Skip to content

RealPlayer video file (.ivr)

.ivr file signature | application/octet-stream

RealPlayer video file (V11 and later)

Safe

Magic Bytes

Offset 0
2E 52 45 43

Sources: Gary Kessler

Extension

.ivr

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .ivr files in Python

Python
def is_ivr(file_path: str) -> bool:
    """Check if file is a valid IVR by magic bytes."""
    signature = bytes([0x2E, 0x52, 0x45, 0x43])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .ivr files in Node.js

Node.js
function isIVR(buffer: Buffer): boolean {
  const signature = Buffer.from([0x2E, 0x52, 0x45, 0x43]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .ivr files in Go

Go
func IsIVR(data []byte) bool {
    signature := []byte{0x2E, 0x52, 0x45, 0x43}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/ivr
curl https://filesignature.org/api/v1/ivr

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .ivr file?

A .ivr file is a RealPlayer video file file. RealPlayer video file (V11 and later)

What are the magic bytes for .ivr files?

The magic bytes for RealPlayer video file files are 2E 52 45 43 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .ivr file?

To validate a .ivr file, read the first bytes of the file and compare them against the known magic bytes (2E 52 45 43) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .ivr files?

There is no officially registered MIME type for .ivr files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .ivr files?

RealPlayer video file (.ivr) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.