TCP/IP Fingerprinting

Your Web Browser

HTTP User-AgentCCBot/2.0 (https://commoncrawl.org/faq/)

TCP/IP Fingerprint

JA4T Fingerprint35844_2-1-1-8-1-3_1460_7
Satori Fingerprint35844:64:1:60:M1460,N,N,T,N,W7:.
Satori Signatureno matches
Link Type (p0f)Ethernet or modem
Zardaxt OS ScoringAndroid (43%), Linux (42%), Windows (20%), macOS (17%), iOS (16%)

Estimated Params

MTU1500
Initial TTL64
Distance7 Hops
TCP RTT6.53 ms (±2.461 ms)

IPv4 Header

Header Length5 (20 bytes)
Type of Service0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length60
Identification0xf0b4 (61620)
IP Flags0x2 (DF)
Time to Live57
Protocol6 (TCP)
Header Checksum0x86d5 (34517)

TCP Header

Src Port41472
Sequence Number3370179130
Data Offset10 (40 bytes)
TCP Flags0x002 (SYN)
Window Size35844
TCP Checksum0x8141 (33089)
Urgent Pointer0
TCP OptionsMSS, NOP, NOP, TIMESTAMP, NOP, WINDOW

Maximum Segment Size

NameMSS
Kind2
Length4
MSS Value1460

No-Operation

NameNOP
Kind1
Length1

No-Operation

NameNOP
Kind1
Length1

Timestamps

NameTIMESTAMP
Kind8
Length10
TS Value3791866542
TS Echo Reply0

No-Operation

NameNOP
Kind1
Length1

Window Scale

NameWINDOW
Kind3
Length3
Shift Count7
Multiplier128

Further Reading

Leave a Comment (1)