Secure Scan API is an advanced tool designed to identify, analyze and mitigate cyber threats in files and URLs. In today's digital environment, protection against malware, viruses, and other forms of malicious software is crucial to maintaining the integrity and security of computer systems. The Secure Scan API provides a robust and efficient solution to perform these tasks automatically and accurately, facilitating proactive security for developers, enterprises and system administrators.The API allows uploading files to be scanned for malicious content. Supports a wide range of file formats, from documents to executable files. Uses a combination of detection techniques, including heuristic analysis and malware signatures, to identify potential threats. The ability to scan files for malware and vulnerabilities is essential to ensure that data and applications are not compromised.
The API can receive URLs to check if they are associated with malicious or phishing websites. This analysis includes reputation checking, identification of suspicious patterns and evaluation of page content. URL analysis helps protect against web-based attacks, preventing users from interacting with malicious sites that could compromise their systems or data.
In summary, the Secure Scan API is an essential tool for identifying and managing cyber threats. Its ability to scan files and URLs, along with its detailed reporting and easy integration, makes it a valuable solution for protecting systems and data against malicious attacks.
This API receives files and URLs for analysis and returns information about detected threats, such as malware or phishing, along with mitigation recommendations.
Email Protection: Scan email attachments to detect and block malware before it reaches users' inboxes.
Download Platform Security: Scan files uploaded by users on download platforms to ensure they do not contain viruses or malware.
Browser URL Filtering: Integrate into browser extensions to scan URLs in real time and warn users about malicious or phishing websites.
Content Management System (CMS) Protection: Scan files and plugins uploaded to content management systems such as WordPress for vulnerabilities and threats.
Cloud File Monitoring: Perform scanning of files stored in cloud storage services to ensure they do not contain malware.
Beside the number of API calls per month allowed, there are no other limitations.
To use the endpoint send a request with a URL in the body. The API returns an analysis of detected threats.
Malware Check - Endpoint Features
| Object | Description |
|---|---|
url |
[Required] |
{"success":true,"data":{"status":"Safe","message":"No malicious link metrics detected.","scan":[],"finishScan":true,"category":"","sub_status":[],"url":"https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html","name":"https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html","domain":"nytimes.com","type":"link","malware_type":"Link was recently modified","is_captcha":false,"is_anti_bot":false,"is_new_domain":false,"is_top_domain":true,"domain_age":"1994-01-18T00:00:00.000Z","original_url":"https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html","redirect_url":"","_id":"66db68ae6fff08d2168b6271"}}
curl --location --request GET 'https://zylalabs.com/api/5027/secure+scan+api/6356/malware+check?url=https://www.nytimes.com/2024/09/05/well/eat/ultraprocessed-foods-types-unhealthy-study.html' --header 'Authorization: Bearer YOUR_API_KEY'
| Header | Description |
|---|---|
Authorization
|
[Required] Should be Bearer access_key. See "Your API Access Key" above when you are subscribed. |
No long-term commitment. Upgrade, downgrade, or cancel anytime. Free Trial includes up to 50 requests.
Send a request with a URL to the endpoint. You will receive a report with details about detected threats and recommendations.
The Secure Scan API detects malware and threats in files and URLs, providing detailed reports on security and possible risks encountered.
There are different plans suits everyone including a free trial for small amount of requests, but it’s rate is limit to prevent abuse of the service.
Zyla provides a wide range of integration methods for almost all programming languages. You can use these codes to integrate with your project as you need.
The API returns detailed information about the age and history of a domain, including years, months and days since its creation, as well as expiration and update dates.
The GET Malware Check endpoint returns an analysis of a URL, including its safety status, detected threats, and additional metadata such as domain age and redirect information.
Key fields include "status" (safety status), "message" (detection summary), "malware_type" (type of threat), "domain_age" (age of the domain), and "original_url" (the URL analyzed).
The response is structured as a JSON object with a "success" boolean, a "data" object containing detailed threat analysis, and various fields providing insights into the URL's safety and characteristics.
The endpoint provides information on malware detection, phishing risks, domain reputation, and suspicious patterns, helping users assess the safety of URLs.
Users can customize requests by specifying the URL they want to analyze in the request body, allowing for targeted scans of specific links.
The Secure Scan API utilizes a combination of heuristic analysis, malware signatures, and reputation databases to ensure comprehensive threat detection and analysis.
Data accuracy is maintained through continuous updates to detection algorithms, regular database refreshes, and validation against known threat intelligence sources.
Typical use cases include scanning URLs in email attachments, monitoring web links in applications, and integrating with security tools to prevent user exposure to malicious sites.
Please have a look at our Refund Policy: https://zylalabs.com/terms#refund
To obtain your API key, you first need to sign in to your account and subscribe to the API you want to use. Once subscribed, go to your Profile, open the Subscription section, and select the specific API. Your API key will be available there and can be used to authenticate your requests.
You can’t switch APIs during the free trial. If you subscribe to a different API, your trial will end and the new subscription will start as a paid plan.
If you don’t cancel before the 7th day, your free trial will end automatically and your subscription will switch to a paid plan under the same plan you originally subscribed to, meaning you will be charged and gain access to the API calls included in that plan.
The free trial ends when you reach 50 API requests or after 7 days, whichever comes first.
No, the free trial is available only once, so we recommend using it on the API that interests you the most. Most of our APIs offer a free trial, but some may not include this option.
Yes, we offer a 7-day free trial that allows you to make up to 50 API calls at no cost, so you can test our APIs without any commitment.
Zyla API Hub is like a big store for APIs, where you can find thousands of them all in one place. We also offer dedicated support and real-time monitoring of all APIs. Once you sign up, you can pick and choose which APIs you want to use. Just remember, each API needs its own subscription. But if you subscribe to multiple ones, you'll use the same key for all of them, making things easier for you.
Service Level:
100%
Response Time:
219ms
Service Level:
100%
Response Time:
1,373ms
Service Level:
100%
Response Time:
338ms
Service Level:
100%
Response Time:
61ms
Service Level:
100%
Response Time:
238ms
Service Level:
100%
Response Time:
4,621ms
Service Level:
100%
Response Time:
2,524ms
Service Level:
100%
Response Time:
307ms
Service Level:
100%
Response Time:
844ms
Service Level:
100%
Response Time:
1,429ms