GET /System/Hacker/List

Read the list of endpoints available for the System Hacker functions with a brief description of each and the last modified date. Secret Hmac Optional. Cache Time 1 Day.

Responses

  • 200 application/json

    List successfully created

    Hide response attributes Show response attributes object
    • summary string

      The summary of the API group

    • modified string

      Last udpate date of this API

    • operations array[object]
      Hide operations attributes Show operations attributes object
      • endpoint string

        The endpoint to call

      • description string

        The description of the endpoint

      • doc string

        public documentation URL

GET /System/Hacker/List
curl \
 --request GET 'https://api.wereadthemanual.com/v1.0/System/Hacker/List' \
 --header "X-ApiKey: $API_KEY"
Response examples (200)
{
  "summary": "Read information about the System Hacker Endpoints",
  "modified": "Fri, 12 May 2023 18:16:02 GMT",
  "operations": [
    {
      "doc": "https://apidoc.wrtm.io/operation/operation-get-system-hacker-list",
      "endpoint": "/System/Hacker/List",
      "description": "List all functions for System/Hacker/*"
    },
    {
      "doc": "https://apidoc.wrtm.io/operation/operation-get-system-hacker-ishacker",
      "endpoint": "/System/Hacker/IsHacker",
      "description": "Return if this user is already blocked as a hacker"
    },
    {
      "doc": "https://apidoc.wrtm.io/operation/operation-get-system-hacker-hackdetails",
      "endpoint": "/System/Hacker/HackDetails",
      "description": "Return hacker details for this ip address"
    },
    {
      "doc": "https://apidoc.wrtm.io/operation/operation-get-system-hacker-sethack",
      "endpoint": "/System/Hacker/SetHack",
      "description": "Set this ip address as a hacker preventing further access for a day"
    },
    {
      "doc": "https://apidoc.wrtm.io/operation/operation-get-system-hacker-clearhack",
      "endpoint": "/System/Hacker/ClearHack",
      "description": "Removes this ip address from the hacker list if they are there"
    }
  ]
}