# Check Browser If Hacker **POST /System/Hacker/IsHacker** This process looks at the public ip address of the remote web browser and determines if they are doing hacker related things or have in the past. This process returns an array of hacker information. *Secret Hmac Required. Cache Time 30 Seconds.* ## Servers - https://api.wrtm.io/v1.0: https://api.wrtm.io/v1.0 () - https://api.whyreadthemanual.com/v1.0: https://api.whyreadthemanual.com/v1.0 () - https://api.wereadthemanual.com/v1.0: https://api.wereadthemanual.com/v1.0 () ## Authentication methods - Authorization key & Authorization date & Authorization hmac ## Parameters ### Body: application/json (object) - **_SERVER** (object) Array of php $_SERVER variables. This can also be sent in headers if easier. Values passed are one of the following. If multiple are listed, the first valid value is used. * 'REQUEST_URI for the requested url from the browser (required) * 'X-Forwarded-Proto', 'HTTP_X_FORWARDED_PROTO', 'HTTPS' for remote being http or https (required if no http/https in request uri) * 'SCRIPT_NAME', 'PHP_SELF' for the script name opened (required) * 'HTTP_X_FORWARDED_FOR', 'HTTP_X_REAL_IP', 'REMOTE_ADDR' for remote address (required) * 'SERVER_ADDR' for server address (required) * 'SERVER_PORT' for server port * 'ServerName' for server name * 'HTTP_X_FORWARDED_HOST', 'X-Forwarded-Host', 'HTTP_HOST', 'SSL_TLS_SNI' for remote host * 'HTTP_REFERER', 'HTTP_FROM' for referring url * 'HTTP_USER_AGENT' is the user agent that called this * '_SVBalanced', 'HTTP_X_FORWARDED_PROTO' if called through a load balancer - **_GET** (object) Array of php $_GET variables. This can also be sent in headers if easier. Example is for ?abc&xyz=1 being passed. - **_POST** (object) Array of php $_POST variables. - **_COOKIE** (object) Array of php $_COOKIE variables. ## Responses ### 200 Remote browser is a hacker or not. Return values of arrays only return the full value if changed. Post processing required to update passed values and forwarding #### Body: application/json (object) - **RequestUri** (string) The web browser request uri - **Agent** (string) The reported web browser being used - **IsBot** (number) the display group id - **Port** (number) the browser port that was used - **_Command** (string) the resulting php script that was called - **_Get** (array[object]) if sent, the $_GET values passed should be replaced with these - **_Post** (array[object]) if sent, the $_POST values passed should be replaced with these - **_Cookie** (array[object]) if sent, the $_COOKIE values passed should be replaced with these - **_Request** (array[object]) if sent, the $_REQUEST values passed should be replaced with these - **_Soft** (array[object]) the various values sent in after having filtered items removed - **_AutoLogin** (number) if the appropriate values are included to automatically log in - **Sleep** (number) the number of seconds that php should sleep before proceeding - **Exit** (number) if we should exit the script without processing more - **_Forward** (string) the url we should forward to if needed - **Seconds** (number) how many seconds to wait before forwarding - **NoForward** (string) the reasons found to not forward - **_Headers** (array[object]) if sent, these headers should be sent [Powered by Bump.sh](https://bump.sh)