Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<? eval(gzinflate(base64_decode(' pVhtT9tIEP5eqf9hzkJ1cpcXCndt1ZK0UfCVqEBo Elq1CFmLvUn2a..
Decoded Output download
?> <?php
session_start();
// Database Configuration
$dbHost = 'localhost';
$dbUsername = 'u608374782_AledanyKIWI';
$dbPassword = 'Aa123123123@@';
$dbName = 'u608374782_AledanyKIWI';
// Create a database connection
$connection = new mysqli($dbHost, $dbUsername, $dbPassword, $dbName);
// Check if the connection is successful
if ($connection->connect_error) {
die("Connection failed: " . $connection->connect_error);
}
// Verify reCAPTCHA
$recaptchaSecretKey = '6LeEelQoAAAAAMley_-At5-AOed2_G12YcZuThZG';
$recaptchaResponse = $_POST['g-recaptcha-response'];
$recaptchaUrl = "https://www.google.com/recaptcha/api/siteverify";
$recaptchaData = array(
'secret' => $recaptchaSecretKey,
'response' => $recaptchaResponse,
);
$recaptchaOptions = array(
'http' => array(
'method' => 'POST',
'content' => http_build_query($recaptchaData),
),
);
$recaptchaContext = stream_context_create($recaptchaOptions);
$recaptchaResult = file_get_contents($recaptchaUrl, false, $recaptchaContext);
$recaptchaData = json_decode($recaptchaResult, true);
if (!$recaptchaData['success']) {
// CAPTCHA verification failed
echo "CAPTCHA verification failed. Please try again.";
} else {
// CAPTCHA verification successful, proceed with signup logic
// ... your existing signup logic ...
}
if ($_SERVER["REQUEST_METHOD"] == "POST") {
$email = $_POST['email'];
$password = $_POST['password'];
// Get the user's IP address
$user_ip = $_SERVER['REMOTE_ADDR'];
// Insert the login attempt with email, IP address, and timestamp
$connection->query("INSERT INTO login_attempts (email, ip_address) VALUES ('$email', '$user_ip')");
// Validate the inputs (you can add more validation rules as needed)
if (empty($email) || empty($password)) {
echo '<div class="alert alert-danger">Please enter email and password</div>';
} else {
// Check if the user with the provided email exists in the database
$sql = "SELECT * FROM users WHERE email = '$email'";
$result = $connection->query($sql);
if ($result->num_rows > 0) {
$row = $result->fetch_assoc();
// Check if the user is banned due to too many failed attempts
if ($row['login_attempts'] >= 3 && time() - strtotime($row['last_failed_attempt']) < 3600) {
echo '<div class="alert alert-danger">You are temporarily banned due to too many failed attempts. Please try again later.</div>';
} else {
// If login is successful, update last_login_ip for the user
if (password_verify($password, $row['password'])) {
$user_id = $row['id'];
$connection->query("UPDATE users SET last_login_ip = '$user_ip' WHERE id = $user_id");
// Set session variables and redirect based on user_role
$_SESSION['user_id'] = $row['id'];
$_SESSION['user_role'] = $row['user_role'];
$_SESSION['username'] = $row['username'];
if ($row['user_role'] === 'member') {
header("Location: ResellerEN/my_keys.php");
} elseif ($row['user_role'] === 'admin') {
header("Location: OwnerEN/owner.php");
}
exit;
} else {
// Incorrect password
// Increase failed attempt count and update last_failed_attempt timestamp
$connection->query("UPDATE users SET login_attempts = login_attempts + 1, last_failed_attempt = NOW() WHERE id = " . $row['id']);
// Display appropriate error message
if ($row['login_attempts'] >= 2) {
echo '<div class="alert alert-danger">Incorrect password. One more attempt and you will be banned.</div>';
} else {
echo '<div class="alert alert-danger">Incorrect password</div>';
}
}
}
} else {
// User not found
echo '<div class="alert alert-danger">User not found</div>';
}
}
}
// Close the database connection
$connection->close();
?><?
Did this file decode correctly?
