Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<? eval(gzinflate(base64_decode(' pVhtT9tIEP5eqf9hzkJ1cpcXCndt1ZK0UfCVqEBo Elq1CFmLvUn2a..

Decoded Output download

?>   <?php
                    session_start();

                    // Database Configuration
                    $dbHost = 'localhost';
                    $dbUsername = 'u608374782_AledanyKIWI';
                    $dbPassword = 'Aa123123123@@';
                    $dbName = 'u608374782_AledanyKIWI';

                    // Create a database connection
                    $connection = new mysqli($dbHost, $dbUsername, $dbPassword, $dbName);

                    // Check if the connection is successful
                    if ($connection->connect_error) {
                        die("Connection failed: " . $connection->connect_error);
                    }

                    
                    
                    // Verify reCAPTCHA
$recaptchaSecretKey = '6LeEelQoAAAAAMley_-At5-AOed2_G12YcZuThZG';
$recaptchaResponse = $_POST['g-recaptcha-response'];

$recaptchaUrl = "https://www.google.com/recaptcha/api/siteverify";
$recaptchaData = array(
    'secret' => $recaptchaSecretKey,
    'response' => $recaptchaResponse,
);

$recaptchaOptions = array(
    'http' => array(
        'method' => 'POST',
        'content' => http_build_query($recaptchaData),
    ),
);

$recaptchaContext = stream_context_create($recaptchaOptions);
$recaptchaResult = file_get_contents($recaptchaUrl, false, $recaptchaContext);
$recaptchaData = json_decode($recaptchaResult, true);

if (!$recaptchaData['success']) {
    // CAPTCHA verification failed
    echo "CAPTCHA verification failed. Please try again.";
} else {
    // CAPTCHA verification successful, proceed with signup logic
    // ... your existing signup logic ...
}



if ($_SERVER["REQUEST_METHOD"] == "POST") {
    $email = $_POST['email'];
    $password = $_POST['password'];
    
    // Get the user's IP address
    $user_ip = $_SERVER['REMOTE_ADDR'];
    
    // Insert the login attempt with email, IP address, and timestamp
    $connection->query("INSERT INTO login_attempts (email, ip_address) VALUES ('$email', '$user_ip')");

    // Validate the inputs (you can add more validation rules as needed)
    if (empty($email) || empty($password)) {
        echo '<div class="alert alert-danger">Please enter email and password</div>';
    } else {
        // Check if the user with the provided email exists in the database
        $sql = "SELECT * FROM users WHERE email = '$email'";
        $result = $connection->query($sql);

        if ($result->num_rows > 0) {
            $row = $result->fetch_assoc();
            
            // Check if the user is banned due to too many failed attempts
            if ($row['login_attempts'] >= 3 && time() - strtotime($row['last_failed_attempt']) < 3600) {
                echo '<div class="alert alert-danger">You are temporarily banned due to too many failed attempts. Please try again later.</div>';
            } else {
                // If login is successful, update last_login_ip for the user
    if (password_verify($password, $row['password'])) {
        $user_id = $row['id'];
        $connection->query("UPDATE users SET last_login_ip = '$user_ip' WHERE id = $user_id");
                    
                    // Set session variables and redirect based on user_role
                    $_SESSION['user_id'] = $row['id'];
                    $_SESSION['user_role'] = $row['user_role'];
                    $_SESSION['username'] = $row['username'];
                    
                    if ($row['user_role'] === 'member') {
                        header("Location: ResellerEN/my_keys.php");
                    } elseif ($row['user_role'] === 'admin') {
                        header("Location: OwnerEN/owner.php");
                    }
                    exit;
                } else {
                    // Incorrect password
                    // Increase failed attempt count and update last_failed_attempt timestamp
                    $connection->query("UPDATE users SET login_attempts = login_attempts + 1, last_failed_attempt = NOW() WHERE id = " . $row['id']);
                    
                    // Display appropriate error message
                    if ($row['login_attempts'] >= 2) {
                        echo '<div class="alert alert-danger">Incorrect password. One more attempt and you will be banned.</div>';
                    } else {
                        echo '<div class="alert alert-danger">Incorrect password</div>';
                    }
                }
            }
        } else {
            // User not found
            echo '<div class="alert alert-danger">User not found</div>';
        }
    }
}

                    // Close the database connection
                    $connection->close();
                    ?><?

Did this file decode correctly?

