Key Exchange Modes psk_dhe_ke (0x01)
psk_ke (0x00)
Supported Versions
exact match
TLS 1.3 (0x0304)
TLS 1.2 (0x0303)
TLS 1.1 (0x0302)
TLS 1.0 (0x0301)
Certificate Compression Algorithms
Record Size Limit16384
nid-3758332558219036930
Cluster Cluster #49
7 fingerprints, comprising 0.0% of connections
Related d7438740ad2d36cd (compare) Seen 14257 times (0.00%)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_AES_256_GCM_SHA384,
		tls.TLS_CHACHA20_POLY1305_SHA256,
		tls.TLS_AES_128_GCM_SHA256,
		0x1304,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
		0xc0ad,
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		0xc0ac,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
		0xc09d,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		0xc09c,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		0x009f,
		0xccaa,
		0xc09f,
		0x0039,
		0x009e,
		0xc09e,
		0x0033,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.StatusRequestExtension{},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.CurveP256,
			tls.CurveP384,
			tls.CurveP521,
			tls.X25519,
			0x0100,
			0x0101,
			0x0102,
			0x0103,
			0x0104,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.PKCS1WithSHA256,
			0x0809,
			tls.PSSWithSHA256,
			tls.ECDSAWithP256AndSHA256,
			0x0807,
			tls.PKCS1WithSHA384,
			0x080a,
			tls.PSSWithSHA384,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA512,
			0x080b,
			tls.PSSWithSHA512,
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA1,
			tls.ECDSAWithSHA1,
		},},
		&tls.GenericExtension {id: 0x0016}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.SessionTicketExtension{},
		&tls.KeyShareExtension{[]tls.KeyShare{
			{Group: tls.CurveP256},
			{Group: tls.X25519},
		}},
		&tls.SupportedVersionsExtension{[]uint16{
			tls.VersionTLS13,
			tls.VersionTLS12,
			tls.VersionTLS11,
			tls.VersionTLS10,
		}},
		&tls.RenegotiationInfoExtension{renegotiation: tls.RenegotiateOnceAsClient},
		&tls.SNIExtension{},
		&tls.PSKKeyExchangeModesExtension{[]uint8{
			tls.PskModeDHE,
			tls.PskModePlain,
		}},
		&tls.FakeRecordSizeLimitExtension{16384},

	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents