d84e86033f322981

Seen (all time)
(past week)
184 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
18543 / 580690
5449 / 8816
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA (0xc034)
TLS_DH_anon_WITH_ARIA_128_CBC_SHA256 (0xc046)
TLS_DH_anon_WITH_ARIA_256_CBC_SHA384 (0xc047)
TLS_DH_anon_WITH_ARIA_128_GCM_SHA256 (0xc05a)
TLS_DH_anon_WITH_ARIA_256_GCM_SHA384 (0xc05b)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
ec_point_formats (0x000b)
supported_groups (0x000a)
signature_algorithms (0x000d)
Supported Groups
exact match
sect163k1 (0x0001)
sect163r1 (0x0002)
sect163r2 (0x0003)
sect193r1 (0x0004)
sect193r2 (0x0005)
sect233k1 (0x0006)
sect233r1 (0x0007)
sect239k1 (0x0008)
sect283k1 (0x0009)
sect283r1 (0x000a)
sect409k1 (0x000b)
sect409r1 (0x000c)
sect571k1 (0x000d)
sect571r1 (0x000e)
secp160k1 (0x000f)
secp160r1 (0x0010)
secp160r2 (0x0011)
secp192k1 (0x0012)
secp192r1 (0x0013)
secp224k1 (0x0014)
secp224r1 (0x0015)
secp256k1 (0x0016)
secp256r1 (0x0017)
secp384r1 (0x0018)
secp521r1 (0x0019)
brainpoolP256r1 (0x001a)
brainpoolP384r1 (0x001b)
brainpoolP512r1 (0x001c)
x25519 (0x001d)
x448 (0x001e)
ffdhe2048 (0x0100)
ffdhe3072 (0x0101)
ffdhe4096 (0x0102)
ffdhe6144 (0x0103)
ffdhe8192 (0x0104)
Signature Algorithmsrsa_pkcs1_sha512 (0x0601)
dsa_sha512 (0x0602)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha384 (0x0501)
dsa_sha384 (0x0502)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_secp256r1_sha256 (0x0403)
rsa_sha224 (0x0301)
dsa_sha224 (0x0302)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
ecdsa_sha1 (0x0203)
EC Point Formatsuncompressed (0x00)
ansiX962_compressed_prime (0x01)
ansiX962_compressed_char2 (0x02)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-2860201364830410367
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0xc034,
		0xc046,
		0xc047,
		0xc05a,
		0xc05b,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SNIExtension{},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
			0x01
			0x02
		}},
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			0x0001,
			0x0002,
			0x0003,
			0x0004,
			0x0005,
			0x0006,
			0x0007,
			0x0008,
			0x0009,
			0x000a,
			0x000b,
			0x000c,
			0x000d,
			0x000e,
			0x000f,
			0x0010,
			0x0011,
			0x0012,
			0x0013,
			0x0014,
			0x0015,
			0x0016,
			tls.CurveP256,
			tls.CurveP384,
			tls.CurveP521,
			0x001a,
			0x001b,
			0x001c,
			tls.X25519,
			0x001e,
			0x0100,
			0x0101,
			0x0102,
			0x0103,
			0x0104,
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.PKCS1WithSHA512,
			0x0602,
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA384,
			0x0502,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA256,
			0x0402,
			tls.ECDSAWithP256AndSHA256,
			0x0301,
			0x0302,
			0x0303,
			tls.PKCS1WithSHA1,
			0x0202,
			tls.ECDSAWithSHA1,
		},},
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents