Lotus/IBM Approach 97 file (.apr)
.apr file signature | application/octet-stream
Magic Bytes
Offset: 0
CF FA ED FE
Lotus/IBM Approach 97 file
Sources: Gary Kessler
All Known Signatures
2 signature variants are documented for .apr files across multiple sources.
| Hex Signature | Offset | Sources |
|---|---|---|
| CF FA ED FE | 0 | Gary Kessler |
| D0 CF 11 E0 A1 B1 1A E1 | 0 | Gary Kessler |
Validation Code
How to validate .apr files in Python
def is_apr(file_path: str) -> bool:
"""Check if file is a valid APR by magic bytes."""
signature = bytes([0xCF, 0xFA, 0xED, 0xFE])
with open(file_path, "rb") as f:
return f.read(4) == signature
How to validate .apr files in Node.js
function isAPR(buffer: Buffer): boolean {
const signature = Buffer.from([0xCF, 0xFA, 0xED, 0xFE]);
return buffer.subarray(0, 4).equals(signature);
}
How to validate .apr files in Go
func IsAPR(data []byte) bool {
signature := []byte{0xCF, 0xFA, 0xED, 0xFE}
if len(data) < 4 {
return false
}
return bytes.Equal(data[:4], signature)
}
API Endpoint
/api/v1/apr
curl https://filesignature.org/api/v1/apr
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .apr file?
A .apr file is a Lotus/IBM Approach 97 file file. Lotus/IBM Approach 97 file
What are the magic bytes for .apr files?
The magic bytes for Lotus/IBM Approach 97 file files are CF FA ED FE at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .apr file?
To validate a .apr file, read the first bytes of the file and compare them against the known magic bytes (CF FA ED FE) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .apr files?
There is no officially registered MIME type for .apr files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .apr files?
Lotus/IBM Approach 97 file (.apr) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.