Pivot on
JA4+ Fingerprints
Pivot on
JA4+ Fingerprints
Pivot on
JA4+ Fingerprints
Through our partnership with Foxio, JA4+ fingerprints are built into Hunt and exposed as pivots to help surface meaningful patterns in large datasets.
Through our partnership with Foxio, JA4+ fingerprints are built into Hunt and exposed as pivots to help surface meaningful patterns in large datasets.
Through our partnership with Foxio, JA4+ fingerprints are built into Hunt and exposed as pivots to help surface meaningful patterns in large datasets.



Available as Pivots Across Hunt
Available as Pivots Across Hunt
Available as Pivots Across Hunt
Hunt.io proprietary technologies deliver actionable intelligence with greater speed and accuracy than any other platform.

History
Track how JA4+ fingerprints appear, disappear, and shift over time across exposed services.


History
Track how JA4+ fingerprints appear, disappear, and shift over time across exposed services.


History
Track how JA4+ fingerprints appear, disappear, and shift over time across exposed services.


Search
Pivot from a single fingerprint to related infrastructure, services, and activity fast.


Search
Pivot from a single fingerprint to related infrastructure, services, and activity fast.


Search
Pivot from a single fingerprint to related infrastructure, services, and activity fast.


Your JA4+ Fingerprints
These fingerprints are unique to your session on this webpage


Your JA4+ Fingerprints
These fingerprints are unique to your session on this webpage


Your JA4+ Fingerprints
These fingerprints are unique to your session on this webpage

faq
faq
faq
Frequently
asked questions
Frequently
asked questions
Frequently
asked questions
What is JA4+ used for in Hunt?
JA4+ fingerprints are built into Hunt and exposed as pivots to help analyze and explore data across the platform.
What is JA4+ used for in Hunt?
JA4+ fingerprints are built into Hunt and exposed as pivots to help analyze and explore data across the platform.
What is JA4+ used for in Hunt?
JA4+ fingerprints are built into Hunt and exposed as pivots to help analyze and explore data across the platform.
How are JA4+ fingerprints added to Hunt?
JA4+ fingerprints are baked into Hunt through a partnership with Foxio, with ongoing collaboration to support modern pivots and fingerprints.
How are JA4+ fingerprints added to Hunt?
JA4+ fingerprints are baked into Hunt through a partnership with Foxio, with ongoing collaboration to support modern pivots and fingerprints.
How are JA4+ fingerprints added to Hunt?
JA4+ fingerprints are baked into Hunt through a partnership with Foxio, with ongoing collaboration to support modern pivots and fingerprints.
Where can JA4+ fingerprints be used?
JA4+ fingerprints are available across the Hunt platform wherever pivots and fingerprints are supported, such as our Historical timeline, our Search function, or by quering our datasets from HuntSQL.
Where can JA4+ fingerprints be used?
JA4+ fingerprints are available across the Hunt platform wherever pivots and fingerprints are supported, such as our Historical timeline, our Search function, or by quering our datasets from HuntSQL.
Where can JA4+ fingerprints be used?
JA4+ fingerprints are available across the Hunt platform wherever pivots and fingerprints are supported, such as our Historical timeline, our Search function, or by quering our datasets from HuntSQL.
What malicious activity can JA4+ fingerprints help uncover?
JA4+ fingerprints help uncover malicious infrastructure and activity such as command-and-control servers, malware networks, and related attacker assets by linking encrypted traffic patterns to known threat actor behaviour.
What malicious activity can JA4+ fingerprints help uncover?
JA4+ fingerprints help uncover malicious infrastructure and activity such as command-and-control servers, malware networks, and related attacker assets by linking encrypted traffic patterns to known threat actor behaviour.
What malicious activity can JA4+ fingerprints help uncover?
JA4+ fingerprints help uncover malicious infrastructure and activity such as command-and-control servers, malware networks, and related attacker assets by linking encrypted traffic patterns to known threat actor behaviour.
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

©2026 Hunt Intelligence, Inc.
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

©2025 Hunt Intelligence, Inc.
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

©2026 Hunt Intelligence, Inc.