首页 > HTTP2/SSL/TLS 指纹检测

HTTP/2浏览器指纹识别通过分析特定的HTTP/2属性来识别网络客户端,例如SETTINGS帧的值,WINDOW_UPDATE帧,流的优先级以及伪标头字段的顺序。并生成一个 Akamai 格式的 http 指纹。通过此指纹,可以识别来自恶意脚本的请求。

HTTP 用户代理

Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36

HTTP 协议

h2

HTTP/2 指纹

Akamai Hash

52d84b11737d980aef856699f885ca86

Akamai Text

1:65536;2:0;4:6291456;6:262144|15663105|0|m,a,s,p

下面展示您的网络浏览器的SSL/TLS功能,包括支持的TLS协议、密码套件、扩展和密钥交换组。并生成一个以JA3和JA4格式的TLS指纹。通过此指纹,也可以识别来自恶意脚本的请求。

TLS 指纹

JA3

771,4865-4866-4867-49195-49199-49196-49200-52393-52392-49171-49172-156-157-47-53,65037-35-11-0-17613-13-18-65281-16-51-5-43-10-23-27-45-41,4588-29-23-24,0

JA3 Hash

49c97eb94628c4f9bb4306edd35f78b7

JA4

t13d1517h2_8daaf6152771_fe463045f808

Fingerprint Hash

6610d0ebe9e95701ff3ea35558bbeb90

TLS 握手

TLS 协议

TLS 1.3

SETTINGS Frame:

Lengthh2
Settings HEADER_TABLE_SIZE = 65536
ENABLE_PUSH = 0
INITIAL_WINDOW_SIZE = 6291456
MAX_HEADER_LIST_SIZE = 262144

WINDOW UPDATE Frame:

Length4
window update increment15663105

HEADERS Frame:

Length387
Stream ID1
Headers :methodGET
:authoritytls.browserscan.net
:schemehttps
:path/api/tls
sec-ch-ua-platform"Windows"
user-agentAmazon CloudFront
sec-ch-ua"Chromium";v="142", "Google Chrome";v="142", "Not_A Brand";v="99"
sec-ch-ua-mobile?0
accept*/*
originhttps://www.browserscan.net
sec-fetch-sitesame-origin
sec-fetch-modecors
sec-fetch-destempty
refererhttps://www.browserscan.net/
accept-encodinggzip
accept-languagezh-CN,zh;q=0.9,en;q=0.8
priorityu=1, i
x-nginx-proxytrue
x-real-ip100.122.22.50
x-forwarded-for104.128.72.45, 64.252.103.19, 100.122.22.50
hostwww.browserscan.net
x-forwarded-protohttp
connectionclose
remoteip64.252.103.19
cookieFCCDCF=%5Bnull%2Cnull%2Cnull%2Cnull%2Cnull%2Cnull%2C%5B%5B32%2C%22%5B%5C%22a7304dc8-a7d5-452e-b12f-4affb3fa9cf3%5C%22%2C%5B1761630458%2C92000000%5D%5D%22%5D%2C%5B13%2C%22%5B%5C%22DBABL~BVQqAAAAAg%5C%22%2C%5B%5B7%2C%5B1764292071%2C996286000%5D%5D%5D%5D%22%5D%5D%5D; FCNEC=%5B%5B%22AKsRol-7Npe4Iv-CR1SDlJMnz7PYbahW1VDSz1PT1LJDDjJNdtgeDtoarEkfoD2cE6l3rS91toDn2Imm3cZdDtvk37DBgNLIqkcKOndOWO1f9fIttFEp2V3WDz1biK06_PYqj4fbiL_XNxyuYAQC5mCXLA-KGis8wQ%3D%3D%22%5D%5D; __Host-next-auth.csrf-token=f4619cc528d694cfd676ce44480183aedf8a4300c69478857f7fdf41e4255b43%7Cf97e17f3254b290ee73625bc6e897a29c633f3ae69f0d9cccb467abc123dc90f; __Secure-next-auth.callback-url=https%3A%2F%2Fwww.browserscan.net; __eoi=ID=b460fb2ebd904673:T=1759041894:RT=1764292095:S=AA-AfjY6xzPX7_YIcLgdQU2njSGd; __gads=ID=d9883aa3fe2d9d7d:T=1759041894:RT=1764292095:S=ALNI_MbLsoEP4EmXZPsC-BpOUoDXRMlReQ; __gpi=UID=000011569a0ee189:T=1759041894:RT=1764292095:S=ALNI_MaL7hEn1M5dDd8fTjutwpHJkQdOxg; _clck=g06ddf%5E2%5Eg1c%5E0%5E2152; _ga=GA1.1.1879318800.1759041890; _ga_EL9P566V3G=GS2.1.s1764137199$o2$g1$t1764137215$j44$l0$h0; _ga_YEXKJRVLPZ=GS2.1.s1764292055$o97$g0$t1764292055$j60$l0$h0; i18n_redirected=zh
via2.0 dfdc515984888055a2a3d73a39a69216.cloudfront.net (CloudFront)
sec-ch-ua-platform-version"10.0.0"
x-amz-cf-idnvj4YtRRJV8_302415Z_gpl9IofVRFvAMpCkYe3_bPX_z63n14TkwA==
sec-ch-ua-full-version-list"Chromium";v="142.0.7444.176", "Google Chrome";v="142.0.7444.176", "Not_A Brand";v="99.0.0.0"
viewport-width1920
device-memory8
sec-ch-dpr1
sec-ch-ua-model""
sec-ch-ua-form-factors"Desktop"
baggagesentry-environment=pro,sentry-public_key=d73c552868a1b847e01b700daad218d1,sentry-trace_id=8e22f0a552124b0881acccbe63023aae,sentry-transaction=%2Fzh%2Ftls,sentry-sampled=false,sentry-sample_rand=0.20898122807235953,sentry-sample_rate=0.01
sentry-trace8e22f0a552124b0881acccbe63023aae-9abebdfeae40a2c9-0
sec-ch-ua-wow64?0
sec-ch-ua-arch"x86"
sec-ch-prefers-reduced-transparencyno-preference
sec-ch-ua-full-version"142.0.7444.176"
sec-ch-viewport-width1920
sec-ch-ua-bitness"64"
downlink1.4
sec-ch-viewport-height919
ect3g
sec-ch-device-memory8
sec-ch-prefers-reduced-motionno-preference
dpr1
sec-ch-prefers-color-schemelight
rtt450
FlagsEndStream (0x1)
EndHeaders (0x4)
Priority (0x20)
Weight220
Stream Dependency0
Exclusive1

