Network Fingerprint Test

TCP SYN + HTTP Headers + Client Hints + Consistency · tcp.dimsky.ru · 2026-03-13 07:20:40 UTC

MSS = 1460
p0f: "Ethernet or modem" WiFi / Ethernet

Client Info

Client IP18.97.14.86
IP VersionIPv4
User-AgentCCBot/2.0 (https://commoncrawl.org/faq/)
Accept-Languageen-US,en;q=0.5

Consistency Checks 0 passed, 1 failed

TCP OS vs UA Platform: TCP top: Linux (75%), UA: Unknown
MISMATCH: UA says Unknown but TCP looks like Linux

TCP/IP Fingerprint

JA4T35844_2-8-3_1460_7
Satori35844:64:1:40:M1460,N,N,T,N,W7:.
Link Type (p0f)Ethernet or modem
Zardaxt OSLinux (75%), Android (75%), FreeBSD (75%), macOS (65%), iOS (65%), Windows (35%)

Estimated Params

MTU1500
Initial TTL64
Distance9 Hops
Server-measured RTT0.2 ms
Effective Window4588032 bytes (4.4 MB)
Theoretical Throughput183521.3 Mbps

Client Hints (HTTP Headers from Browser)

No Client Hints headers received (first request - reload to get full hints)

IPv4 Header

Type of Service0x00 (DSCP: Best Effort, ECN: Not-ECT)
Total Length60
IP FlagsDF
Time to Live55
Protocol6 (TCP)

TCP Header

Src Port43772
Data Offset10 (40 bytes)
Window Size35844
TCP OptionsMSS, NOP, NOP, TIMESTAMP, NOP, WINDOW

TCP Options Detail

Maximum Segment Size (MSS)
Kind: 2 · Length: 4
Value: 1460
No-Operation (NOP)
Kind: 1 · Length: 1
No-Operation (NOP)
Kind: 1 · Length: 1
Timestamps (TIMESTAMP)
Kind: 8 · Length: 10
TS Value: 2888373571, Echo: 0
No-Operation (NOP)
Kind: 1 · Length: 1
Window Scale (WINDOW)
Kind: 3 · Length: 3
Shift: 7, Multiplier: 128

Match: tcp_fingerprint --wifi

MSS1460   got 1460 ✔
Window65535   got 35844
WScale9   got 7
ToS0x00   got 0 ✔
TTL64   got 55 (init 64, 9 hops)
OptionsMSS,SACK_PERM,TIMESTAMP,NOP,WINDOW   got MSS, NOP, NOP, TIMESTAMP, NOP, WINDOW

All HTTP Headers (6)

accepttext/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
accept-encodingzstd, br, gzip
accept-languageen-US,en;q=0.5
connectionKeep-Alive
hostdev.upakmarket.com
user-agentCCBot/2.0 (https://commoncrawl.org/faq/)

Raw SYN (60b)

45 00 00 3c 43 b9 40 00 37 06 03 74 12 61 0e 56 d5 ab 06 2d aa fc 00 50 d9 31 e7 ed 00 00 00 00 a0 02 8c 04 94 94 00 00 02 04 05 b4 01 01 08 0a ac 29 15 43 00 00 00 00 01 03 03 07
Reload JSON