TCP/IP Fingerprinting

Your Web Browser

HTTP User-AgentRuby

TCP/IP Fingerprint

JA4T Fingerprint42340_2-4-8-1-3_1460_9
Satori Fingerprint42340:64:1:60:M1460,S,T,N,W9:.
Satori Signatureno matches
Link Type (p0f)Ethernet or modem
Zardaxt OS ScoringAndroid (57%), Linux (47%), Windows (21%), macOS (17%), iOS (16%)

Estimated Params

MTU1500
Initial TTL64
Distance7 Hops
TCP RTT6.615 ms (±2.489 ms)

IPv4 Header

Header Length5 (20 bytes)
Type of Service0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length60
Identification0x5891 (22673)
IP Flags0x2 (DF)
Time to Live57
Protocol6 (TCP)
Header Checksum0x48e4 (18660)

TCP Header

Src Port54552
Sequence Number2499818806
Data Offset10 (40 bytes)
TCP Flags0x002 (SYN)
Window Size42340
TCP Checksum0xd2a2 (53922)
Urgent Pointer0
TCP OptionsMSS, SACK_PERM, TIMESTAMP, NOP, WINDOW

Maximum Segment Size

NameMSS
Kind2
Length4
MSS Value1460

SACK-Permitted

NameSACK_PERM
Kind4
Length2

Timestamps

NameTIMESTAMP
Kind8
Length10
TS Value3333736432
TS Echo Reply0

No-Operation

NameNOP
Kind1
Length1

Window Scale

NameWINDOW
Kind3
Length3
Shift Count9
Multiplier512

Further Reading

Leave a Comment (4)