Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
Received: from DM6PR12MB2794.namprd12.prod.outlook.com (2603:10b6:a03:54::14) by BYAPR12..
Decoded Output download
<? Received: from DM6PR12MB2794.namprd12.prod.outlook.com (2603:10b6:a03:54::14)
by BYAPR12MB2791.namprd12.prod.outlook.com with HTTPS via
BYAPR02CA0037.NAMPRD02.PROD.OUTLOOK.COM; Tue, 9 Apr 2019 02:11:43 +0000
Received: from DM3PR12CA0112.namprd12.prod.outlook.com (2603:10b6:0:55::32) by
DM6PR12MB2794.namprd12.prod.outlook.com (2603:10b6:5:43::12) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.1792.14; Tue, 9 Apr 2019 02:11:42 +0000
Received: from CO1NAM05FT005.eop-nam05.prod.protection.outlook.com
(2a01:111:f400:7e50::207) by DM3PR12CA0112.outlook.office365.com
(2603:10b6:0:55::32) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1771.16 via Frontend
Transport; Tue, 9 Apr 2019 02:11:41 +0000
Authentication-Results: spf=softfail (sender IP is 40.80.155.159)
smtp.mailfrom=qualys.com; kloveair1.com; dkim=none (message not signed)
header.d=none;kloveair1.com; dmarc=none action=none header.from=qualys.com;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
qualys.com discourages use of 40.80.155.159 as permitted sender)
Received: from BCVA2.kloveair1.com (40.80.155.159) by
CO1NAM05FT005.mail.protection.outlook.com (10.152.96.110) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.1792.7 via Frontend Transport; Tue, 9 Apr 2019 02:11:41 +0000
X-ASG-Debug-ID: 1554775899-10e439a30830a100001-ad0y4e
Received: from mail.ess.barracuda.com (mail.ess.barracuda.com [209.222.82.142]) by BCVA2.kloveair1.com with ESMTP id jIKzwHXYPhWK3Scd (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <[email protected]>; Mon, 08 Apr 2019 19:11:40 -0700 (PDT)
X-Barracuda-Envelope-From: [email protected]
X-Barracuda-RBL-Trusted-Forwarder: 209.222.82.142
Received: from mx0a-001ca501.pphosted.com (mx0a-001ca501.pphosted.com [148.163.156.198]) by mx123.us-east-2b.ess.aws.cudaops.com (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 09 Apr 2019 02:11:36 +0000
Received: from pps.filterd (m0082536.ppops.net [127.0.0.1])
by mx0a-001ca501.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x391KHrc000974
for <[email protected]>; Mon, 8 Apr 2019 18:29:03 -0700
X-Barracuda-Effective-Source-IP: mx0a-001ca501.pphosted.com[148.163.156.198]
X-Barracuda-Apparent-Source-IP: 148.163.156.198
X-Barracuda-RBL-IP: 148.163.156.198
X-Barracuda-BBL-IP: 148.163.156.198
Authentication-Results-Original: ppops.net; spf=pass
[email protected]
Received: from relay07.qualys.com ([64.39.96.20])
by mx0a-001ca501.pphosted.com with ESMTP id 2rrfy29nk4-1
(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT)
for <[email protected]>; Mon, 08 Apr 2019 18:29:03 -0700
Received: from qwb01.p01.sjc01.qualys.com (qwb01.p01.sjc01.qualys.com [172.16.2.151])
by relay07.qualys.com (Postfix) with ESMTP id F1FA619FD7
for <[email protected]>; Tue, 9 Apr 2019 01:29:02 +0000 (UTC)
Received: by qwb01.p01.sjc01.qualys.com (Postfix, from userid 501)
id F151B1B098; Tue, 9 Apr 2019 01:29:02 +0000 (UTC)
To: <[email protected]>
Subject: Qualys - Latest vulnerabilities added on April 08, 2019
From: Support <[email protected]>
X-ASG-Orig-Subj: Qualys - Latest vulnerabilities added on April 08, 2019
QualysHM: external
MIME-Version: 1.0
Message-ID: <[email protected]>
Date: Tue, 9 Apr 2019 01:29:02 +0000
X-Proofpoint-SPF-Result: pass
X-Proofpoint-SPF-Record: v=spf1 include:_spf.qualys.com include:mktomail.com ~all
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-04-09_01:,,
signatures=0
X-BESS-ID: 1554775896-893245-11774-118275-1
X-BESS-VER: 2019.1_20190405.1759
X-BESS-Apparent-Source-IP: 148.163.156.198
X-BESS-Spam-Status: SCORE=0.00 using global scores of QUARANTINE_LEVEL=N/A KILL_LEVEL=5.0 tests=
Received-SPF: pass (mx123.us-east-2b.ess.aws.cudaops.com: domain of [email protected] designates 148.163.156.198 as permitted sender)
X-BESS-Spam-Report: Code version 3.2, rules version 3.2.2.211648 [from cloudscan15.us-
east-2a.ess.aws.cudaops.com]
?>
Did this file decode correctly?
