I know the hashes exist, but they're not used on traffic in transit except in very unusual circumstances. They're used by web hosting companies/dedicated server providers/VPS hosting companies etc to examine the disk/storage device contents of a suspicious server against a known list of the hashes of previously-seized CP.