客户端支持的加密套件 (按接收顺序)

Cipher Suites 0x6A6A
GREASE
0x1301
TLS_AES_128_GCM_SHA256recommended
tls1.3
0x1302
TLS_AES_256_GCM_SHA384recommended
tls1.3
0x1303
TLS_CHACHA20_POLY1305_SHA256recommended
tls1.3
0xC02B
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256recommended
tls1.2, tls1.3
0xC02F
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256secure
tls1.2, tls1.3
0xC02C
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384recommended
tls1.2, tls1.3
0xC030
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384secure
tls1.2, tls1.3
0xCCA9
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256recommended
tls1.2, tls1.3
0xCCA8
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256secure
tls1.2, tls1.3
0xC013
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHAweak
tls1.0, tls1.1, tls1.2, tls1.3
0xC014
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAweak
tls1.0, tls1.1, tls1.2, tls1.3
0x9C
TLS_RSA_WITH_AES_128_GCM_SHA256weak
tls1.2, tls1.3
0x9D
TLS_RSA_WITH_AES_256_GCM_SHA384weak
tls1.2, tls1.3
0x2F
TLS_RSA_WITH_AES_128_CBC_SHAweak
tls1.0, tls1.1, tls1.2, tls1.3
0x35
TLS_RSA_WITH_AES_256_CBC_SHAweak
tls1.0, tls1.1, tls1.2, tls1.3

客户端支持的 TLS 扩展 (按接收顺序)

TLS Extensions 0x0A0AGREASE
0x000Bec_point_formats
0x000Dsignature_algorithms
0x002Dpsk_key_exchange_modes
0x002Bsupported_versions
0x0023session_ticket
0x44CDUnknown extension 17613
0xFF01extensionRenegotiationInfo (boringssl)
0x001Bcompress_certificate
0x0010application_layer_protocol_negotiation
0x0005status_request
0x0017extended_master_secret
0xFE0DextensionEncryptedClientHello (boringssl)
0x0000server_name
0x0012signed_certificate_timestamp
0x000Asupported_groups
0x0033key_share
0x1A1AGREASE
0x0029pre_shared_key

supported_groups

supported_groupsGREASE (0x5a5a)
Unknown curve 4588
X25519 (29)
P-256 (23)
P-384 (24)

ec_point_formats

elliptic_curves_point_formats0x00

compress_certificate

algorithmsbrotli (2)

psk_key_exchange_modes

PSK_Key_Exchange_ModePSK with (EC)DHE key establishment (psk_dhe_ke) (1)

signature_algorithms

signature_algorithmsecdsa_secp256r1_sha256
rsa_pss_rsae_sha256
rsa_pkcs1_sha256
ecdsa_secp384r1_sha384
rsa_pss_rsae_sha384
rsa_pkcs1_sha384
rsa_pss_rsae_sha512
rsa_pkcs1_sha512

server_name

server_nametls.browserscan.net

supported_versions

versionsGREASE (0x9a9a)
TLS 1.3
TLS 1.2

application_layer_protocol_negotiation

protocolsh2
http/1.1

status_request

status_request { "certificate_status_type": "OSCP (1)", "responder_id_list_length": 0, "request_extensions_length": 0 }

extensionRenegotiationInfo (boringssl)

data00

key_share

shared_keys { "GREASE (0x5a5a)": "00" }
{ "Unknown curve 4588": "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" }
{ "X25519 (29)": "bf6e894aeddc9fb25ed8fb6ef0d6f16d9c0175099d7f57cfae18994f135e0168" }

Unknown extension 17613

data0003026832

extensionEncryptedClientHello (boringssl)

data 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