Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
SF-Port11110-TCP:V=7.80%I=7%D=10/6%Time=6520100E%P=x86_64-pc-linux-gnu%r(G SF:etRequest,3..
Decoded Output download
<? SF-Port11110-TCP:V=7.80%I=7%D=10/6%Time=6520100E%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,305C,"HTTP/1\.0 403 Forbidden\r\nServer: Cato\r\nCon
SF:nection: close\r\nCache-Control: no-cache, no-store, must-r
SF:evalidate\r\nPragma: no-cache\r\nExpires: 0\r\nContent-Length:\x2
SF:0169797\r\n\r\n<!DOCTYPE html>\n<html>\n<head>\n\n<script type=\"
SF:text/javascript\">\nvar cato_variables = { page_type: 1,
SF: host_ip: \"10\.77\.160\.7\", error: \"Malicious content
SF: was detected\", };\n</script>\n <meta charset=\
SF:"utf-8\" />\n <meta name=\"viewport\" content=\"width=d
SF:evice-width, initial-scale=1\" />\n <title>Access Notif
SF:ication</title>\n <script>\n const pageTypes\x
SF:20= {\n BLOCK: \"block\",\n PROMPT: \"prompt\",\
SF:n};\n\nconst colorStrip = {\n block: \"#ef5350\",\n\
SF:x20 prompt: \"#ffb300\",\n};\n\nfunction onLoad\(\) {\n
SF: const pageType = cato_variables\.prompt \? pageTypes
SF:\.PROMPT : pageTypes\.BLOCK;\n setFont\(pageType\);\n \
SF:x20setBgColor\(pageType\);\n setColorStrip\(pageType\);\n \x2
SF:0removeUnused\(pageType\);\n setUrl\(\);\n setReasonData\
SF:(\);\n if \(\n cato_variables\.cmpl_hd
SF:rname &&\n ")%r(HTTPOptions,305C,"HTTP/1\.0 403\x2
SF:0Forbidden\r\nServer: Cato\r\nConnection: close\r\nCache-Control:
SF: no-cache, no-store, must-revalidate\r\nPragma: no-cache\r\
SF:nExpires: 0\r\nContent-Length: 169797\r\n\r\n<!DOCTYPE html>\n
SF:<html>\n<head>\n\n<script type=\"text/javascript\">\nvar cato_var
SF:iables = { page_type: 1, host_ip: \"10\.77\.160\.7\",
SF: error: \"Malicious content was detected\", };\n<
SF:/script>\n <meta charset=\"utf-8\" />\n <meta na
SF:me=\"viewport\" content=\"width=device-width, initial-scale=1\"\x
SF:20/>\n <title>Access Notification</title>\n <script>\n
SF: const pageTypes = {\n BLOCK: \"block
SF:\",\n PROMPT: \"prompt\",\n};\n\nconst colorStrip =
SF:{\n block: \"#ef5350\",\n prompt: \"#ffb300\",\n};\
SF:n\nfunction onLoad\(\) {\n const pageType = cato_
SF:variables\.prompt \? pageTypes\.PROMPT : pageTypes\.BLOCK;\
SF:n setFont\(pageType\);\n setBgColor\(pageType\);\n \x2
SF:0setColorStrip\(pageType\);\n removeUnused\(pageType\);\n \x2
SF:0setUrl\(\);\n setReasonData\(\);\n if \(\n \x2
SF:0 cato_variables\.cmpl_hdrname &&\n "); ?>
Did this file decode correctly?
