You have to look closely at their personal information, such as their email, IP address and PC information. I can give you some clues - for example, a hacker is bound to have a strange IP address..