This document discusses TLS fingerprinting, which involves analyzing TLS parameters in ClientHello messages to attribute connections to libraries, processes, operating systems, and applications. It presents a new TLS fingerprint database that is automatically updated, supports GREASE values, and contains over 1,500 fingerprints derived from analyzing over 30 million real-world TLS sessions. The database schema and fingerprint extraction tools have been open-sourced to allow continuous expansion and analysis of TLS fingerprints across different platforms.