Our AI technology has developed highly reliable and robust PHP malware detection patterns by analyzing an extensive dataset comprising over 500,000 files of known malware code.

Overview

We are proud to offer our malware detection service, which provides reliable and robust detection patterns extracted by our advanced AI technology.

These patterns have been derived from an extensive collection of over 500,000 files of PHP malware code, meticulously gathered from more than 30,000 malware-infected sites.

To ensure the highest level of accuracy and effectiveness, our detection patterns are regularly updated on a daily basis. We draw upon one of the world's largest databases of malware files, constantly incorporating newly discovered malware samples into our patterns. This proactive approach allows us to swiftly detect and mitigate the latest malware strains, providing you with up-to-date protection against evolving threats.

By integrating our API into your systems or applications, you can harness the power of our AI-generated detection patterns seamlessly. This enables you to perform real-time scanning and analysis, quickly identifying and neutralizing potential PHP malware infections.
Usage scenarios

What kind of services can the API be used for?

Our versatile API empowers you to achieve highly accurate malware detection across PHP and JavaScript code, effortlessly identifying a diverse range of malicious patterns. Its exceptional proficiency lies in effectively uncovering PHP-based malware variants, including backdoors, web shells, viruses, redirect codes, WordPress-related malvertising, and botnets.

[Built into malware detection software]

Easily integrate our API into your server-side malware detection software and provide your clients with advanced protection.

[Real-time scanning of data uploaded by users]

Enable user-contributed sites to efficiently scan uploaded data for potential dangerous code, ensuring a safe and secure environment for all users.It will also prevent your service from being used as an intermediary source of malware, not only for users of your service, but for all internet users.

[Warns users of malware infection of their site]

Hosting services with multiple user sites, or multiple sites with maintenance contracts, can be inspected to provide early warning to users of site tampering or malware infection.

[Code-sharing services]

Empower security of code sharing services such as GIT, Subversion, and others to seamlessly identify the presence of malware within user-uploaded code, ensuring a secure and trustworthy environment for code collaboration and sharing.

[Text paste service (uploader)]

Empower text pasting services and file uploaders to efficiently detect and flag instances where users attempt to post malware code, ensuring a secure and trustworthy platform for content sharing and preventing the dissemination of harmful code.

Three types of Malware detection API are provided

Obtaining reliable malware detection patterns.

1227 detection patterns being distributed now.

It is the most reliable and balanced malware detection pattern acquisition API.
The API provides versatile malware detection patterns that can be applied to a wide variety of applications.
It provides a small number of highly selective malware detection patterns that can detect malware most efficiently with high detection accuracy. Files containing these patterns are very likely to be malware.
The adoption of this API pattern is recommended for the efficient analysis of huge amounts of data and its routine data analysis.

Newly added detection patterns.

854 detection patterns being distributed now.

This API prioritizes freshness of malware detection patterns.
While it may sacrifice some reliability, it excels at identifying files potentially harboring the latest prevalent malware.
If your objective is to detect the most recent malware, this API is the ideal choice. It inludes newly added malware patterns within a few months, although the possibility of false positives exists.

Maximum number of detection patterns

4672 detection patterns being distributed now.

The malware detection patterns available via this API provide the highest volume of malware detection patterns, including those extracted from malware-infected files from the last five years and the latest detection patterns.
If your objective is a thorough malware scan, this API is the perfect choice. However, be aware that may result in false positives.
Due to the extensive number of malware patterns it encompasses, this API can be resource-intensive and time-consuming when inspecting large amount of files. It is particularly recommended for deep inspection of folders suspected of malware infection, single-file analysis, or when specifically aiming to prevent malware infection within small groups of files.

Compromised accessing IP

2982 IP being distributed now.

In addition, we have detected unauthorised access and hacking attacks from over 30,000 sites, and we also provide an API of the ip addresses of dangerous hackers who are currently active.
With this API, you can obtain the IPs of unauthorised access sources that have recently been active in hacking activities, which are updated on a daily basis.

