AI agents are increasingly making HTTP requests that look identical to human browser traffic. User-Agent strings are trivially spoofed, and many agent frameworks now mimic browser headers. Traditional bot detection fails.
JA4 fingerprints are derived from the TLS ClientHello — the very first packet in any HTTPS connection. This captures the cipher suites, extensions, and ALPN protocols offered by the client's TLS library. Unlike User-Agent strings, these are extremely difficult to spoof without recompiling the TLS library itself.
61a7ad8aa9b6) with only 10 cipher suites — this is NOT vanilla Go net/http, which offers 13 ciphersbfa337485184) but differ in extension ordering, making JA4 sufficient to distinguish themCounterAgent uses a 5-layer detection approach:
Use the detection API or connect via MCP to test your own traffic.