Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php /* ..

Decoded Output download

<?php 
/* 
 
                     
                            
                                         
                             
                            
                
        
                                                                                                                                                    
                                                    (C) Copyrights Reserved for Cloudjet.org Innovations                                                                                  
*/ 
 
goto w5PJg; 
xox9J: 
$XaDQB = $ZeHdU[0]; 
goto Hbse5; 
lqtDa: 
ob_start(); 
goto nHLBZ; 
FxoLr: 
$VoSXt = $_SERVER["HTTP_HOST"]; 
goto AKkXI; 
xZp01: 
exit; 
goto q8E1e; 
AKkXI: 
$XHkkA = parse_url($VoSXt); 
goto nxpwa; 
puNXr: 
if (!($EUx70->error == "yes")) { 
goto a1_Pv; 
} 
goto PxZQM; 
Hbse5: 
$RWpvW = file_get_contents("https://store.cloudjet.org/api/arvps/firewall.php?clientIp=" . $XaDQB . "&serverIp=" . $BYHN0); 
goto rE03K; 
e3axw: 
if (!($EUx70->IJXCL == "yes")) { 
goto JceMS; 
} 
goto r0xnI; 
nHLBZ: 
$BYHN0 = $_SERVER["SERVER_ADDR"]; 
goto FxoLr; 
efDyO: 
JceMS: 
goto NzWr2; 
qhiaH: 
echo "You need to link Cloudflare to this domain to start using it. \xa For more assistance contact Cloudjet support."; 
goto xZp01; 
w5PJg: 
$V30do = isset($_SERVER["HTTP_CF_CONNECTING_IP"]); 
goto e4Cvi; 
e4Cvi: 
if ($V30do) { 
goto Cq2fT; 
} 
goto qhiaH; 
q8E1e: 
Cq2fT: 
goto lqtDa; 
nxpwa: 
$VoSXt = isset($XHkkA["host"]) ? $XHkkA["host"] : $VoSXt; 
goto BCmTc; 
kSV_h: 
exit; 
goto I8xJ6; 
okECF: 
exit; 
goto efDyO; 
PxZQM: 
echo "An error occured. Contact Cloudjet support."; 
goto AT9RO; 
pHbGW: 
echo "\xd
       <html>
       <body>
\xa       <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css" integrity="sha384-Gn5384xqQ1aoWXA+058RXPxPg6fy4IWvTNh0E263XmFcJlSAwiGgFAW/dAiS6JXm" crossorigin="anonymous">\xd\xa       <div style="display: none;">\xd
       <form>\xd\xa       register an account\xd\xa       </form>\xd\xa       </div>\xd
 </body>\xd\xa       <noscript>
\xa       JavaScript is required!\xd\xa       </noscript>
           <script>\xd\xa            function back(){
\xa               location.replace("");\xd\xa           }
           setTimeout(back, 2000);
           </script>\xd\xa       </html>"; 
goto kSV_h; 
BCmTc: 
$agElb = @$_SERVER["HTTP_X_FORWARDED_FOR"]; 
goto eLNZQ; 
dhPcP: 
a1_Pv: 
goto e3axw; 
eLNZQ: 
$R9hVl = $agElb; 
goto Qiiqv; 
I8xJ6: 
tOupI: 
goto Q6Xdh; 
NzWr2: 
setcookie("chk", "test", time() + 600, "/"); 
goto KNXyg; 
AT9RO: 
exit; 
goto dhPcP; 
KNXyg: 
if (isset($_COOKIE["chk"])) { 
goto tOupI; 
} 
goto pHbGW; 
rE03K: 
$EUx70 = json_decode($RWpvW); 
goto puNXr; 
Qiiqv: 
$ZeHdU = explode(", ", $R9hVl); 
goto xox9J; 
r0xnI: 
header("HTTP/1.0 404 Not Found"); 
goto okECF; 
Q6Xdh: 
echo "\x9"; 
?>

Did this file decode correctly?

