AOL address book index file (.abi)
.abi file signature | application/octet-stream
AOL address book index file
Magic Bytes
Offset 0
41 4F 4C 49 4E 44 45 58
Sources: Gary Kessler
Extension
.abi
MIME Type
application/octet-stream
Byte Offset
0
Risk Level
Safe
Validation Code
How to validate .abi files in Python
def is_abi(file_path: str) -> bool:
"""Check if file is a valid ABI by magic bytes."""
signature = bytes([0x41, 0x4F, 0x4C, 0x49, 0x4E, 0x44, 0x45, 0x58])
with open(file_path, "rb") as f:
return f.read(8) == signature
How to validate .abi files in Node.js
function isABI(buffer: Buffer): boolean {
const signature = Buffer.from([0x41, 0x4F, 0x4C, 0x49, 0x4E, 0x44, 0x45, 0x58]);
return buffer.subarray(0, 8).equals(signature);
}
How to validate .abi files in Go
func IsABI(data []byte) bool {
signature := []byte{0x41, 0x4F, 0x4C, 0x49, 0x4E, 0x44, 0x45, 0x58}
if len(data) < 8 {
return false
}
return bytes.Equal(data[:8], signature)
}
API Endpoint
/api/v1/abi
curl https://filesignature.org/api/v1/abi
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .abi file?
A .abi file is a AOL address book index file file. AOL address book index file
What are the magic bytes for .abi files?
The magic bytes for AOL address book index file files are 41 4F 4C 49 4E 44 45 58 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .abi file?
To validate a .abi file, read the first bytes of the file and compare them against the known magic bytes (41 4F 4C 49 4E 44 45 58) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .abi files?
There is no officially registered MIME type for .abi files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .abi files?
AOL address book index file (.abi) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.