Please note: This demo API acquisition is incomplete data with some data replaced by ****.
Please note: This demo API acquisition is incomplete data with some data replaced by ****.
Please note: This demo API acquisition is incomplete data with some data replaced by ****.
Please note: This demo API acquisition is incomplete data with some data replaced by ****.

Structure of JSON data delivered by the API.

The malware patterns and attacker IP addresses that can be retrieved by the API are JSON data in encoded arrays.
NOTICE:The malware detection pattern is only updated once a day. API calls made more than once a day will retrieve the same data. To avoid server load, API calls are limited to once every 30 seconds. For this reason, please avoid excessive data retrieval by recording the data retrieved by the API in a database or by other means.

Malware pattern API

The JSON data that can be obtained via the API is divided into a metadata part, which indicates the version and name of the data, and a data part containing the actual detection pattern.

NOTE:When using this API, we recommend that you remove whitespace from the code you want to scan and use without_whitespace_pattern for detection.

API of the compromised accessing IP

The JSON data that can be retrieved via the API is divided into a metadata part, which indicates the version and name of the data, and a data part, which contains the actual IPs.

NOTE:Data other than IP address and IP version may be undefined.

How are malware detection patterns generated?

1. We collect data on malware code from over 10,000 malware-infected sites per year, mostly WordPress, and PHP and JAVASCRIPT deobfuscation services.(We currently have over 500,000 files of malware code detected from over 30,000 sites.)
2. AI extracts robust, highly reliable malware detection patterns.
3. We actually inspect and detect malware files using the detection patterns described in 2. and provide feedback to improve their accuracy and reliability.

Pricing

Attacker IP acquisition API

API list of IPs with repeated hacking attacks, generated from data on 30,000 sites.
$ 200   Monthly
  • Data updated once every 24 hours.
  • IP lists of unauthorised accessors collected from 30,000 sites via API.
  • Location data and country data of the attacker’s IP includes.
  • Data on attack frequency of attacker IPs includes.

API for malware detection

Three types of malware detection pattern lists are available via API.
$ 900   Monthly
  • Data updated once every 24 hours.
  • Detection patterns generated from 30,000 infected sites and over 500,000 files of malware.
  • Highly accurate and reliable malware detection pattern acquisition API.
  • API for acquiring the latest malware detection patterns.
  • API for acquiring more malware detection patterns, including older patterns.
  • Malware probability data per pattern.
  • Detection frequency data per pattern.

Malware detection + attacker IP API

A $100 deal that gives you access to both malware detection patterns and attacker IP acquisition APIs.
$ 1000   Monthly
  • Data updated once every 24 hours.
  • Detection patterns generated from 30,000 infected sites and over 500,000 files of malware.
  • Highly accurate and reliable malware detection pattern acquisition API.
  • API for acquiring the latest malware detection patterns.
  • API for acquiring more malware detection patterns, including older patterns.
  • Malware probability data per pattern.
  • Detection frequency data per pattern.
  • IP lists of unauthorised accessors collected from 30,000 sites via API.
  • Location data and country data of the attacker’s IP incudes.
  • Data on attack frequency of attacker IPs includes.
ABOUT US
We, BLUEGARAGE Inc. are at the forefront of web security in Japan.

BLUEGARAGE Corporation, established in 2015, has been dedicated to addressing website security concerns since its inception. Over the years, we have successfully restored numerous websites infected with malware, amassing valuable knowledge and data in the process.

Our release of WP-Doctor Malware scanner has the largest market share of any WordPress malware detection plugin released by a Japanese company. Our research indicates that it boasts the highest accuracy in malware detection globally, offering exceptional performance. Furthermore, we have meticulously collected and analyzed malware and security data from tens of thousands of websites that have installed this plugin, culminating in the release of our PHP malware detection API.

Although we cannot reveal the names due to confidentiality agreements, our knowledge has been highly effective and trusted by some of Japan’s largest listed companies, government agencies and organisations, and major hosting companies through consulting, software (plug-ins) provision and maintenance contracts.

Our mission is to increase the overall safety of websites by providing high security and the means to combat malware and unauthorised access, not only for large corporations and governments, but also for everyone (even for private websites and private tuition sites).

Contact

Contact US

    Captcha captcha