← Read other FAQ

What is a file hash?

A file hash is a distinctive alphanumeric string created by applying a cryptographic hash function to a file as a bit sequence. It is a fixed-size representation of the file's contents, and even a minor change in the file will result in a very different hash value. File hashing is commonly used in cybersecurity and data integrity verification.

Here are a few key aspects of file hashes:

1. Cryptographic Hash Functions

File hashes are calculated using cryptographic hash functions like MD5 (Message Digest Algorithm 5), SHA-1 (Secure Hash Algorithm 1), and others. These algorithms take the input file and produce a hash value of a specific length (e.g., 32 characters for MD5 or 40 characters for SHA-1).

2. Uniqueness

A good cryptographic hash function aims to generate distinctive hash values for different files. However, it is important to note that with the increasing availability of computing power, some older hash algorithms like MD5 and SHA-1 have become vulnerable to collision attacks, where two different files produce the same hash value.

3. Verification

File hashes are often used to verify the integrity and authenticity of files. By comparing the hash of a downloaded file with the original hash provided by the source, users can confirm that the file hasn't been altered or corrupted during transit. Hash verification is commonly used for software downloads, ensuring that the downloaded file matches the original version provided by the software publisher.

4. Malware Detection

File hashes are used in antivirus and security software to identify known malicious files. Security vendors maintain databases of hash values associated with known malware samples. When a file is scanned, its hash is compared against the database to determine if it matches any known malicious files.


← Read other FAQ

Threat Intelligence Data Feeds

Get actionable insights into the latest cyber threats, including malware, phishing, C2 (C&C), botnets, and other malicious activity.

Pricing plans for all team sizes

Threat Intelligence Data Feeds provide daily data in CSV and JSON formats. The data includes denylists, malicious domains, suspicious IPs, CIDRs, malware hashes, and more. Please note that our service is for registered companies only. Requests from private individuals or emails that don't match the company domain name are ignored.

Billed MonthlyBilled Annually🎁 2 months FREE
TIDFStartup

$499 / month

< 100 employees

All threat types

Daily updates

TIDFBusiness

$1,990 / month

101 - 500 employees

All threat types

Daily updates

Dedicated support

TIDFEnterprise

Ask for a quote

> 500 employees

All threat types

Daily updates

Dedicated support

Custom data formats

Real-time streaming

Data enrichment

Database integrations

Unlock the power of Snowflake and AWS: Seamlessly access, deploy, and utilize our data feed product through the Snowflake Marketplace and AWS Marketplace.

You’ll be in good company

FlexWebAfricaWeWorkGuardDogCyberCNS

Contact Us

Got a technical issue? Want to send feedback about data feeds? Need details about our plans? Let us know. Please note that our service is for registered companies only. Requests from private individuals or emails that don't match the company domain name are ignored.