3v4l.org

run code in 500+ PHP versions simultaneously
<?php // 接口配置 $apiKey = "c7b9a2de14b386f7a7dde163f2ecac98"; $domain = "aizhan.com"; // 拼接完整 URL $url = "https://apistore.aizhan.com/icp/checkdomain/{$apiKey}?domain=" . urlencode($domain); // 使用 file_get_contents 发起 GET 请求 $options = [ 'http' => [ 'method' => 'GET', 'header' => "User-Agent: Mozilla/5.0\r\n", 'timeout' => 30 ], 'ssl' => [ 'verify_peer' => false, 'verify_peer_name' => false ] ]; $context = stream_context_create($options); $result = file_get_contents($url, false, $context); // 检查请求是否成功 if ($result === false) { echo "请求失败,请检查网络或 URL 是否正确。\n"; echo "尝试访问的 URL: " . $url . "\n"; } else { // 解析并格式化输出 JSON $data = json_decode($result, true); if ($data) { echo "=== 解析后的结果 ===\n"; echo "状态: " . $data['status'] . "\n"; echo "返回码: " . $data['code'] . "\n"; echo "消息: " . $data['msg'] . "\n"; if (isset($data['data'])) { echo "域名: " . $data['data']['domain'] . "\n"; echo "黑名单等级: " . $data['data']['blackListLevel'] . " "; switch ($data['data']['blackListLevel']) { case 2: echo "(正常域名)\n"; break; case 0: echo "(已列入黑名单)\n"; break; case -1: echo "(状态未知)\n"; break; default: echo "\n"; } } echo "\n=== 原始 JSON ===\n"; echo $result; } else { echo "原始返回内容:\n" . $result; } } ?><?php // 接口配置 $apiKey = "c7b9a2de14b386f7a7dde163f2ecac98"; $domain = "aizhan.com"; // 拼接完整 URL $url = "https://apistore.aizhan.com/icp/checkdomain/{$apiKey}?domain=" . urlencode($domain); // 使用 file_get_contents 发起 GET 请求 $options = [ 'http' => [ 'method' => 'GET', 'header' => "User-Agent: Mozilla/5.0\r\n", 'timeout' => 30 ], 'ssl' => [ 'verify_peer' => false, 'verify_peer_name' => false ] ]; $context = stream_context_create($options); $result = file_get_contents($url, false, $context); // 检查请求是否成功 if ($result === false) { echo "请求失败,请检查网络或 URL 是否正确。\n"; echo "尝试访问的 URL: " . $url . "\n"; } else { // 解析并格式化输出 JSON $data = json_decode($result, true); if ($data) { echo "=== 解析后的结果 ===\n"; echo "状态: " . $data['status'] . "\n"; echo "返回码: " . $data['code'] . "\n"; echo "消息: " . $data['msg'] . "\n"; if (isset($data['data'])) { echo "域名: " . $data['data']['domain'] . "\n"; echo "黑名单等级: " . $data['data']['blackListLevel'] . " "; switch ($data['data']['blackListLevel']) { case 2: echo "(正常域名)\n"; break; case 0: echo "(已列入黑名单)\n"; break; case -1: echo "(状态未知)\n"; break; default: echo "\n"; } } echo "\n=== 原始 JSON ===\n"; echo $result; } else { echo "原始返回内容:\n" . $result; } } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 23, Position 2 = 28
Branch analysis from position: 23
1 jumps found. (Code = 42) Position 1 = 81
Branch analysis from position: 81
2 jumps found. (Code = 43) Position 1 = 104, Position 2 = 109
Branch analysis from position: 104
1 jumps found. (Code = 42) Position 1 = 162
Branch analysis from position: 162
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 109
2 jumps found. (Code = 43) Position 1 = 115, Position 2 = 160
Branch analysis from position: 115
2 jumps found. (Code = 43) Position 1 = 130, Position 2 = 157
Branch analysis from position: 130
2 jumps found. (Code = 44) Position 1 = 144, Position 2 = 149
Branch analysis from position: 144
2 jumps found. (Code = 44) Position 1 = 146, Position 2 = 151
Branch analysis from position: 146
2 jumps found. (Code = 44) Position 1 = 148, Position 2 = 153
Branch analysis from position: 148
1 jumps found. (Code = 42) Position 1 = 155
Branch analysis from position: 155
1 jumps found. (Code = 42) Position 1 = 162
Branch analysis from position: 162
Branch analysis from position: 153
1 jumps found. (Code = 42) Position 1 = 156
Branch analysis from position: 156
Branch analysis from position: 151
1 jumps found. (Code = 42) Position 1 = 156
Branch analysis from position: 156
Branch analysis from position: 149
1 jumps found. (Code = 42) Position 1 = 156
Branch analysis from position: 156
Branch analysis from position: 157
Branch analysis from position: 160
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 28
2 jumps found. (Code = 43) Position 1 = 34, Position 2 = 79
Branch analysis from position: 34
2 jumps found. (Code = 43) Position 1 = 49, Position 2 = 76
Branch analysis from position: 49
2 jumps found. (Code = 44) Position 1 = 63, Position 2 = 68
Branch analysis from position: 63
2 jumps found. (Code = 44) Position 1 = 65, Position 2 = 70
Branch analysis from position: 65
2 jumps found. (Code = 44) Position 1 = 67, Position 2 = 72
Branch analysis from position: 67
1 jumps found. (Code = 42) Position 1 = 74
Branch analysis from position: 74
1 jumps found. (Code = 42) Position 1 = 81
Branch analysis from position: 81
Branch analysis from position: 72
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
Branch analysis from position: 70
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
Branch analysis from position: 68
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
Branch analysis from position: 76
Branch analysis from position: 79
2 jumps found. (Code = 43) Position 1 = 104, Position 2 = 109
Branch analysis from position: 104
Branch analysis from position: 109
filename:       /in/c6k0a
function name:  (null)
number of ops:  163
