fc59c9683452cf41

Seen (all time)
(past week)
12M times (0.02%)
231K times (0.06%)
Rank (all time)
(past week)
342 / 955683
109 / 12036
TLS VersionTLS 1.2
Handshake VersionTLS 1.2
Cipher Suites
exact match
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)
TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
Compression Methodsnull (0x00)
Extensions
exact match
supported_groups (0x000a)
ec_point_formats (0x000b)
signature_algorithms (0x000d)
server_name (0x0000)
renegotiation_info (0xff01)
Supported Groups
exact match
secp256r1 (0x0017)
sect163k1 (0x0001)
sect163r2 (0x0003)
secp192r1 (0x0013)
secp224r1 (0x0015)
sect233k1 (0x0006)
sect233r1 (0x0007)
sect283k1 (0x0009)
sect283r1 (0x000a)
secp384r1 (0x0018)
sect409k1 (0x000b)
sect409r1 (0x000c)
secp521r1 (0x0019)
sect571k1 (0x000d)
sect571r1 (0x000e)
secp160k1 (0x000f)
secp160r1 (0x0010)
secp160r2 (0x0011)
sect163r1 (0x0002)
secp192k1 (0x0012)
sect193r1 (0x0004)
sect193r2 (0x0005)
secp224k1 (0x0014)
sect239k1 (0x0008)
secp256k1 (0x0016)
Signature Algorithmsecdsa_secp521r1_sha512 (0x0603)
rsa_pkcs1_sha512 (0x0601)
ecdsa_secp384r1_sha384 (0x0503)
rsa_pkcs1_sha384 (0x0501)
ecdsa_secp256r1_sha256 (0x0403)
rsa_pkcs1_sha256 (0x0401)
ecdsa_sha224 (0x0303)
rsa_sha224 (0x0301)
ecdsa_sha1 (0x0203)
rsa_pkcs1_sha1 (0x0201)
dsa_sha1 (0x0202)
rsa_md5 (0x0101)
EC Point Formatsuncompressed (0x00)
ALPN
Key Share
PSK Key Exchange Modes
Supported Versions
Certificate Compression Algorithms
Record Size Limit
nid-262957653832839359
Related
Labels
uTLS generated code
// import tls "github.com/refraction-networking/utls"
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443")
if err != nil {
	fmt.Printf("net.Dial() failed: %+v\n", err)
	return
}

config := tls.Config{ServerName: "tlsfingerprint.io"}
// This fingerprint includes feature(s), not fully supported by TLS.
// uTLS client with this fingerprint will only be able to to talk to servers,
// that also do not support those features. 
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom)
clientHelloSpec := tls.ClientHelloSpec {
	CipherSuites: []uint16{
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
		0x009e,
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
		0x0033,
		0x0032,
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
		tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
	},
	CompressionMethods: []byte{
		0x00, // compressionNone
	},
	Extensions: []tls.TLSExtension{
		&tls.SupportedCurvesExtension{[]tls.CurveID{
			tls.CurveP256,
			0x0001,
			0x0003,
			0x0013,
			0x0015,
			0x0006,
			0x0007,
			0x0009,
			0x000a,
			tls.CurveP384,
			0x000b,
			0x000c,
			tls.CurveP521,
			0x000d,
			0x000e,
			0x000f,
			0x0010,
			0x0011,
			0x0002,
			0x0012,
			0x0004,
			0x0005,
			0x0014,
			0x0008,
			0x0016,
		}},
		&tls.SupportedPointsExtension{SupportedPoints: []byte{
			0x00, // pointFormatUncompressed
		}},
		&tls.SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
			tls.ECDSAWithP521AndSHA512,
			tls.PKCS1WithSHA512,
			tls.ECDSAWithP384AndSHA384,
			tls.PKCS1WithSHA384,
			tls.ECDSAWithP256AndSHA256,
			tls.PKCS1WithSHA256,
			0x0303,
			0x0301,
			tls.ECDSAWithSHA1,
			tls.PKCS1WithSHA1,
			0x0202,
			0x0101,
		},},
		&tls.SNIExtension{},
		&tls.RenegotiationInfoExtension{renegotiation: tls.RenegotiateOnceAsClient},
	},
}
tlsConn.ApplyPreset(clientHelloSpec)
        
n, err = tlsConn.Write("Hello, World!")
// or tlsConn.Handshake() for better control

Times seen (per hour)

Percent seen (24 hour averaged)

User Agents