A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"Hashtag": "as:Hashtag"
}
],
"id": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-05-18T19:09:29Z",
"url": "https://fosstodon.org/@jonathanmatthews/114530410130360490",
"attributedTo": "https://fosstodon.org/users/jonathanmatthews",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://fosstodon.org/users/jonathanmatthews/followers"
],
"sensitive": false,
"atomUri": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490",
"inReplyToAtomUri": null,
"conversation": "tag:fosstodon.org,2025-05-18:objectId=317385662:objectType=Conversation",
"content": "<p>EDIT: "ip netns exec" and "firejail" look like interesting options.</p><p>Here's a <a href=\"https://fosstodon.org/tags/Linux\" class=\"mention hashtag\" rel=\"tag\">#<span>Linux</span></a> <a href=\"https://fosstodon.org/tags/networking\" class=\"mention hashtag\" rel=\"tag\">#<span>networking</span></a> question for you: what's a lightweight way to allow an HTTP request to an arbitrary *user*-provided FQDN, but to prevent the connection being made if the FQDN maps to an RFC1918/private IP address?</p><p>(The relevant command here is <a href=\"https://fosstodon.org/tags/curl\" class=\"mention hashtag\" rel=\"tag\">#<span>curl</span></a>, but I don't think that matters as it doesn't appear to have a flag to say "only connect if the IP is /not/ inside these subnets".) <a href=\"https://fosstodon.org/tags/sysadmin\" class=\"mention hashtag\" rel=\"tag\">#<span>sysadmin</span></a> <a href=\"https://fosstodon.org/tags/devops\" class=\"mention hashtag\" rel=\"tag\">#<span>devops</span></a> <a href=\"https://fosstodon.org/tags/sre\" class=\"mention hashtag\" rel=\"tag\">#<span>sre</span></a> <a href=\"https://fosstodon.org/tags/systems\" class=\"mention hashtag\" rel=\"tag\">#<span>systems</span></a></p>",
"contentMap": {
"en": "<p>EDIT: "ip netns exec" and "firejail" look like interesting options.</p><p>Here's a <a href=\"https://fosstodon.org/tags/Linux\" class=\"mention hashtag\" rel=\"tag\">#<span>Linux</span></a> <a href=\"https://fosstodon.org/tags/networking\" class=\"mention hashtag\" rel=\"tag\">#<span>networking</span></a> question for you: what's a lightweight way to allow an HTTP request to an arbitrary *user*-provided FQDN, but to prevent the connection being made if the FQDN maps to an RFC1918/private IP address?</p><p>(The relevant command here is <a href=\"https://fosstodon.org/tags/curl\" class=\"mention hashtag\" rel=\"tag\">#<span>curl</span></a>, but I don't think that matters as it doesn't appear to have a flag to say "only connect if the IP is /not/ inside these subnets".) <a href=\"https://fosstodon.org/tags/sysadmin\" class=\"mention hashtag\" rel=\"tag\">#<span>sysadmin</span></a> <a href=\"https://fosstodon.org/tags/devops\" class=\"mention hashtag\" rel=\"tag\">#<span>devops</span></a> <a href=\"https://fosstodon.org/tags/sre\" class=\"mention hashtag\" rel=\"tag\">#<span>sre</span></a> <a href=\"https://fosstodon.org/tags/systems\" class=\"mention hashtag\" rel=\"tag\">#<span>systems</span></a></p>"
},
"updated": "2025-05-18T19:26:21Z",
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/linux",
"name": "#linux"
},
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/networking",
"name": "#networking"
},
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/curl",
"name": "#curl"
},
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/sysadmin",
"name": "#sysadmin"
},
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/devops",
"name": "#devops"
},
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/sre",
"name": "#sre"
},
{
"type": "Hashtag",
"href": "https://fosstodon.org/tags/systems",
"name": "#systems"
}
],
"replies": {
"id": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490/replies?only_other_accounts=true&page=true",
"partOf": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490/replies",
"items": []
}
},
"likes": {
"id": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490/likes",
"type": "Collection",
"totalItems": 3
},
"shares": {
"id": "https://fosstodon.org/users/jonathanmatthews/statuses/114530410130360490/shares",
"type": "Collection",
"totalItems": 1
}
}