9.2 Engine definitions
Request |
Value |
Method |
GET |
URL |
https://api.metadefender.com/v4/status/enginedef |
Summary
Returns a list of active anti-malware engines available, as well as the day and time of the engine definition. Engine definitions are the data that the engines use to detect malicious files. It is the core component of static file analysis. MetaDefender Cloud checks for engine definitions multiple times a day so that the engines are always up to date and detect the latest malware on the market.
Request
No headers or parameters required. This is an open endpoint.
Response
HTTP Status Codes
Please refer to Status Codes for more information.
Body
Example of a successful request:
{
"Aegislab"
:
"2019-02-26T01:00:00.000Z"
,
"Agnitum"
:
"2019-02-25T10:54:00.000Z"
,
"Ahnlab"
:
"2019-02-27T00:00:00.000Z"
,
"Antiy"
:
"2019-02-27T07:47:00.000Z"
,
"Avira"
:
"2019-02-25T00:00:00.000Z"
,
"Baidu"
:
"2019-01-08T11:35:00.000Z"
,
"Bitdefender"
:
"2019-02-27T04:54:00.000Z"
,
"ByteHero"
:
"2019-02-26T00:00:00.000Z"
,
"ClamAV"
:
"2019-02-26T10:34:00.000Z"
,
"Cyren"
:
"2019-02-27T07:43:00.000Z"
,
"Emsisoft"
:
"2019-02-26T13:51:00.000Z"
,
"ESET"
:
"2019-02-27T00:00:00.000Z"
,
"Filseclab"
:
"2019-02-25T22:48:00.000Z"
,
"Fortinet"
:
"2019-02-26T00:00:00.000Z"
,
"F-prot"
:
"2019-02-27T06:10:00.000Z"
,
"F-Secure"
:
"2019-02-05T01:33:00.000Z"
,
"Hauri"
:
"2019-02-27T00:00:00.000Z"
,
"Huorong"
:
"2019-02-25T09:11:00.000Z"
,
"Ikarus"
:
"2019-02-26T19:13:05.000Z"
,
"Jiangmin"
:
"2019-02-25T23:22:00.000Z"
,
"K7"
:
"2019-02-27T00:10:00.000Z"
,
"McAfee"
:
"2019-02-26T00:00:00.000Z"
,
"Nano"
:
"2019-02-27T02:05:00.000Z"
,
"TACHYON"
:
"2019-02-27T05:00:00.000Z"
,
"Preventon"
:
"2019-02-26T23:05:00.000Z"
,
"Quickheal"
:
"2019-02-26T08:14:00.000Z"
,
"Sophos"
:
"2019-02-26T00:56:00.000Z"
,
"SUPERAntiSpyware"
:
"2013-05-22T22:16:00.000Z"
,
"ThreatTrack"
:
"2019-02-25T08:30:00.000Z"
,
"Total Defense"
:
"2019-02-26T00:00:00.000Z"
,
"Trend Micro"
:
"2019-02-25T20:54:00.000Z"
,
"Trend Micro House Call"
:
"2019-02-25T21:06:00.000Z"
,
"Vir.IT eXplorer"
:
"2019-02-26T14:46:00.000Z"
,
"Vir.IT ML"
:
"2019-02-25T14:46:00.000Z"
,
"VirusBlokAda"
:
"2019-02-26T15:24:00.000Z"
,
"Xvirus Personal Guard"
:
"2019-02-26T09:57:00.000Z"
,
"Zillya"
:
"2019-02-26T17:27:00.000Z"
}
Sample code (Node.js)
var http = require(
"https"
);
var options = {
"method"
:
"GET"
,
"hostname"
: [
"api"
,
"metadefender"
,
"com"
],
"path"
: [
"v4"
,
"status"
,
"enginedef"
]
};
var req = http.request(options, function (res) {
var chunks = [];
res.on(
"data"
, function (chunk) {
chunks.push(chunk);
});
res.on(
"end"
, function () {
var body = Buffer.concat(chunks);
console.log(body.toString());
});
});
req.end();
Sample code (cURL)
curl -X GET \
https:
//api.metadefender.com/v4/status/enginedef