compiled vars:  !0 = $apiKey, !1 = $domain, !2 = $url, !3 = $options, !4 = $context, !5 = $result, !6 = $data
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'c7b9a2de14b386f7a7dde163f2ecac98'
    4     1        ASSIGN                                                   !1, 'aizhan.com'
    7     2        ROPE_INIT                                     3  ~10     'https%3A%2F%2Fapistore.aizhan.com%2Ficp%2Fcheckdomain%2F'
          3        ROPE_ADD                                      1  ~10     ~10, !0
          4        ROPE_END                                      2  ~9      ~10, '%3Fdomain%3D'
          5        INIT_FCALL                                               'urlencode'
          6        SEND_VAR                                                 !1
          7        DO_ICALL                                         $12     
          8        CONCAT                                           ~13     ~9, $12
          9        ASSIGN                                                   !2, ~13
   10    10        ASSIGN                                                   !3, <array>
   22    11        INIT_FCALL                                               'stream_context_create'
         12        SEND_VAR                                                 !3
         13        DO_ICALL                                         $16     
         14        ASSIGN                                                   !4, $16
   23    15        INIT_FCALL                                               'file_get_contents'
         16        SEND_VAR                                                 !2
         17        SEND_VAL                                                 <false>
         18        SEND_VAR                                                 !4
         19        DO_ICALL                                         $18     
         20        ASSIGN                                                   !5, $18
   26    21        TYPE_CHECK                                    4          !5
         22      > JMPZ                                                     ~20, ->28
   27    23    >   ECHO                                                     '%E8%AF%B7%E6%B1%82%E5%A4%B1%E8%B4%A5%EF%BC%8C%E8%AF%B7%E6%A3%80%E6%9F%A5%E7%BD%91%E7%BB%9C%E6%88%96+URL+%E6%98%AF%E5%90%A6%E6%AD%A3%E7%A1%AE%E3%80%82%0A'
   28    24        CONCAT                                           ~21     '%E5%B0%9D%E8%AF%95%E8%AE%BF%E9%97%AE%E7%9A%84+URL%3A+', !2
         25        CONCAT                                           ~22     ~21, '%0A'
         26        ECHO                                                     ~22
   26    27      > JMP                                                      ->81
   31    28    >   INIT_FCALL                                               'json_decode'
         29        SEND_VAR                                                 !5
         30        SEND_VAL                                                 <true>
         31        DO_ICALL                                         $23     
         32        ASSIGN                                                   !6, $23
   32    33      > JMPZ                                                     !6, ->79
   33    34    >   ECHO                                                     '%3D%3D%3D+%E8%A7%A3%E6%9E%90%E5%90%8E%E7%9A%84%E7%BB%93%E6%9E%9C+%3D%3D%3D%0A'
   34    35        FETCH_DIM_R                                      ~25     !6, 'status'
         36        CONCAT                                           ~26     '%E7%8A%B6%E6%80%81%3A+', ~25
         37        CONCAT                                           ~27     ~26, '%0A'
         38        ECHO                                                     ~27
   35    39        FETCH_DIM_R                                      ~28     !6, 'code'
         40        CONCAT                                           ~29     '%E8%BF%94%E5%9B%9E%E7%A0%81%3A+', ~28
         41        CONCAT                                           ~30     ~29, '%0A'
         42        ECHO                                                     ~30
   36    43        FETCH_DIM_R                                      ~31     !6, 'msg'
         44        CONCAT                                           ~32     '%E6%B6%88%E6%81%AF%3A+', ~31
         45        CONCAT                                           ~33     ~32, '%0A'
         46        ECHO                                                     ~33
   37    47        ISSET_ISEMPTY_DIM_OBJ                         0          !6, 'data'
         48      > JMPZ                                                     ~34, ->76
   38    49    >   FETCH_DIM_R                                      ~35     !6, 'data'
         50        FETCH_DIM_R                                      ~36     ~35, 'domain'
         51        CONCAT                                           ~37     '%E5%9F%9F%E5%90%8D%3A+', ~36
         52        CONCAT                                           ~38     ~37, '%0A'
         53        ECHO                                                     ~38
