In this example, the host with the domain name host.example.com uses a Ed25519 key with the SHA-256 fingerprint 123456789abcdef67890123456789abcdef67890. This output would be produced by a ssh-keygen -r host.example.com. command on the target server by reading the existing default SSH host key (Ed25519).8
With the OpenSSH suite, ssh-keyscan -D $HOSTNAME9 or ssh-keygen -r $HOSTNAME10 (for older OpenSSH versions) will print the current host's fingerprints in SSHFP format.
Griffin, Wesley; Schlyter, Jakob (January 2006). "RFC 4255 — Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints". Retrieved 2017-12-28. https://tools.ietf.org/html/rfc4255 ↩
Surý, Ondřej (April 2012). "RFC 6594 — Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records". Retrieved 2017-12-28. https://tools.ietf.org/html/rfc6594 ↩
Moonesamy, S. (March 2015). "RFC 7479 — Using Ed25519 in SSHFP Resource Records". Retrieved 2017-12-28. https://tools.ietf.org/html/rfc7479 ↩
Harris, Ben; Velvindron, Loganaden (February 2020). "RFC 8709 — Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol". Retrieved 2021-10-16. https://tools.ietf.org/html/rfc8709 ↩
"ssh-keygen(1) - Linux manual page". www.man7.org. Retrieved 2023-03-25. https://www.man7.org/linux/man-pages/man1/ssh-keygen.1.html ↩
"ssh-keyscan(1) - OpenBSD manual pages". man.openbsd.org. Retrieved 2025-05-30. https://man.openbsd.org/ssh-keyscan.1#D ↩
"ssh-keygen(1) - OpenBSD manual pages". man.openbsd.org. Retrieved 2025-05-30. https://man.openbsd.org/ssh-keygen#r ↩