Original Code

<? eval(gzinflate(base64_decode('
pVhtT9tIEP5eqf9hzkJ1cpcXCndt1ZK0UfCVqEBo
Elq1CFmLvUn2anvd3TVpdO1/v9m1ndjBCaCLEODd
eduZ55lZ520XAI7exvP46ROo+EgqJeORKxURqlZ/
8/RJtVy7DcdEkRsiKfR5NGWzRBCFmtXie/7NCZcK
OmAH3CPBHB/sN1tlLyUVEQmplk9e7L86fPnny1cH
bi+gPomWHwafBzuUL4iUCy58rdwjzw8O059373bo
nN/rbGsa+oISRYGAn+fD41FEvR3JWAugz4guIFzK
7wGrZVlqFFPQKB6pkce6szD9OfW+AZuCmheDASZB
Jp6HFZ4mQbU2KtUK4TW72f8uFYKLOvxbraY/PqM1
q7/2NiUMM/gaLGjBDpNbavJr2/kes4q5+EQFmy5B
0H7vYtI/6T19sieoR2LlzcmYeoKqD3SpK//ilDo0
+Mh7+nMW0KXb7Km/mr0h9Q/c988Pvnhfk8n863uN
hbWJEZUxj6TGzp57MRxPruxZc7WL/6Xb9rWp11rv
UgSoYs2ViuXrdnuxWLRmnM8C2vJ42F6JtUnM2pIp
emuOYZV8a/6hESIEWdbSBNjSHMmGThcqztnIpFZh
leXyw6BYfSPeYaxrJzfd6fiNkeKq2QmpmnPf7Nk6
L3ajsIkIUDRKw9Qm3JuEBb77PaFiWSsfsJ7p1SuC
6mszP3RTkQpJGLpeuuB6hpK1O+HXN2uXBFp7ikB1
Z1S5WVyyVipUA6EcSE3ETc/1qnr8I7F9+tTjfjGC
1FkDlEgy8mqq/VbWvrIzftrXK6ppPqfQBQMC5pEC
vVIZ6s05WDvEWnARUN2alFgCmREWtTSWfgHFg93n
ad0zGhAL7lHqw4KpOUg2i5IYAj5j3spEq9WCJU8E
0B9MKhbNSmJ6G/3q8+c52HPHzuiTM7qyRs7HS2c8
cc+cycnw2LqGDlJEg8daZWOPhnigAtvMs6GX2Y7X
vT+XyJdWQqtQ31NlWmSCrdaWMLgA4vvIDZkZ0+su
i42tLEZ75JwNJ47bOz4e3TU4QPKI1KY+bQREKRrG
Kk2XCbVRcNMAEvmgWEhx2obZQC61ypQR1uAc3U9g
cD4ZpobdzLCEWmaVxW5mtQ6feqeYR6jZabbsBtj5
Wey6tR4duj2SgPl6fOmYWRQn2iSWDzwS6TAh5ILC
bSqlwSCSgEogEscW9alfTy3pOup4kL3GZR1+/oRs
Ic9/vTQ9DGTtI5/dghegRMcigc6d+d3EwTujwupm
qEVOUpHmz6QsN3nURv1uPtbLaK6ahToJaS30E2L5
luEZMsMGrxKTYDbzYb42tocjWvfssXPq9CfwO/w9
Gp4ZkxI+nzgjB3Js5nm3CrMNiZ51m4oCa9PliW6I
kao0u1ESuoIvJHRh/84I3sMdbTUXnlLsJi4miHu1
zeFafqrMDt4RbgjG54OfICo4/nAI8R6UdZIc0rJs
K42XL67sMj7ta+h24BCePTM4r9WhqZu14uYp0yBS
uan1XE/3vyM4fLG/X3nleBh4viCMCaJXW+SCCBYs
H3i2u+0SAiSJaJUBt7qr3AFeIcWDadYLSrevBiSx
4Z05fJoz7DRTLlalWDMrh7ub3gLWlGpAmsF1iyuT
LGO96YZGkK274LZec3lx3Js4Ga7HzmQjwk6hl2Sw
T+1nrqxtF7qtN7QxduHsrQMbjWDkxnQYpLmgPsP5
qEAT0QfcN04ED+iWizW26fF4MDy/srNwEH9bzr5L
T3soaBbWHmZA39s39NOlR+VmzalSUDgU8XYV3uDM
2nkfn1PiU1GzTnk6x18D3kFogBRxztvh0v1Gl7KF
74FbK5bCekcUxA9Z9NgghovIRMD1393+q5exT6sK
je0kXA1njwsDp5wuu0SF4X+5L+C7VBIpA80ie8ut
a3Oe73j528G58pDvbC78Ac8blc47cD78jF22wEzz
/rViwKPpecxkHBBsgzHOyxjpicc2b26Ax5RkRu8D
b9VAONgJmoe197v1bMEwoumNJc+HrpW+zixYEMAN
zfr/lj7+MCj9nwjv8VuB6o1Js36sDhILpr84gIgr
HCZJtIHxh8VdtnA35iyKX9lFftu3EAGXtHSXeswX
I82up/Vr2/D6tnv09j8=
'))); ?>

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 49103d98cc9846e9dc6fe9919f05eab5
Eval Count 1
Decode Time 62 ms