3v4l.org

run code in 300+ PHP versions simultaneously
<?php $txt = <<<TXT a:7:{s:18:"__sape_delimiter__";s:6:"<br />";s:12:"__for_user__";s:32:"c1834042ae027600c870acd002aa3b25";s:12:"__for_host__";s:23:"http://www.zavodnept.ru";s:30:"/page/uzly-termoregulirovaniya";a:1:{i:0;s:111:"7 - <a href="http://www.santexbaza.ru/nasosnoe-oborudovanie-grundfos/" target="_blank">Циркуляционный насос</a>";}s:31:"/page/uzly-termoregulirovaniya/";a:1:{i:0;s:111:"7 - <a href="http://www.santexbaza.ru/nasosnoe-oborudovanie-grundfos/" target="_blank">Циркуляционный насос</a>";}s:16:"__sape_new_url__";s:21:"<!--c2120522488322-->";s:12:"__sape_ips__";a:2:{i:0;s:13:"188.72.80.205";i:1;s:13:"188.72.80.201";}} TXT; var_dump(unserialize($txt));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/2hGe7
function name:  (null)
number of ops:  8
compiled vars:  !0 = $txt
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'a%3A7%3A%7Bs%3A18%3A%22__sape_delimiter__%22%3Bs%3A6%3A%22%3Cbr+%2F%3E%22%3Bs%3A12%3A%22__for_user__%22%3Bs%3A32%3A%22c1834042ae027600c870acd002aa3b25%22%3Bs%3A12%3A%22__for_host__%22%3Bs%3A23%3A%22http%3A%2F%2Fwww.zavodnept.ru%22%3Bs%3A30%3A%22%2Fpage%2Fuzly-termoregulirovaniya%22%3Ba%3A1%3A%7Bi%3A0%3Bs%3A111%3A%227+-+%3Ca+href%3D%22http%3A%2F%2Fwww.santexbaza.ru%2Fnasosnoe-oborudovanie-grundfos%2F%22+target%3D%22_blank%22%3E%D0%A6%D0%B8%D1%80%D0%BA%D1%83%D0%BB%D1%8F%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D0%B9+%D0%BD%D0%B0%D1%81%D0%BE%D1%81%3C%2Fa%3E%22%3B%7Ds%3A31%3A%22%2Fpage%2Fuzly-termoregulirovaniya%2F%22%3Ba%3A1%3A%7Bi%3A0%3Bs%3A111%3A%227+-+%3Ca+href%3D%22http%3A%2F%2Fwww.santexbaza.ru%2Fnasosnoe-oborudovanie-grundfos%2F%22+target%3D%22_blank%22%3E%D0%A6%D0%B8%D1%80%D0%BA%D1%83%D0%BB%D1%8F%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D0%B9+%D0%BD%D0%B0%D1%81%D0%BE%D1%81%3C%2Fa%3E%22%3B%7Ds%3A16%3A%22__sape_new_url__%22%3Bs%3A21%3A%22%3C%21--c2120522488322--%3E%22%3Bs%3A12%3A%22__sape_ips__%22%3Ba%3A2%3A%7Bi%3A0%3Bs%3A13%3A%22188.72.80.205%22%3Bi%3A1%3Bs%3A13%3A%22188.72.80.201%22%3B%7D%7D'
    7     1        INIT_FCALL                                               'var_dump'
          2        INIT_FCALL                                               'unserialize'
          3        SEND_VAR                                                 !0
          4        DO_ICALL                                         $2      
          5        SEND_VAR                                                 $2
          6        DO_ICALL                                                 
          7      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
167.4 ms | 1395 KiB | 17 Q