   39    54        FETCH_DIM_R                                      ~39     !6, 'data'
         55        FETCH_DIM_R                                      ~40     ~39, 'blackListLevel'
         56        CONCAT                                           ~41     '%E9%BB%91%E5%90%8D%E5%8D%95%E7%AD%89%E7%BA%A7%3A+', ~40
         57        CONCAT                                           ~42     ~41, '+'
         58        ECHO                                                     ~42
   40    59        FETCH_DIM_R                                      ~43     !6, 'data'
         60        FETCH_DIM_R                                      ~44     ~43, 'blackListLevel'
   41    61        CASE                                                     ~44, 2
         62      > JMPNZ                                                    ~45, ->68
   42    63    >   CASE                                                     ~44, 0
         64      > JMPNZ                                                    ~45, ->70
   40    65    >   CASE                                                     ~44, -1
         66      > JMPNZ                                                    ~45, ->72
         67    > > JMP                                                      ->74
   41    68    >   ECHO                                                     '%28%E6%AD%A3%E5%B8%B8%E5%9F%9F%E5%90%8D%29%0A'
         69      > JMP                                                      ->75
   42    70    >   ECHO                                                     '%28%E5%B7%B2%E5%88%97%E5%85%A5%E9%BB%91%E5%90%8D%E5%8D%95%29%0A'
         71      > JMP                                                      ->75
   43    72    >   ECHO                                                     '%28%E7%8A%B6%E6%80%81%E6%9C%AA%E7%9F%A5%29%0A'
         73      > JMP                                                      ->75
   44    74    >   ECHO                                                     '%0A'
         75    >   FREE                                                     ~44
   47    76    >   ECHO                                                     '%0A%3D%3D%3D+%E5%8E%9F%E5%A7%8B+JSON+%3D%3D%3D%0A'
   48    77        ECHO                                                     !5
   32    78      > JMP                                                      ->81
   50    79    >   CONCAT                                           ~46     '%E5%8E%9F%E5%A7%8B%E8%BF%94%E5%9B%9E%E5%86%85%E5%AE%B9%3A%0A', !5
         80        ECHO                                                     ~46
   55    81    >   ASSIGN                                                   !0, 'c7b9a2de14b386f7a7dde163f2ecac98'
   56    82        ASSIGN                                                   !1, 'aizhan.com'
   59    83        ROPE_INIT                                     3  ~50     'https%3A%2F%2Fapistore.aizhan.com%2Ficp%2Fcheckdomain%2F'
         84        ROPE_ADD                                      1  ~50     ~50, !0
         85        ROPE_END                                      2  ~49     ~50, '%3Fdomain%3D'
         86        INIT_FCALL                                               'urlencode'
         87        SEND_VAR                                                 !1
         88        DO_ICALL                                         $52     
         89        CONCAT                                           ~53     ~49, $52
         90        ASSIGN                                                   !2, ~53
   62    91        ASSIGN                                                   !3, <array>
   74    92        INIT_FCALL                                               'stream_context_create'
         93        SEND_VAR                                                 !3
         94        DO_ICALL                                         $56     
         95        ASSIGN                                                   !4, $56
   75    96        INIT_FCALL                                               'file_get_contents'
         97        SEND_VAR                                                 !2
         98        SEND_VAL                                                 <false>
         99        SEND_VAR                                                 !4
        100        DO_ICALL                                         $58     
        101        ASSIGN                                                   !5, $58
   78   102        TYPE_CHECK                                    4          !5
        103      > JMPZ                                                     ~60, ->109
   79   104    >   ECHO                                                     '%E8%AF%B7%E6%B1%82%E5%A4%B1%E8%B4%A5%EF%BC%8C%E8%AF%B7%E6%A3%80%E6%9F%A5%E7%BD%91%E7%BB%9C%E6%88%96+URL+%E6%98%AF%E5%90%A6%E6%AD%A3%E7%A1%AE%E3%80%82%0A'
   80   105        CONCAT                                           ~61     '%E5%B0%9D%E8%AF%95%E8%AE%BF%E9%97%AE%E7%9A%84+URL%3A+', !2
        106        CONCAT                                           ~62     ~61, '%0A'
        107        ECHO                                                     ~62
