Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<? eval(gzinflate(base64_decode(' pVhtc9o4EP7emf6HPU/mDHcEkqZv1wZSSriGNgkp kHRuMhmPYgtQa..

Decoded Output download

?><?php
                    session_start();

                    // Database Configuration
                    $dbHost = 'localhost';
                    $dbUsername = 'u608374782_Velo_Aledany';
                    $dbPassword = 'Aa123123123@@';
                    $dbName = 'u608374782_Velo_Aledany';

                    // Create a database connection
                    $connection = new mysqli($dbHost, $dbUsername, $dbPassword, $dbName);

                    // Check if the connection is successful
                    if ($connection->connect_error) {
                        die("Connection failed: " . $connection->connect_error);
                    }

                    
                    
                    // Verify reCAPTCHA
$recaptchaSecretKey = '6LeyJrUnAAAAAGv48IhByM1IQj5nBxK5Q1Jh9tV5';
$recaptchaResponse = $_POST['g-recaptcha-response'];

$recaptchaUrl = "https://www.google.com/recaptcha/api/siteverify";
$recaptchaData = array(
    'secret' => $recaptchaSecretKey,
    'response' => $recaptchaResponse,
);

$recaptchaOptions = array(
    'http' => array(
        'method' => 'POST',
        'content' => http_build_query($recaptchaData),
    ),
);

$recaptchaContext = stream_context_create($recaptchaOptions);
$recaptchaResult = file_get_contents($recaptchaUrl, false, $recaptchaContext);
$recaptchaData = json_decode($recaptchaResult, true);

if (!$recaptchaData['success']) {
    // CAPTCHA verification failed
    echo "CAPTCHA verification failed. Please try again.";
} else {
    // CAPTCHA verification successful, proceed with signup logic
    // ... your existing signup logic ...
}



if ($_SERVER["REQUEST_METHOD"] == "POST") {
    $email = $_POST['email'];
    $password = $_POST['password'];
    
    // Get the user's IP address
    $user_ip = $_SERVER['REMOTE_ADDR'];
    
    // Insert the login attempt with email, IP address, and timestamp
    $connection->query("INSERT INTO login_attempts (email, ip_address) VALUES ('$email', '$user_ip')");

    // Validate the inputs (you can add more validation rules as needed)
    if (empty($email) || empty($password)) {
        echo '<div class="alert alert-danger">Please enter email and password</div>';
    } else {
        // Check if the user with the provided email exists in the database
        $sql = "SELECT * FROM users WHERE email = '$email'";
        $result = $connection->query($sql);

        if ($result->num_rows > 0) {
            $row = $result->fetch_assoc();
            
            // Check if the user is banned due to too many failed attempts
            if ($row['login_attempts'] >= 3 && time() - strtotime($row['last_failed_attempt']) < 3600) {
                echo '<div class="alert alert-danger">You are temporarily banned due to too many failed attempts. Please try again later.</div>';
            } else {
                // If login is successful, update last_login_ip for the user
    if (password_verify($password, $row['password'])) {
        $user_id = $row['id'];
        $connection->query("UPDATE users SET last_login_ip = '$user_ip' WHERE id = $user_id");
                    
                    // Set session variables and redirect based on user_role
                    $_SESSION['user_id'] = $row['id'];
                    $_SESSION['user_role'] = $row['user_role'];
                    $_SESSION['username'] = $row['username'];
                    
                    if ($row['user_role'] === 'member') {
                        header("Location: ResellerEN/my_keys.php");
                    } elseif ($row['user_role'] === 'admin') {
                        header("Location: OwnerEN/owner.php");
                    }
                    exit;
                } else {
                    // Incorrect password
                    // Increase failed attempt count and update last_failed_attempt timestamp
                    $connection->query("UPDATE users SET login_attempts = login_attempts + 1, last_failed_attempt = NOW() WHERE id = " . $row['id']);
                    
                    // Display appropriate error message
                    if ($row['login_attempts'] >= 2) {
                        echo '<div class="alert alert-danger">Incorrect password. One more attempt and you will be banned.</div>';
                    } else {
                        echo '<div class="alert alert-danger">Incorrect password</div>';
                    }
                }
            }
        } else {
            // User not found
            echo '<div class="alert alert-danger">User not found</div>';
        }
    }
}

                    // Close the database connection
                    $connection->close();
                    ?><?

Did this file decode correctly?

