Show HN: Tlsinfo.me – check your JA3/JA4 TLS fingerprints
curl https://tlsinfo.me/json or visit from your browser. It returns the TLS fingerprint that your request presented, including: JA3, JA3_r (raw), JA4 and JA4_r (raw).
Example response (shortened) using `curl 8.11.1 (x86_64-redhat-linux-gnu)` on fedora: { "ja3": "160803D3AE5B823F4D69B160C1F65837", "ja3_r": "771,4866-4867-4865-4868-49196-49200-52393-52392-....", "ja4": "t13d4213h2_171bc101b036_d17aae9fefe4", "ja4_r": "t13d4213h2_002f,0032,0033,0035,0038,0039,003c,003d,...." }
No auth, QUIC supported, rate limited at 10 req/10s/IP to protect the server (pls be nice). Could be handy for: - Playing around and learning about TLS. - Debugging. - Investigating how different clients/software leave different fingerprints. - Adding one-liner fingerprint checks in tools or as part of an automation pipeline. - Set up a reverse proxy or domain on cloudflare CNAME'd to tlsinfo.me and check their fingerprint.
Let me know if you find it useful. Reach out if you have any questions or ideas. Thanks.
No comments yet