e6563fad2bacfa69

Seen (all time)
(past week)
200 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
9494 / 6450715
8332 / 275496
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_GOSTR341094_WITH_28147_CNT_IMIT (0x0080)
TLS_GOSTR341001_WITH_28147_CNT_IMIT (0x0081)
TLS_GOSTR341094_WITH_NULL_GOSTR3411 (0x0082)
TLS_GOSTR341001_WITH_NULL_GOSTR3411 (0x0083)
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0084)
TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0085)
TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0086)
TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0087)
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088)
TLS_PSK_WITH_AES_128_CBC_SHA (0x008c)
TLS_PSK_WITH_AES_256_CBC_SHA (0x008d)
TLS_DHE_PSK_WITH_AES_128_CBC_SHA (0x0090)
TLS_DHE_PSK_WITH_AES_256_CBC_SHA (0x0091)
TLS_RSA_PSK_WITH_AES_128_CBC_SHA (0x0094)
TLS_RSA_PSK_WITH_AES_256_CBC_SHA (0x0095)
TLS_RSA_WITH_SEED_CBC_SHA (0x0096)
TLS_DH_DSS_WITH_SEED_CBC_SHA (0x0097)
TLS_DH_RSA_WITH_SEED_CBC_SHA (0x0098)
TLS_DHE_DSS_WITH_SEED_CBC_SHA (0x0099)
TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x009a)
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)
Compression Methodsnull (0x00)
Extensions
exact match
server_name (0x0000)
signature_algorithms (0x000d)
Supported Groups
exact match
Signature Algorithms
exact match
rsa_pkcs1_sha512 (0x0601)
dsa_sha512 (0x0602)
ecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha384 (0x0501)
dsa_sha384 (0x0502)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha256 (0x0401)
dsa_sha256 (0x0402)
ecdsa_secp256r1_sha256 (0x0403)
rsa_sha224 (0x0301)
dsa_sha224 (0x0302)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
ecdsa_sha1 (0x0203)
EC Point Formats
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-1849220583994361239
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.UClient(tcpConn, &tlsConfig, tls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		0x0080,
		0x0081,
		0x0082,
		0x0083,
		0x0084,
		0x0085,
		0x0086,
		0x0087,
		0x0088,
		0x008c,
		0x008d,
		0x0090,
		0x0091,
		0x0094,
		0x0095,
		0x0096,
		0x0097,
		0x0098,
		0x0099,
		0x009a,
		0x00ff,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
code generation error: short curves	},
}
tlsConn.ApplyPreset(&clientHelloSpec)
        
n, err = tlsConn.Write([]byte("Hello, World!"))
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents