See If Remote Browser Is A Hacker
This process looks at the public ip address of the remote web browser and determines if they are doing hacker related things or have in the past. This process returns an array of hacker information. Secret Hmac Required. Cache Time 30 Seconds.
Body
-
Array of php $_SERVER variables. This can also be sent in headers if easier. Values passed are one of the following. If multiple are listed, the first valid value is used.
- 'REQUEST_URI for the requested url from the browser (required)
- 'X-Forwarded-Proto', 'HTTP_X_FORWARDED_PROTO', 'HTTPS' for remote being http or https (required if no http/https in request uri)
- 'SCRIPT_NAME', 'PHP_SELF' for the script name opened (required)
- 'HTTP_X_FORWARDED_FOR', 'HTTP_X_REAL_IP', 'REMOTE_ADDR' for remote address (required)
- 'SERVER_ADDR' for server address (required)
- 'SERVER_PORT' for server port
- 'ServerName' for server name
- 'HTTP_X_FORWARDED_HOST', 'X-Forwarded-Host', 'HTTP_HOST', 'SSL_TLS_SNI' for remote host
- 'HTTP_REFERER', 'HTTP_FROM' for referring url
- 'HTTP_USER_AGENT' is the user agent that called this
- '_SVBalanced', 'HTTP_X_FORWARDED_PROTO' if called through a load balancer
-
Array of php $_GET variables. This can also be sent in headers if easier. Example is for ?abc&xyz=1 being passed.
-
Array of php $_POST variables.
POST
/System/Hacker/IsHacker
curl \
--request POST 'https://wapi.strandvision.com/v1.0/System/Hacker/IsHacker' \
--header "X-ApiKey: $API_KEY" \
--header "Authorization: X-apidate $ACCESS_TOKEN" \
--header "Authorization: X-apihmac $ACCESS_TOKEN" \
--header "Content-Type: application/json" \
--data '{"_SERVER":{"https":"On","Remote_Addr":"192.168.200.154","Request_Uri":"https://www.wrtm.io/","Script_Name":"index.php","Http_User_Agent":"Chrome"},"_GET":{"abc":"","xyz":1},"_POST":{},"_COOKIE":{}}'
Request examples
{
"_SERVER": {
"https": "On",
"Remote_Addr": "192.168.200.154",
"Request_Uri": "https://www.wrtm.io/",
"Script_Name": "index.php",
"Http_User_Agent": "Chrome"
},
"_GET": {
"abc": "",
"xyz": 1
},
"_POST": {},
"_COOKIE": {}
}
Response examples (200)
[
{
"Exit": 0,
"_Get": {
"abc": "",
"xyz": "123"
},
"port": 443,
"Sleep": 2,
"_Post": null,
"agent": "Chrome",
"isbot": 0,
"Foward": "",
"Seconds": 0,
"_Cookie": {
"username": "mike"
},
"_Headers": null,
"_Request": {
"abc": "",
"xyz": "123",
"username": "mike"
},
"_command": "index.php",
"NoForward": "logged in",
"RequestUri": "https://wrtm.io/?abc&xyz=1",
"_AutoLogin": 0,
"_SoftValues": {
"abc": "",
"xyz": "123"
}
}
]