Skip to content

Jeppesen FliteLog file (.lbk)

.lbk file signature | application/octet-stream

Jeppesen FliteLog file

Safe

Magic Bytes

Offset 0
C8 00 79 00

Sources: Gary Kessler

Extension

.lbk

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .lbk files in Python

Python
def is_lbk(file_path: str) -> bool:
    """Check if file is a valid LBK by magic bytes."""
    signature = bytes([0xC8, 0x00, 0x79, 0x00])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .lbk files in Node.js

Node.js
function isLBK(buffer: Buffer): boolean {
  const signature = Buffer.from([0xC8, 0x00, 0x79, 0x00]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .lbk files in Go

Go
func IsLBK(data []byte) bool {
    signature := []byte{0xC8, 0x00, 0x79, 0x00}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/lbk
curl https://filesignature.org/api/v1/lbk

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .lbk file?

A .lbk file is a Jeppesen FliteLog file file. Jeppesen FliteLog file

What are the magic bytes for .lbk files?

The magic bytes for Jeppesen FliteLog file files are C8 00 79 00 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .lbk file?

To validate a .lbk file, read the first bytes of the file and compare them against the known magic bytes (C8 00 79 00) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .lbk files?

There is no officially registered MIME type for .lbk files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .lbk files?

Jeppesen FliteLog file (.lbk) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.