File hash intelligence
Database of known malware file hashes. Check files against our database to identify malware families and threats.
Everything you need to protect your infrastructure and users
MD5, SHA1, and SHA256 for each sample.
Malware families and variants identified.
Behavioral analysis from sandbox execution.
New samples added every day.
Real-time hash checking via API.
Download hash lists for offline use.
How security teams use this tool
Block files matching known malware hashes.
Check attachments against hash database.
Identify malware during investigations.
Search for malware presence in your environment.
Join thousands of security teams using isMalicious to protect their infrastructure.