Original Code

<? eval(gzinflate(base64_decode('
pVhtc9o4EP7emf6HPU/mDHcEkqZv1wZSSriGNgkp
kHRuMhmPYgtQa1uuJIcy1/73W8k22GBIMsdkklja
N+0+z67MUevwKJpGT59AyUdSKRkPHamIUJXq26dP
yuUaDTgmitwSSaHDwzGbxIIo1CwX3/FuT7hU0ATb
5y7xp/hgv90oeympCElAtXz8cu/1wavnr14/c66o
z522Tz0SzrdoXxApZ1x4WrtN9p8dJD/v3m3ROb/f
28ZEdAQligIBL8uIy8OQulvSsRRApyGdQTCX331W
SfNUyyehlj9TLQt2a2k6U+p+AzYGNc0HA0yCjF0X
azyO/XJtVKrkwtttpf87VAguqvBvuZr+eIxWrM7S
25gwzN4bsKAOW0xuKMqvTed7zCrm4ooKNp6DoJ32
xahz0n76ZEdQl0TKnZIhdQVVn+hcl/7lKZ1/FJdh
W38+3D1/3Zu+n5/t9z5/fRG+//Hpxef9j9O/1NUL
jYWliQGVEQ+lBs+Oc9Efjq7tye5iF/9Ltu0bU6+l
3qXwUcWaKhXJN43GbDarTzif+LTu8qCxEGuQiDUk
U/TOHMMq+NYMRCNECDKvJAmwpTmSDc0WlJyzlkot
wirKZYdBsepKvP1I106uutPxGyP5VbMTUDXlntmz
dV7sWm4TEaBomISpTTi3MfM953tMxbxSPGA11auW
BNXRZn7otiIVkjBw3GTBcQ0lK2vhV1drF/tae4xA
dSZUOWlcslIoVA2h7EtNxFXP1bJ6fJXYQD3qci8f
QeKsBkrEKXk11X4ral/bKT/tmwXVNJ8T6IIBAXNJ
jl6JDHWnHKwtYnW48KluTUrMgUwIC+saS7+A4sHu
87TsGTWIBHcp9WDG1BQkm4RxBD6fMHdhol6vw5zH
AugPJhULJwUxvY1+9fmzHOw4w+7gqju4tgbdz5fd
4cg5645O+sfWDTSRIho81iIbOzTAA+XYZp4Nvcx2
tGz+mUS2tBBahPqBKtMiY2y1toTeBRDPQ27I1Jhe
d1hkbKUx2oPuWX/UddrHx4N1gz0kj0hs6tOGQJSi
QaSSdJlQazk3NSChB4oFFOdtkI7kQqtMGGH1ztH9
CHrno35i2EkNS6ikVlnkpFarcNU+xTxCxU6yZdfA
zs5iV63l6NDtkfjM0+NLx8zCKNYmsXzgklCHCQEX
FO4SKQ0GEftUApE4tqhHvWpiSddRx4PsNS6r8PMn
pAtZ/quF6WEgax967A5cHyWaFvF17szvXRy6Eyqs
Vopa5CQVSf5MyjKThw3Ub2VzvYjmslmok5DUQj8h
lu8YniE1bPAqMQlmMxvmS2M7OKJ1zx52T7udEfwB
fw/6Z8akhC8n3UEXMmxmebdysw2JnnabkgJr08WJ
boiRqOy2wjhwBJ9JaMHe2gjewR1tNRMeU+wmDiaI
u5XV4Vp8Ks0O3hFuCcbngRcjKjj+cAjwDpR2kgzS
smgriZfPru0iPu0baDXhAH7/3eC8UoVd3awVN0+p
BpHKSaxnerr/HcLBy7290ivHw8DzD8KYIHq1RS6I
YP78gWdbb5fgI0lEvQi4xV1lDXi5FPfGaS8o3L5q
EEeGd+bwSc6w04y5WJRiyawM7k5yC1hSqgZJBpct
rkiylPWmGxpBtuyCm3rN5cVxe9RNcT3sjlYibOZ6
SQr7xH7qytp0odt4QxtiF07fO7DRCEZuTYdBmgvq
MZyPCjQRPcB940Rwn264WGObHg57/fNrOw0H8bfh
7Nv0tIecZm7tYQb0vX1FP1l6VG6WnCoEhUMRb1fB
Lc6srffxKSUeFRXrlCdz/A3gHYT6SJHueSOYO9/o
XNbxTXBjxRJYb4mCeAELHxtEfxaaCLj+u91/+TL2
aVWisZmEi+HscmHglNFlm6gw/C/2BXyXikNloJln
b7F1rc7zLS9/WzhXHPLN1YU/Yb9W6rwJ5/0v2GVz
zDTvXwsGPJqex0xGPsE2GOG8jJCeeGzz5gZ4TEkm
9D7wlg2EZ1tB87D2vl7POvRDmtxYsnzoWunrzIz5
PtzStP9v6OMPg9L/ifAevyWoXpk0y8fyILFg+osD
CLnCYRKHKxh/WNxFC+sxp1H8Si/ym76F8LmkhbvU
Y74Y2W25Wr+yCa9HrcOj/wA=
'))); ?>

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 cfe7791c386e39c34a32de1f2dc88257
Eval Count 1
Decode Time 58 ms