9.3 Engine list
Request |
Value |
Method |
GET |
URL |
https://api.metadefender.com/v4/status/engines-cloud |
Summary
Returns a list of active anti-malware engines available in commercial and free mode.
Request
No headers or parameters required. This is an open endpoint.
Response
HTTP Status Codes
Please refer to Status Codes for more information.
Body
Example of a successful request:
{
"commercial"
: [
"AegisLab"
,
"Ahnlab"
,
"BitDefender"
,
"ByteHero"
,
"ClamAV"
,
"Comodo"
,
"CrowdStrike Falcon ML"
,
"Cyren"
,
"Emsisoft"
,
"Filseclab"
,
"Ikarus"
,
"K7"
,
"Kaspersky"
,
"McAfee"
,
"NANOAV"
,
"RocketCyber"
,
"TACHYON"
,
"Quick Heal"
,
"Vir.IT eXplorer"
,
"Vir.IT ML"
,
"Windows Defender"
,
"Xvirus Personal Guard"
,
"Zillya!"
],
"commercial_engines_count"
:
23
,
"free"
: [
"AegisLab"
,
"Ahnlab"
,
"Antiy"
,
"Avira"
,
"BitDefender"
,
"ByteHero"
,
"ClamAV"
,
"Comodo"
,
"CrowdStrike Falcon ML"
,
"Cyren"
,
"ESET"
,
"Emsisoft"
,
"F-prot"
,
"Filseclab"
,
"Fortinet"
,
"Hauri"
,
"Huorong"
,
"Ikarus"
,
"Jiangmin"
,
"K7"
,
"Kaspersky"
,
"McAfee"
,
"NANOAV"
,
"Preventon"
,
"Quick Heal"
,
"RocketCyber"
,
"Sophos"
,
"SUPERAntiSpyware"
,
"TACHYON"
,
"TrendMicro"
,
"TrendMicro House Call"
,
"Vir.IT eXplorer"
,
"Vir.IT ML"
,
"VirusBlokAda"
,
"Windows Defender"
,
"Xvirus Personal Guard"
,
"Zillya!"
],
"free_engines_count"
:
37
}
Sample code (Node.js)
var http = require(
"https"
);
var options = {
"method"
:
"GET"
,
"hostname"
: [
"api"
,
"metadefender"
,
"com"
],
"path"
: [
"v4"
,
"status"
,
"engines-cloud"
]
};
var req = http.request(options, function (res) {
var chunks = [];
res.on(
"data"
, function (chunk) {
chunks.push(chunk);
});
res.on(
"end"
, function () {
var body = Buffer.concat(chunks);
console.log(body.toString());
});
});
req.end();
Sample code (cURL)
curl -X GET \
https:
//api.metadefender.com/v4/status/engines-cloud