Original Code
SF-Port11110-TCP:V=7.80%I=7%D=10/6%Time=6520100E%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,305C,"HTTP/1\.0\x20403\x20Forbidden\r\nServer:\x20Cato\r\nCon
SF:nection:\x20close\r\nCache-Control:\x20no-cache,\x20no-store,\x20must-r
SF:evalidate\r\nPragma:\x20no-cache\r\nExpires:\x200\r\nContent-Length:\x2
SF:0169797\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\n\n<script\x20type=\"
SF:text/javascript\">\nvar\x20cato_variables\x20=\x20{\x20page_type:\x201,
SF:\x20host_ip:\x20\"10\.77\.160\.7\",\x20error:\x20\"Malicious\x20content
SF:\x20was\x20detected\",\x20\x20};\n</script>\n\x20\x20<meta\x20charset=\
SF:"utf-8\"\x20/>\n\x20\x20<meta\x20name=\"viewport\"\x20content=\"width=d
SF:evice-width,\x20initial-scale=1\"\x20/>\n\x20\x20<title>Access\x20Notif
SF:ication</title>\n\x20\x20<script>\n\x20\x20\x20\x20const\x20pageTypes\x
SF:20=\x20{\n\x20\x20BLOCK:\x20\"block\",\n\x20\x20PROMPT:\x20\"prompt\",\
SF:n};\n\nconst\x20colorStrip\x20=\x20{\n\x20\x20block:\x20\"#ef5350\",\n\
SF:x20\x20prompt:\x20\"#ffb300\",\n};\n\nfunction\x20onLoad\(\)\x20{\n\x20
SF:\x20const\x20pageType\x20=\x20cato_variables\.prompt\x20\?\x20pageTypes
SF:\.PROMPT\x20:\x20pageTypes\.BLOCK;\n\x20\x20setFont\(pageType\);\n\x20\
SF:x20setBgColor\(pageType\);\n\x20\x20setColorStrip\(pageType\);\n\x20\x2
SF:0removeUnused\(pageType\);\n\x20\x20setUrl\(\);\n\x20\x20setReasonData\
SF:(\);\n\x20\x20if\x20\(\n\x20\x20\x20\x20\x20\x20cato_variables\.cmpl_hd
SF:rname\x20&&\n\x20\x20\x20\x20")%r(HTTPOptions,305C,"HTTP/1\.0\x20403\x2
SF:0Forbidden\r\nServer:\x20Cato\r\nConnection:\x20close\r\nCache-Control:
SF:\x20no-cache,\x20no-store,\x20must-revalidate\r\nPragma:\x20no-cache\r\
SF:nExpires:\x200\r\nContent-Length:\x20169797\r\n\r\n<!DOCTYPE\x20html>\n
SF:<html>\n<head>\n\n<script\x20type=\"text/javascript\">\nvar\x20cato_var
SF:iables\x20=\x20{\x20page_type:\x201,\x20host_ip:\x20\"10\.77\.160\.7\",
SF:\x20error:\x20\"Malicious\x20content\x20was\x20detected\",\x20\x20};\n<
SF:/script>\n\x20\x20<meta\x20charset=\"utf-8\"\x20/>\n\x20\x20<meta\x20na
SF:me=\"viewport\"\x20content=\"width=device-width,\x20initial-scale=1\"\x
SF:20/>\n\x20\x20<title>Access\x20Notification</title>\n\x20\x20<script>\n
SF:\x20\x20\x20\x20const\x20pageTypes\x20=\x20{\n\x20\x20BLOCK:\x20\"block
SF:\",\n\x20\x20PROMPT:\x20\"prompt\",\n};\n\nconst\x20colorStrip\x20=\x20
SF:{\n\x20\x20block:\x20\"#ef5350\",\n\x20\x20prompt:\x20\"#ffb300\",\n};\
SF:n\nfunction\x20onLoad\(\)\x20{\n\x20\x20const\x20pageType\x20=\x20cato_
SF:variables\.prompt\x20\?\x20pageTypes\.PROMPT\x20:\x20pageTypes\.BLOCK;\
SF:n\x20\x20setFont\(pageType\);\n\x20\x20setBgColor\(pageType\);\n\x20\x2
SF:0setColorStrip\(pageType\);\n\x20\x20removeUnused\(pageType\);\n\x20\x2
SF:0setUrl\(\);\n\x20\x20setReasonData\(\);\n\x20\x20if\x20\(\n\x20\x20\x2
SF:0\x20\x20\x20cato_variables\.cmpl_hdrname\x20&&\n\x20\x20\x20\x20");
Function Calls
None |
Stats
MD5 | d964aaa308d0a47c4ef54b38082c181a |
Eval Count | 0 |
Decode Time | 46 ms |