Decrypt the payload content
Use the matched-data-cli tool to decrypt a payload in the command line.
- 
Download ↗ the
matched-data-clitool for your platform from the Releases page on GitHub, under Assets. - 
Extract the content of the downloaded
.tar.gzfile to a local folder. - 
Open a command line window and change to the local folder containing the
matched-data-clibinary.Terminal window cd matched-data-cli - 
Create two files: one with your private key and another one with the encrypted payload:
Terminal window printf "<PRIVATE_KEY>" > private_key.txt && chmod 400 private_key.txtprintf "<ENCRYPTED_PAYLOAD>" > encrypted_payload.txtReplace
<PRIVATE_KEY>with your private key and<ENCRYPTED_PAYLOAD>with the encrypted payload.Note: The first
printfcommand will make your private key visible in your command history. - 
Run the following command to decrypt the payload:
Terminal window decrypt -k private_key.txt encrypted_payload.txt 
The following example creates two files — one with the private key and another one with the encrypted payload — and runs the matched-data-cli tool to decrypt the payload in the encrypted_payload.txt file:
~ cd matched-data-cli
printf "uBS5eBttHrqkdY41kbZPdvYnNz8Vj0TvKIUpjB1y/GA=" > private_key.txt && chmod 400 private_key.txt
printf "AzTY6FHajXYXuDMUte82wrd+1n5CEHPoydYiyd3FMg5IEQAAAAAAAAA0lOhGXBclw8pWU5jbbYuepSIJN5JohTtZekLliJBlVWk=" > encrypted_payload.txt
decrypt -k private_key.txt encrypted_payload.txttest matched dataWas this helpful?
- Resources
 - API
 - New to Cloudflare?
 - Directory
 - Sponsorships
 - Open Source
 
- Support
 - Help Center
 - System Status
 - Compliance
 - GDPR
 
- Company
 - cloudflare.com
 - Our team
 - Careers
 
- © 2025 Cloudflare, Inc.
 - Privacy Policy
 - Terms of Use
 - Report Security Issues
 - Trademark