   78   108      > JMP                                                      ->162
   83   109    >   INIT_FCALL                                               'json_decode'
        110        SEND_VAR                                                 !5
        111        SEND_VAL                                                 <true>
        112        DO_ICALL                                         $63     
        113        ASSIGN                                                   !6, $63
   84   114      > JMPZ                                                     !6, ->160
   85   115    >   ECHO                                                     '%3D%3D%3D+%E8%A7%A3%E6%9E%90%E5%90%8E%E7%9A%84%E7%BB%93%E6%9E%9C+%3D%3D%3D%0A'
   86   116        FETCH_DIM_R                                      ~65     !6, 'status'
        117        CONCAT                                           ~66     '%E7%8A%B6%E6%80%81%3A+', ~65
        118        CONCAT                                           ~67     ~66, '%0A'
        119        ECHO                                                     ~67
   87   120        FETCH_DIM_R                                      ~68     !6, 'code'
        121        CONCAT                                           ~69     '%E8%BF%94%E5%9B%9E%E7%A0%81%3A+', ~68
        122        CONCAT                                           ~70     ~69, '%0A'
        123        ECHO                                                     ~70
   88   124        FETCH_DIM_R                                      ~71     !6, 'msg'
        125        CONCAT                                           ~72     '%E6%B6%88%E6%81%AF%3A+', ~71
        126        CONCAT                                           ~73     ~72, '%0A'
        127        ECHO                                                     ~73
   89   128        ISSET_ISEMPTY_DIM_OBJ                         0          !6, 'data'
        129      > JMPZ                                                     ~74, ->157
   90   130    >   FETCH_DIM_R                                      ~75     !6, 'data'
        131        FETCH_DIM_R                                      ~76     ~75, 'domain'
        132        CONCAT                                           ~77     '%E5%9F%9F%E5%90%8D%3A+', ~76
        133        CONCAT                                           ~78     ~77, '%0A'
        134        ECHO                                                     ~78
   91   135        FETCH_DIM_R                                      ~79     !6, 'data'
        136        FETCH_DIM_R                                      ~80     ~79, 'blackListLevel'
        137        CONCAT                                           ~81     '%E9%BB%91%E5%90%8D%E5%8D%95%E7%AD%89%E7%BA%A7%3A+', ~80
        138        CONCAT                                           ~82     ~81, '+'
        139        ECHO                                                     ~82
   92   140        FETCH_DIM_R                                      ~83     !6, 'data'
        141        FETCH_DIM_R                                      ~84     ~83, 'blackListLevel'
   93   142        CASE                                                     ~84, 2
        143      > JMPNZ                                                    ~85, ->149
   94   144    >   CASE                                                     ~84, 0
        145      > JMPNZ                                                    ~85, ->151
   92   146    >   CASE                                                     ~84, -1
        147      > JMPNZ                                                    ~85, ->153
        148    > > JMP                                                      ->155
   93   149    >   ECHO                                                     '%28%E6%AD%A3%E5%B8%B8%E5%9F%9F%E5%90%8D%29%0A'
        150      > JMP                                                      ->156
   94   151    >   ECHO                                                     '%28%E5%B7%B2%E5%88%97%E5%85%A5%E9%BB%91%E5%90%8D%E5%8D%95%29%0A'
        152      > JMP                                                      ->156
   95   153    >   ECHO                                                     '%28%E7%8A%B6%E6%80%81%E6%9C%AA%E7%9F%A5%29%0A'
        154      > JMP                                                      ->156
   96   155    >   ECHO                                                     '%0A'
        156    >   FREE                                                     ~84
   99   157    >   ECHO                                                     '%0A%3D%3D%3D+%E5%8E%9F%E5%A7%8B+JSON+%3D%3D%3D%0A'
  100   158        ECHO                                                     !5
   84   159      > JMP                                                      ->162
  102   160    >   CONCAT                                           ~86     '%E5%8E%9F%E5%A7%8B%E8%BF%94%E5%9B%9E%E5%86%85%E5%AE%B9%3A%0A', !5
        161        ECHO                                                     ~86
  105   162    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
170.42 ms | 1410 KiB | 17 Q