ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", "https://w3id.org/security/v1", { "manuallyApprovesFollowers": "as:manuallyApprovesFollowers", "toot": "http://joinmastodon.org/ns#", "featured": { "@id": "toot:featured", "@type": "@id" }, "featuredTags": { "@id": "toot:featuredTags", "@type": "@id" }, "alsoKnownAs": { "@id": "as:alsoKnownAs", "@type": "@id" }, "movedTo": { "@id": "as:movedTo", "@type": "@id" }, "schema": "http://schema.org#", "PropertyValue": "schema:PropertyValue", "value": "schema:value", "discoverable": "toot:discoverable", "suspended": "toot:suspended", "memorial": "toot:memorial", "indexable": "toot:indexable", "attributionDomains": { "@id": "toot:attributionDomains", "@type": "@id" }, "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" } } ], "id": "https://infosec.exchange/users/InfobloxThreatIntel", "type": "Person", "following": "https://infosec.exchange/users/InfobloxThreatIntel/following", "followers": "https://infosec.exchange/users/InfobloxThreatIntel/followers", "inbox": "https://infosec.exchange/users/InfobloxThreatIntel/inbox", "outbox": "https://infosec.exchange/users/InfobloxThreatIntel/outbox", "featured": "https://infosec.exchange/users/InfobloxThreatIntel/collections/featured", "featuredTags": "https://infosec.exchange/users/InfobloxThreatIntel/collections/tags", "preferredUsername": "InfobloxThreatIntel", "name": "Infoblox Threat Intel", "summary": "<p>This account is shared by Infoblox Threat Intel researchers. We analyze data and create algorithms to find malicious and suspicious domains and IPs, using DNS.</p>", "url": "https://infosec.exchange/@InfobloxThreatIntel", "manuallyApprovesFollowers": false, "discoverable": false, "indexable": false, "published": "2023-12-20T00:00:00Z", "memorial": false, "publicKey": { "id": "https://infosec.exchange/users/InfobloxThreatIntel#main-key", "owner": "https://infosec.exchange/users/InfobloxThreatIntel", "publicKeyPem": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1kEYNvN52D9V6PD+VVxS\nToKSvHopTDbZw74/3unkSc3AWyjKPbwQ8ETlEyj9MieVq1BRB1ZSe/uL69iUQdX3\nuPy/Lo0EnrmJeNjQwbhWD8C8SBRIXM5v7woCMLjob2iK66Rc48nV/EgD/Bp00cOg\nL8IGl5+frzt8jF5U/lGvnJRDeHJ7lKZn7lakFtA+QxTiImJNJSQEPjyaRhjoxSbB\n5wPRDtndARbOUG+i+Iio9fp9BtES+CGt/1LuTIHZJ+K5f4qclRGbUvwczfT+j2O2\n/bKj9xTmuyXUlIlEk2QhBeSiuBKwIOyUzHg3BWNTM5g6rY1SQqnlR2yRCXGt7MeD\nwwIDAQAB\n-----END PUBLIC KEY-----\n" }, "tag": [], "attachment": [ { "type": "PropertyValue", "name": "Prolific Puma Malicious Link Shortener", "value": "<a href=\"https://blogs.infoblox.com/cyber-threat-intelligence/prolific-puma-shadowy-link-shortening-service-enables-cybercrime/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/cyber-threa</span><span class=\"invisible\">t-intelligence/prolific-puma-shadowy-link-shortening-service-enables-cybercrime/</span></a>" }, { "type": "PropertyValue", "name": "Sitting Ducks DNS Attack", "value": "<a href=\"https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/threat-inte</span><span class=\"invisible\">lligence/who-knew-domain-hijacking-is-so-easy/</span></a>" }, { "type": "PropertyValue", "name": "Vigorish Viper China Organized Crime", "value": "<a href=\"https://insights.infoblox.com/resources-report/infoblox-report-vigorish-viper-a-venomous-bet\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">insights.infoblox.com/resource</span><span class=\"invisible\">s-report/infoblox-report-vigorish-viper-a-venomous-bet</span></a>" }, { "type": "PropertyValue", "name": "VexTrio Deploys New DNS TDS", "value": "<a href=\"https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/vextrio-deploys-dns-based-tds-server/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/cyber-threa</span><span class=\"invisible\">t-intelligence/cyber-threat-advisory/vextrio-deploys-dns-based-tds-server/</span></a>" }, { "type": "PropertyValue", "name": "Decoy Dog is No Ordinary Pupy", "value": "<a href=\"https://blogs.infoblox.com/cyber-threat-intelligence/decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/cyber-threa</span><span class=\"invisible\">t-intelligence/decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns/</span></a>" }, { "type": "PropertyValue", "name": "Infoblox Threat Intel", "value": "<a href=\"https://www.infoblox.com/threat-intel/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">infoblox.com/threat-intel/</span><span class=\"invisible\"></span></a>" } ], "endpoints": { "sharedInbox": "https://infosec.exchange/inbox" }, "icon": { "type": "Image", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/accounts/avatars/111/613/491/894/728/033/original/9b1aee375c334b3e.png" }, "image": { "type": "Image", "mediaType": "image/jpeg", "url": "https://media.infosec.exchange/infosec.exchange/accounts/headers/111/613/491/894/728/033/original/5e4707654935313b.jpg" } }