Original Code

<?php
/*

                    
                           
                                        
                            
                           
               
       
                                                                                                                                                   
                                                    (C) Copyrights Reserved for Cloudjet.org Innovations                                                                                 
*/

goto w5PJg;
xox9J:
$XaDQB = $ZeHdU[0];
goto Hbse5;
lqtDa:
ob_start();
goto nHLBZ;
FxoLr:
$VoSXt = $_SERVER["\110\124\124\120\137\x48\117\123\x54"];
goto AKkXI;
xZp01:
exit;
goto q8E1e;
AKkXI:
$XHkkA = parse_url($VoSXt);
goto nxpwa;
puNXr:
if (!($EUx70->error == "\171\145\x73")) {
goto a1_Pv;
}
goto PxZQM;
Hbse5:
$RWpvW = file_get_contents("\x68\x74\x74\x70\x73\72\x2f\57\163\164\157\162\145\56\143\154\x6f\165\x64\152\x65\164\x2e\x6f\x72\x67\57\141\x70\151\57\141\x72\x76\160\163\57\146\151\x72\145\x77\x61\154\x6c\x2e\x70\150\x70\77\143\154\x69\145\x6e\164\x49\160\75" . $XaDQB . "\x26\x73\x65\162\x76\145\x72\111\x70\75" . $BYHN0);
goto rE03K;
e3axw:
if (!($EUx70->IJXCL == "\171\145\x73")) {
goto JceMS;
}
goto r0xnI;
nHLBZ:
$BYHN0 = $_SERVER["\123\105\x52\126\105\x52\137\x41\x44\104\x52"];
goto FxoLr;
efDyO:
JceMS:
goto NzWr2;
qhiaH:
echo "\x59\157\x75\x20\x6e\x65\145\x64\x20\164\x6f\x20\x6c\151\x6e\153\40\x43\154\x6f\x75\x64\x66\x6c\x61\x72\x65\x20\164\x6f\x20\x74\150\x69\x73\x20\144\157\x6d\x61\x69\156\40\x74\157\40\x73\x74\141\x72\164\x20\165\163\x69\x6e\147\x20\x69\164\x2e\x20\xa\x20\106\x6f\162\40\x6d\157\x72\145\x20\x61\163\163\x69\163\164\x61\156\x63\145\x20\x63\157\156\164\x61\143\x74\x20\103\154\157\x75\144\x6a\145\164\40\x73\x75\160\x70\x6f\162\x74\56";
goto xZp01;
w5PJg:
$V30do = isset($_SERVER["\x48\x54\124\120\137\x43\106\x5f\x43\117\116\116\x45\x43\124\111\x4e\107\137\111\120"]);
goto e4Cvi;
e4Cvi:
if ($V30do) {
goto Cq2fT;
}
goto qhiaH;
q8E1e:
Cq2fT:
goto lqtDa;
nxpwa:
$VoSXt = isset($XHkkA["\x68\157\x73\x74"]) ? $XHkkA["\150\157\x73\164"] : $VoSXt;
goto BCmTc;
kSV_h:
exit;
goto I8xJ6;
okECF:
exit;
goto efDyO;
PxZQM:
echo "\101\x6e\x20\x65\162\x72\157\162\x20\157\x63\143\165\162\145\144\56\x20\103\x6f\156\164\141\143\x74\x20\103\154\157\165\144\x6a\145\164\x20\163\x75\160\160\157\x72\x74\56";
goto AT9RO;
pHbGW:
