fbde5be30caf1134

Seen (all time)
(past week)
720 times (0.00%)
< 100 times (0.00%)
Rank (all time)
(past week)
15135 / 913193
-1 / 14225
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
Compression Methodsnull (0x00)
DEFLATE (0x01)
Extensions
exact match
supported_groups (0x000a)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
encrypt_then_mac (0x0016)
extended_master_secret (0x0017)
padding (0x0015)
Supported Groups
exact match
x448 (0x001e)
x25519 (0x001d)
secp521r1 (0x0019)
secp384r1 (0x0018)
secp256r1 (0x0017)
sect571r1 (0x000e)
sect571k1 (0x000d)
brainpoolP512r1 (0x001c)
sect409r1 (0x000c)
sect409k1 (0x000b)
brainpoolP384r1 (0x001b)
sect283r1 (0x000a)
sect283k1 (0x0009)
secp256k1 (0x0016)
brainpoolP256r1 (0x001a)
sect239k1 (0x0008)
sect233r1 (0x0007)
sect233k1 (0x0006)
secp224r1 (0x0015)
secp224k1 (0x0014)
sect193r1 (0x0004)
sect193r2 (0x0005)
secp192r1 (0x0013)
secp192k1 (0x0012)
sect163r1 (0x0002)
sect163r2 (0x0003)
sect163k1 (0x0001)
secp160r1 (0x0010)
secp160r2 (0x0011)
secp160k1 (0x000f)
Signature Algorithmsed448 (0x0808)
ed25519 (0x0807)
rsa_pss_pss_sha512 (0x080b)
rsa_pss_pss_sha384 (0x080a)
rsa_pss_pss_sha256 (0x0809)
rsa_pss_rsae_sha512 (0x0806)
rsa_pss_rsae_sha384 (0x0805)
rsa_pss_rsae_sha256 (0x0804)
ecdsa_secp521r1_sha512 (0x0603)
ecdsa_secp384r1_sha384 (0x0503)
ecdsa_secp256r1_sha256 (0x0403)
ecdsa_sha224 (0x0303)
rsa_pkcs1_sha512 (0x0601)
rsa_pkcs1_sha384 (0x0501)
rsa_pkcs1_sha256 (0x0401)
rsa_sha224 (0x0301)
ecdsa_sha1 (0x0203)
dsa_sha1 (0x0202)
rsa_pkcs1_sha1 (0x0201)
rsa_md5 (0x0101)
EC Point Formatsuncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-297699494631370444
Related 861a4dd67aec29f4 (compare) Seen 12957 times (0.00%)
54405cef85074e67 (compare) Seen 10752 times (0.00%)
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
		0x01
	},
	Extensions: []tls.TLSExtension{
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			0x001e,
			tls.X25519,
			tls.CurveP521,
			tls.CurveP384,
			tls.CurveP256,
			0x000e,
			0x000d,
			0x001c,
			0x000c,
			0x000b,
			0x001b,
			0x000a,
			0x0009,
			0x0016,
			0x001a,
			0x0008,
			0x0007,
			0x0006,
			0x0015,
			0x0014,
			0x0004,
			0x0005,
			0x0013,
			0x0012,
			0x0002,
			0x0003,
			0x0001,
			0x0010,
			0x0011,
			0x000f,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			0x0808,
			0x0807,
			0x080b,
			0x080a,
			0x0809,
			tls.PSSWithSHA512,
			tls.PSSWithSHA384,
			tls.PSSWithSHA256,
			tls.ECDSAWithP521AndSHA512,
			tls.ECDSAWithP384AndSHA384,
			tls.ECDSAWithP256AndSHA256,
			0x0303,
			tls.PKCS1WithSHA512,
			tls.PKCS1WithSHA384,
			tls.PKCS1WithSHA256,
			0x0301,
			tls.ECDSAWithSHA1,
			0x0202,
			tls.PKCS1WithSHA1,
			0x0101,
		},},
		&tls.GenericExtension {id: 0x0016}, // WARNING: UNKNOWN EXTENSION, USE AT YOUR OWN RISK
		&tls.UtlsExtendedMasterSecretExtension{},
		&tls.UtlsPaddingExtension{GetPaddingLen: BoringPaddingStyle},
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents