Malware Protection Tools & Resources

We recommend using our Submit File upload form to perform a deep scan of the contents to ensure malware is not hiding in files you think are suspicious. However, we also provide a variety of other tools and utilities (links below) to help you validate suspicious files, emails and domains that you encounter on the internet. These are more advanced resources but are provided with a simple interface.

Review Recent Analysis Reports & Malware Detection Events Search Malware Database for a File Hash (MD5, SHA1, SHA256) Master Decoder: Decode Multiple Formats, Reconstruct charFromCode or PDF Anotation Blocks, Detect ShellCode Hex Process an E-Mail Header to Extract the Origination IP Address & Geographic Location IP/Domain WhoIs: Lookup a Domain Name or Registered Owner of an IP Address

Follow us on Twitter and monitor our blog to become more aware of emerging malware threats and evolving techniques to detect and stop them from spreading. We are actively developing new tools and detection algorithms to help you guard against these exploitation threats.