Original Code
<? eval(gzinflate(base64_decode('
pVhtT9tIEP5eqf9hzkJ1cpcXCndt1ZK0UfCVqEBo
Elq1CFmLvUn2anvd3TVpdO1/v9m1ndjBCaCLEODd
eduZ55lZ520XAI7exvP46ROo+EgqJeORKxURqlZ/
8/RJtVy7DcdEkRsiKfR5NGWzRBCFmtXie/7NCZcK
OmAH3CPBHB/sN1tlLyUVEQmplk9e7L86fPnny1cH
bi+gPomWHwafBzuUL4iUCy58rdwjzw8O059373bo
nN/rbGsa+oISRYGAn+fD41FEvR3JWAugz4guIFzK
7wGrZVlqFFPQKB6pkce6szD9OfW+AZuCmheDASZB
Jp6HFZ4mQbU2KtUK4TW72f8uFYKLOvxbraY/PqM1
q7/2NiUMM/gaLGjBDpNbavJr2/kes4q5+EQFmy5B
0H7vYtI/6T19sieoR2LlzcmYeoKqD3SpK//ilDo0
+Mh7+nMW0KXb7Km/mr0h9Q/c988Pvnhfk8n863uN
hbWJEZUxj6TGzp57MRxPruxZc7WL/6Xb9rWp11rv
UgSoYs2ViuXrdnuxWLRmnM8C2vJ42F6JtUnM2pIp
emuOYZV8a/6hESIEWdbSBNjSHMmGThcqztnIpFZh
leXyw6BYfSPeYaxrJzfd6fiNkeKq2QmpmnPf7Nk6
L3ajsIkIUDRKw9Qm3JuEBb77PaFiWSsfsJ7p1SuC
6mszP3RTkQpJGLpeuuB6hpK1O+HXN2uXBFp7ikB1
Z1S5WVyyVipUA6EcSE3ETc/1qnr8I7F9+tTjfjGC
1FkDlEgy8mqq/VbWvrIzftrXK6ppPqfQBQMC5pEC
vVIZ6s05WDvEWnARUN2alFgCmREWtTSWfgHFg93n
ad0zGhAL7lHqw4KpOUg2i5IYAj5j3spEq9WCJU8E
0B9MKhbNSmJ6G/3q8+c52HPHzuiTM7qyRs7HS2c8
cc+cycnw2LqGDlJEg8daZWOPhnigAtvMs6GX2Y7X
vT+XyJdWQqtQ31NlWmSCrdaWMLgA4vvIDZkZ0+su
i42tLEZ75JwNJ47bOz4e3TU4QPKI1KY+bQREKRrG
Kk2XCbVRcNMAEvmgWEhx2obZQC61ypQR1uAc3U9g
cD4ZpobdzLCEWmaVxW5mtQ6feqeYR6jZabbsBtj5
Wey6tR4duj2SgPl6fOmYWRQn2iSWDzwS6TAh5ILC
bSqlwSCSgEogEscW9alfTy3pOup4kL3GZR1+/oRs
Ic9/vTQ9DGTtI5/dghegRMcigc6d+d3EwTujwupm
qEVOUpHmz6QsN3nURv1uPtbLaK6ahToJaS30E2L5
luEZMsMGrxKTYDbzYb42tocjWvfssXPq9CfwO/w9
Gp4ZkxI+nzgjB3Js5nm3CrMNiZ51m4oCa9PliW6I
kao0u1ESuoIvJHRh/84I3sMdbTUXnlLsJi4miHu1
zeFafqrMDt4RbgjG54OfICo4/nAI8R6UdZIc0rJs
K42XL67sMj7ta+h24BCePTM4r9WhqZu14uYp0yBS
uan1XE/3vyM4fLG/X3nleBh4viCMCaJXW+SCCBYs
H3i2u+0SAiSJaJUBt7qr3AFeIcWDadYLSrevBiSx
4Z05fJoz7DRTLlalWDMrh7ub3gLWlGpAmsF1iyuT
LGO96YZGkK274LZec3lx3Js4Ga7HzmQjwk6hl2Sw
T+1nrqxtF7qtN7QxduHsrQMbjWDkxnQYpLmgPsP5
qEAT0QfcN04ED+iWizW26fF4MDy/srNwEH9bzr5L
T3soaBbWHmZA39s39NOlR+VmzalSUDgU8XYV3uDM
2nkfn1PiU1GzTnk6x18D3kFogBRxztvh0v1Gl7KF
74FbK5bCekcUxA9Z9NgghovIRMD1393+q5exT6sK
je0kXA1njwsDp5wuu0SF4X+5L+C7VBIpA80ie8ut
a3Oe73j528G58pDvbC78Ac8blc47cD78jF22wEzz
/rViwKPpecxkHBBsgzHOyxjpicc2b26Ax5RkRu8D
b9VAONgJmoe197v1bMEwoumNJc+HrpW+zixYEMAN
zfr/lj7+MCj9nwjv8VuB6o1Js36sDhILpr84gIgr
HCZJtIHxh8VdtnA35iyKX9lFftu3EAGXtHSXeswX
I82up/Vr2/D6tnv09j8=
'))); ?>
Function Calls
gzinflate | 1 |
base64_decode | 1 |
Stats
MD5 | 49103d98cc9846e9dc6fe9919f05eab5 |
Eval Count | 1 |
Decode Time | 62 ms |