Example searches: “https://api.wrtm.io/v1.0”, “API Read”, “Show API Log”, “List Servers”, “200”
The System Hacker endpoints are used to detect if a public browser, robot or program is abusing the system with automatic lockout. Hackers can also be removed if necessary.