3v4l.org

run code in 300+ PHP versions simultaneously
<?php $row = "/Common/VS_incoming:210.242.156.156:8090(6) IPI for 123.151.42.61: {Spam Sources} {Windows Exploits} Scanners From CN chinanet tianjin province network"; preg_match_all("[\W]{0,}([\w ]*)\b", $row, $test); print_r($test);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/E8elI
function name:  (null)
number of ops:  10
compiled vars:  !0 = $row, !1 = $test
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%2FCommon%2FVS_incoming%3A210.242.156.156%3A8090%286%29+IPI+for+123.151.42.61%3A+%7BSpam+Sources%7D+%7BWindows+Exploits%7D+Scanners+From+CN+chinanet+tianjin+province+network'
    3     1        INIT_FCALL                                               'preg_match_all'
          2        SEND_VAL                                                 '%5B%5CW%5D%7B0%2C%7D%28%5B%5Cw+%5D%2A%29%5Cb'
          3        SEND_VAR                                                 !0
          4        SEND_REF                                                 !1
          5        DO_ICALL                                                 
    5     6        INIT_FCALL                                               'print_r'
          7        SEND_VAR                                                 !1
          8        DO_ICALL                                                 
          9      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.96 ms | 1394 KiB | 17 Q