Malware Check API is an advanced tool designed to identify, analyze and mitigate cyber threats in files and URLs. In today's digital environment, protection against malware, viruses, and other forms of malicious software is crucial to maintaining the integrity and security of computer systems. The Malware Check API provides a robust and efficient solution to perform these tasks automatically and accurately, facilitating proactive security for developers, enterprises and system administrators.The API allows uploading files to be scanned for malicious content. Supports a wide range of file formats, from documents to executable files. Uses a combination of detection techniques, including heuristic analysis and malware signatures, to identify potential threats. The ability to scan files for malware and vulnerabilities is essential to ensure that data and applications are not compromised.
The API can receive URLs to check if they are associated with malicious or phishing websites. This analysis includes reputation checking, identification of suspicious patterns and evaluation of page content. URL analysis helps protect against web-based attacks, preventing users from interacting with malicious sites that could compromise their systems or data.
In summary, the Malware Check API is an essential tool for identifying and managing cyber threats. Its ability to scan files and URLs, along with its detailed reporting and easy integration, makes it a valuable solution for protecting systems and data against malicious attacks.
This API receives files and URLs for analysis and returns information about detected threats, such as malware or phishing, along with mitigation recommendations.
Email Protection: Scan email attachments to detect and block malware before it reaches users' inboxes.
Download Platform Security: Scan files uploaded by users on download platforms to ensure they do not contain viruses or malware.
Browser URL Filtering: Integrate into browser extensions to scan URLs in real time and warn users about malicious or phishing websites.
Content Management System (CMS) Protection: Scan files and plugins uploaded to content management systems such as WordPress for vulnerabilities and threats.
Cloud File Monitoring: Perform scanning of files stored in cloud storage services to ensure they do not contain malware.
Beside the number of API calls per month allowed, there are no other limitations.
To use the endpoint send a request with a URL in the body. The API returns an analysis of detected threats.
Scan Malware - Endpoint Features
| Object | Description |
|---|---|
url |
[Required] |
{"success":true,"data":{"status":"Safe","message":"No malicious link metrics detected.","scan":[],"finishScan":true,"category":"","sub_status":[],"url":"https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html","name":"https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html","domain":"nytimes.com","type":"link","malware_type":"Link was recently modified","is_captcha":false,"is_anti_bot":false,"is_new_domain":false,"is_top_domain":true,"domain_age":"1994-01-18T00:00:00.000Z","original_url":"https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html","redirect_url":"","_id":"66db68ae6fff08d2168b6271"}}
curl --location --request GET 'https://zylalabs.com/api/5025/malware+check+api/6354/scan+malware?url=https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html' --header 'Authorization: Bearer YOUR_API_KEY'
| Header | Description |
|---|---|
Authorization
|
[Required] Should be Bearer access_key. See "Your API Access Key" above when you are subscribed. |
No long-term commitment. Upgrade, downgrade, or cancel anytime. Free Trial includes up to 50 requests.
Send a request with a URL to the endpoint. You will receive a report with details about detected threats and recommendations.
The Malware Check API detects malware and threats in files and URLs, providing detailed reports on security and possible risks encountered.
There are different plans suits everyone including a free trial for small amount of requests, but it’s rate is limit to prevent abuse of the service.
Zyla provides a wide range of integration methods for almost all programming languages. You can use these codes to integrate with your project as you need.
The API returns detailed information about the age and history of a domain, including years, months and days since its creation, as well as expiration and update dates.
The GET Scan Malware endpoint returns a JSON object containing analysis results for the submitted URL, including threat status, messages, scan details, and domain information.
Key fields include "status" (indicating safety), "message" (providing threat details), "scan" (array of detected threats), "domain_age" (age of the domain), and "malware_type" (type of threat detected).
The response data is structured as a JSON object with a "success" boolean, followed by a "data" object that contains detailed threat analysis, including status, messages, and domain information.
The endpoint provides information on the safety status of the URL, detected threats, domain age, and whether the link has been modified or is associated with phishing.
Users can customize requests by providing different URLs in the request body to analyze various links for potential threats and vulnerabilities.
The API utilizes a combination of heuristic analysis, malware signatures, and reputation databases to ensure comprehensive threat detection and analysis.
Users can interpret the "status" and "message" fields to assess the safety of a URL, while "malware_type" and "domain_age" provide insights into potential risks and the credibility of the domain.
Typical use cases include scanning URLs in email attachments, monitoring downloads on platforms, and integrating with browser extensions for real-time URL safety checks.
To obtain your API key, you first need to sign in to your account and subscribe to the API you want to use. Once subscribed, go to your Profile, open the Subscription section, and select the specific API. Your API key will be available there and can be used to authenticate your requests.
You can’t switch APIs during the free trial. If you subscribe to a different API, your trial will end and the new subscription will start as a paid plan.
If you don’t cancel before the 7th day, your free trial will end automatically and your subscription will switch to a paid plan under the same plan you originally subscribed to, meaning you will be charged and gain access to the API calls included in that plan.
The free trial ends when you reach 50 API requests or after 7 days, whichever comes first.
No, the free trial is available only once, so we recommend using it on the API that interests you the most. Most of our APIs offer a free trial, but some may not include this option.
Yes, we offer a 7-day free trial that allows you to make up to 50 API calls at no cost, so you can test our APIs without any commitment.
Zyla API Hub is like a big store for APIs, where you can find thousands of them all in one place. We also offer dedicated support and real-time monitoring of all APIs. Once you sign up, you can pick and choose which APIs you want to use. Just remember, each API needs its own subscription. But if you subscribe to multiple ones, you'll use the same key for all of them, making things easier for you.
Service Level:
100%
Response Time:
1,373ms
Service Level:
100%
Response Time:
7,847ms
Service Level:
100%
Response Time:
1,056ms
Service Level:
100%
Response Time:
152ms
Service Level:
100%
Response Time:
817ms
Service Level:
100%
Response Time:
1,429ms
Service Level:
100%
Response Time:
266ms
Service Level:
100%
Response Time:
1,438ms
Service Level:
100%
Response Time:
4,621ms
Service Level:
100%
Response Time:
241ms
Service Level:
100%
Response Time:
490ms
Service Level:
100%
Response Time:
1,156ms
Service Level:
100%
Response Time:
62ms
Service Level:
100%
Response Time:
54ms
Service Level:
100%
Response Time:
6,025ms
Service Level:
100%
Response Time:
2,704ms
Service Level:
100%
Response Time:
2,195ms
Service Level:
100%
Response Time:
1,118ms
Service Level:
100%
Response Time:
3,264ms
Service Level:
100%
Response Time:
8,796ms