TLScope

Investigate if an IP Address or domain name is characterized by suspicious activity

IP address:

IPv4 Hosts: 100K Unique fingerprints: 15K Malicious Hosts: 3K

how it works

Learn more about how TLScope works

TLScope: an overview

Over the last few years, the adoption of encryption in network traffic has been constantly increasing. The percentage of encrypted communications worldwide is estimated to exceed 90%. Although network encryption protocols mainly aim to secure and protect users’ online activities and communications, they have been exploited by malicious entities that hide their presence in the network. It was estimated that in 2022, more than 85% of the malware used encrypted communication channels. Using TLScope, you can find out activity details of an online server. The results are derived by Machine Learning models.

leveranging TLS handshakes

The TLS handshake begins with the client sending a Client Hello message to the server. This message contains crucial information, such as the supported TLS versions, cipher suites, and extensions. It serves as a way for the client to communicate its capabilities and preferences to the server. Upon receiving the Client Hello message, the server responds with a Server Hello message. This message includes details about the selected TLS version, cipher suite, and other parameters chosen by the server. It allows the server to inform the client of its preferences and capabilities, enabling both parties to negotiate and agree upon the most secure and compatible settings for their communication.

encrypted traffic analytics now

Even though network encryption is crucial for the protection of users privacy, it naturally introduces challenges for tools and mechanisms that perform packet inspection and rely heavily on the processing of packet payloads, which are now getting encrypted. The operation of deep packet inspection is vital for firewalls or intrusion detection and prevention systems. Typical network intrusion detection systems (NIDS), traditionally inspect packet headers and payloads to report malicious or abnormal traffic behavior. In TCP segments that are secured using the TLS protocol though, the only intelligible information is the (i) TLS handshake messages and (ii) TCP/IP headers (the data transmitted in packet payloads is encrypted).

news and articles

Our latest news and articles

blog image

Publication:

posted by The TLScope R&D team January 2025

Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS Analysis presented in the 33rd ACM Web Conference (WWW) 2024

blog image

Publication:

posted by The TLScope R&D team January 2024

Pump Up the JARM: Studying the Evolution of Botnets using Active TLS Fingerprinting presented in the 28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023)

Free

What does it include?

Subscription
Community access
250 Monthly queries

Free

This plan is destined for non-commercial use.

Individual

What does it include?

Subscription
Community access
250 Monthly queries

50 €

This plan is destined for commercial use.

SME

What does it include?

Subscription
Community access
3,000 Monthly queries

300 €

This plan is destined for commercial use.

Company

What does it include?

Subscription
Community access
10,000 Monthly queries

800 €

This plan is destined for commercial use.

Enterprise

What does it include?

Subscription
Community access
20,000 Monthly queries

1,500 €

This plan is destined for commercial use.

Fix your own plan

To develop a plan based on your needs, contact our team.