Original Code
Received: from DM6PR12MB2794.namprd12.prod.outlook.com (2603:10b6:a03:54::14)
by BYAPR12MB2791.namprd12.prod.outlook.com with HTTPS via
BYAPR02CA0037.NAMPRD02.PROD.OUTLOOK.COM; Tue, 9 Apr 2019 02:11:43 +0000
Received: from DM3PR12CA0112.namprd12.prod.outlook.com (2603:10b6:0:55::32) by
DM6PR12MB2794.namprd12.prod.outlook.com (2603:10b6:5:43::12) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.1792.14; Tue, 9 Apr 2019 02:11:42 +0000
Received: from CO1NAM05FT005.eop-nam05.prod.protection.outlook.com
(2a01:111:f400:7e50::207) by DM3PR12CA0112.outlook.office365.com
(2603:10b6:0:55::32) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1771.16 via Frontend
Transport; Tue, 9 Apr 2019 02:11:41 +0000
Authentication-Results: spf=softfail (sender IP is 40.80.155.159)
smtp.mailfrom=qualys.com; kloveair1.com; dkim=none (message not signed)
header.d=none;kloveair1.com; dmarc=none action=none header.from=qualys.com;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
qualys.com discourages use of 40.80.155.159 as permitted sender)
Received: from BCVA2.kloveair1.com (40.80.155.159) by
CO1NAM05FT005.mail.protection.outlook.com (10.152.96.110) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.1792.7 via Frontend Transport; Tue, 9 Apr 2019 02:11:41 +0000
X-ASG-Debug-ID: 1554775899-10e439a30830a100001-ad0y4e
Received: from mail.ess.barracuda.com (mail.ess.barracuda.com [209.222.82.142]) by BCVA2.kloveair1.com with ESMTP id jIKzwHXYPhWK3Scd (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <[email protected]>; Mon, 08 Apr 2019 19:11:40 -0700 (PDT)
X-Barracuda-Envelope-From: [email protected]
X-Barracuda-RBL-Trusted-Forwarder: 209.222.82.142
Received: from mx0a-001ca501.pphosted.com (mx0a-001ca501.pphosted.com [148.163.156.198]) by mx123.us-east-2b.ess.aws.cudaops.com (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 09 Apr 2019 02:11:36 +0000
Received: from pps.filterd (m0082536.ppops.net [127.0.0.1])
by mx0a-001ca501.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x391KHrc000974
for <[email protected]>; Mon, 8 Apr 2019 18:29:03 -0700
X-Barracuda-Effective-Source-IP: mx0a-001ca501.pphosted.com[148.163.156.198]
X-Barracuda-Apparent-Source-IP: 148.163.156.198
X-Barracuda-RBL-IP: 148.163.156.198
X-Barracuda-BBL-IP: 148.163.156.198
Authentication-Results-Original: ppops.net; spf=pass
[email protected]
Received: from relay07.qualys.com ([64.39.96.20])
by mx0a-001ca501.pphosted.com with ESMTP id 2rrfy29nk4-1
(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT)
for <[email protected]>; Mon, 08 Apr 2019 18:29:03 -0700
Received: from qwb01.p01.sjc01.qualys.com (qwb01.p01.sjc01.qualys.com [172.16.2.151])
by relay07.qualys.com (Postfix) with ESMTP id F1FA619FD7
for <[email protected]>; Tue, 9 Apr 2019 01:29:02 +0000 (UTC)
Received: by qwb01.p01.sjc01.qualys.com (Postfix, from userid 501)
id F151B1B098; Tue, 9 Apr 2019 01:29:02 +0000 (UTC)
To: <[email protected]>
Subject: Qualys - Latest vulnerabilities added on April 08, 2019
From: Support <[email protected]>
X-ASG-Orig-Subj: Qualys - Latest vulnerabilities added on April 08, 2019
QualysHM: external
MIME-Version: 1.0
Message-ID: <[email protected]>
Date: Tue, 9 Apr 2019 01:29:02 +0000
X-Proofpoint-SPF-Result: pass
X-Proofpoint-SPF-Record: v=spf1 include:_spf.qualys.com include:mktomail.com ~all
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-04-09_01:,,
signatures=0
X-BESS-ID: 1554775896-893245-11774-118275-1
X-BESS-VER: 2019.1_20190405.1759
X-BESS-Apparent-Source-IP: 148.163.156.198
X-BESS-Spam-Status: SCORE=0.00 using global scores of QUARANTINE_LEVEL=N/A KILL_LEVEL=5.0 tests=
Received-SPF: pass (mx123.us-east-2b.ess.aws.cudaops.com: domain of [email protected] designates 148.163.156.198 as permitted sender)
X-BESS-Spam-Report: Code version 3.2, rules version 3.2.2.211648 [from cloudscan15.us-
east-2a.ess.aws.cudaops.com]
Function Calls
None |
Stats
MD5 | 5b0e9c823bb9ebb0d2247b7d2f59494c |
Eval Count | 0 |
Decode Time | 101 ms |