RealAudio streaming media file (.ra)
.ra file signature | audio/x-pn-realaudio
RealAudio streaming media file
Magic Bytes
Offset 0
2E 72 61 FD
Sources: Apache Tika
All Known Signatures
3 signature variants are documented for .ra files across multiple sources.
| Hex Signature | Offset | Sources |
|---|---|---|
| 2E 72 61 FD | 0 | Apache Tika |
| 2E 52 4D 46 00 00 00 12 00 | 0 | Gary Kessler |
| 2E 72 61 FD 00 | 0 | Gary Kessler |
Extension
.ra
MIME Type
audio/x-pn-realaudio
Byte Offset
0
Risk Level
Safe
Validation Code
How to validate .ra files in Python
def is_ra(file_path: str) -> bool:
"""Check if file is a valid RA by magic bytes."""
signature = bytes([0x2E, 0x72, 0x61, 0xFD])
with open(file_path, "rb") as f:
return f.read(4) == signature
How to validate .ra files in Node.js
function isRA(buffer: Buffer): boolean {
const signature = Buffer.from([0x2E, 0x72, 0x61, 0xFD]);
return buffer.subarray(0, 4).equals(signature);
}
How to validate .ra files in Go
func IsRA(data []byte) bool {
signature := []byte{0x2E, 0x72, 0x61, 0xFD}
if len(data) < 4 {
return false
}
return bytes.Equal(data[:4], signature)
}
API Endpoint
/api/v1/ra
curl https://filesignature.org/api/v1/ra
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .ra file?
A .ra file is a RealAudio streaming media file file. RealAudio streaming media file
What are the magic bytes for .ra files?
The magic bytes for RealAudio streaming media file files are 2E 72 61 FD at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .ra file?
To validate a .ra file, read the first bytes of the file and compare them against the known magic bytes (2E 72 61 FD) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .ra files?
The primary MIME type for .ra files is audio/x-pn-realaudio.
Is it safe to open .ra files?
RealAudio streaming media file (.ra) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.