H
HiddenIO

Trojan Protocol

Trojan is a proxy protocol specifically designed to mimic HTTPS traffic, making it one of the hardest protocols to detect and block. It uses standard TLS encryption and can fall back to a real web server when probed.

1787 configs availableUpdated every 15 min

Trojan Subscription Link

https://hiddenio.com/api/v1/subscriptions/protocol/trojan

# Trojan Protocol — Complete Guide

What is Trojan?

Trojan is a proxy protocol that encrypts traffic using TLS, making it appear identical to normal HTTPS web browsing. This design makes it extremely difficult for network monitoring systems to distinguish Trojan traffic from legitimate web traffic.

Trojan Features

🛡️ HTTPS Mimicry

  • Standard TLS: Uses the same encryption as HTTPS websites
  • Real certificates: Works with Let's Encrypt certificates
  • Fallback server: Probers see a real website
  • No fingerprint: Indistinguishable from normal HTTPS
  • 🔄 Compatibility

  • Supported by most V2Ray clients
  • Works with v2rayNG, V2RayN, Shadowrocket
  • CDN-compatible with proper setup
  • Trojan Configuration

    Standard Trojan URL format:

    trojan://password@server:443?security=tls&type=tcp&sni=domain.com

    Trojan vs VLESS

    |---------|--------|-------|

    Best Practices

    1. Use port 443: Standard HTTPS port

    2. Valid certificate: Use Let's Encrypt

    3. Configure fallback: Set up nginx as fallback

    4. Enable CDN: Use Cloudflare for extra protection

    Browse by Country

    Find Trojan servers near you

    Custom Subscription

    Filter and build your own