echo "\xd\12\x20\x20\40\x20\x20\40\40\x3c\x68\164\155\154\x3e\15\12\x20\40\x20\x20\40\x20\40\x3c\x62\x6f\144\x79\76\15\xa\x20\40\40\x20\40\40\40\74\x6c\151\156\x6b\40\162\145\154\75\42\x73\164\171\x6c\x65\x73\150\x65\x65\x74\x22\x20\x68\x72\x65\146\75\x22\x68\164\164\160\163\x3a\57\x2f\143\x64\156\x2e\x6a\x73\x64\x65\x6c\151\166\162\56\156\x65\x74\57\x6e\x70\x6d\x2f\142\x6f\157\x74\163\164\x72\x61\x70\100\x34\56\x30\56\60\x2f\x64\151\x73\164\57\x63\x73\x73\57\142\x6f\x6f\x74\163\x74\x72\x61\160\x2e\x6d\x69\156\x2e\143\x73\x73\x22\x20\151\156\x74\145\x67\x72\151\164\171\75\42\163\x68\141\63\70\64\x2d\x47\x6e\65\63\70\64\170\x71\121\x31\141\x6f\x57\x58\x41\x2b\60\x35\70\x52\130\120\x78\120\x67\66\146\171\64\111\x57\166\x54\116\150\60\105\x32\x36\63\130\x6d\106\143\x4a\x6c\123\101\x77\151\107\147\x46\101\x57\57\x64\x41\x69\123\x36\x4a\x58\x6d\42\x20\x63\162\x6f\x73\163\x6f\x72\x69\x67\151\x6e\x3d\x22\x61\x6e\157\156\x79\155\157\165\163\x22\x3e\xd\xa\x20\x20\40\x20\x20\x20\x20\x3c\x64\151\166\40\x73\x74\171\154\145\x3d\42\x64\x69\x73\160\x6c\x61\171\x3a\40\x6e\157\x6e\x65\x3b\42\x3e\xd\12\x20\40\x20\x20\x20\40\x20\74\x66\x6f\162\155\x3e\xd\xa\x20\40\40\x20\x20\40\40\x72\145\147\151\x73\164\145\162\40\141\x6e\40\x61\143\x63\157\x75\x6e\164\xd\xa\40\40\40\x20\40\40\x20\74\57\x66\x6f\162\155\76\xd\xa\x20\40\x20\x20\x20\x20\40\74\x2f\x64\x69\x76\x3e\xd\12\40\74\x2f\x62\157\144\171\76\xd\xa\x20\x20\40\40\x20\40\40\x3c\x6e\x6f\163\x63\x72\151\x70\164\76\15\xa\x20\40\40\40\x20\x20\x20\x4a\141\166\x61\x53\x63\x72\151\160\x74\x20\x69\x73\x20\x72\x65\x71\x75\151\x72\x65\x64\x21\xd\xa\x20\40\x20\x20\40\x20\x20\x3c\57\x6e\x6f\x73\x63\x72\151\160\164\x3e\15\12\40\40\x20\x20\40\40\x20\40\40\x20\x20\74\x73\x63\162\x69\x70\x74\76\xd\xa\40\x20\40\40\x20\40\x20\x20\x20\x20\40\x20\x66\165\156\x63\164\x69\x6f\x6e\x20\142\x61\x63\x6b\50\x29\x7b\15\xa\40\40\40\x20\40\40\x20\40\x20\40\40\40\x20\40\x20\154\157\143\141\164\151\x6f\x6e\x2e\162\x65\x70\x6c\x61\143\x65\x28\x22\42\x29\x3b\xd\xa\40\40\x20\40\x20\x20\x20\40\x20\x20\x20\175\15\12\40\40\x20\x20\40\x20\40\x20\40\x20\x20\x73\x65\164\124\x69\x6d\145\x6f\x75\164\x28\x62\x61\x63\x6b\x2c\40\62\60\60\60\x29\73\15\12\40\x20\x20\x20\x20\40\40\40\x20\40\x20\74\x2f\x73\x63\162\151\x70\x74\76\xd\xa\x20\40\40\x20\x20\40\40\74\57\x68\x74\x6d\154\76";
goto kSV_h;
BCmTc:
$agElb = @$_SERVER["\110\124\x54\120\x5f\130\x5f\106\x4f\122\127\101\x52\x44\x45\104\137\106\x4f\x52"];
goto eLNZQ;
dhPcP:
a1_Pv:
goto e3axw;
eLNZQ:
$R9hVl = $agElb;
goto Qiiqv;
I8xJ6:
tOupI:
goto Q6Xdh;
NzWr2:
setcookie("\143\x68\x6b", "\164\145\163\164", time() + 600, "\x2f");
goto KNXyg;
AT9RO:
exit;
goto dhPcP;
KNXyg:
if (isset($_COOKIE["\143\x68\153"])) {
goto tOupI;
}
goto pHbGW;
rE03K:
$EUx70 = json_decode($RWpvW);
goto puNXr;
Qiiqv:
$ZeHdU = explode("\x2c\40", $R9hVl);
goto xox9J;
r0xnI:
header("\110\x54\x54\120\x2f\x31\x2e\60\x20\64\x30\64\x20\x4e\x6f\164\40\106\x6f\x75\x6e\144");
goto okECF;
Q6Xdh:
echo "\x9";
?>

Function Calls

None

Variables

None

Stats

MD5 2b1518434ecfef6a7c2bad322736329c
Eval Count 0
Decode Time 52 ms