A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
"https://w3id.org/security/v1",
{
"manuallyApprovesFollowers": "as:manuallyApprovesFollowers",
"toot": "http://joinmastodon.org/ns#",
"featured": {
"@id": "toot:featured",
"@type": "@id"
},
"featuredTags": {
"@id": "toot:featuredTags",
"@type": "@id"
},
"alsoKnownAs": {
"@id": "as:alsoKnownAs",
"@type": "@id"
},
"movedTo": {
"@id": "as:movedTo",
"@type": "@id"
},
"schema": "http://schema.org#",
"PropertyValue": "schema:PropertyValue",
"value": "schema:value",
"discoverable": "toot:discoverable",
"suspended": "toot:suspended",
"memorial": "toot:memorial",
"indexable": "toot:indexable",
"attributionDomains": {
"@id": "toot:attributionDomains",
"@type": "@id"
},
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
}
}
],
"id": "https://infosec.exchange/users/InfobloxThreatIntel",
"type": "Person",
"following": "https://infosec.exchange/users/InfobloxThreatIntel/following",
"followers": "https://infosec.exchange/users/InfobloxThreatIntel/followers",
"inbox": "https://infosec.exchange/users/InfobloxThreatIntel/inbox",
"outbox": "https://infosec.exchange/users/InfobloxThreatIntel/outbox",
"featured": "https://infosec.exchange/users/InfobloxThreatIntel/collections/featured",
"featuredTags": "https://infosec.exchange/users/InfobloxThreatIntel/collections/tags",
"preferredUsername": "InfobloxThreatIntel",
"name": "Infoblox Threat Intel",
"summary": "<p>This account is shared by Infoblox Threat Intel researchers. We analyze data and create algorithms to find malicious and suspicious domains and IPs, using DNS.</p>",
"url": "https://infosec.exchange/@InfobloxThreatIntel",
"manuallyApprovesFollowers": false,
"discoverable": false,
"indexable": false,
"published": "2023-12-20T00:00:00Z",
"memorial": false,
"publicKey": {
"id": "https://infosec.exchange/users/InfobloxThreatIntel#main-key",
"owner": "https://infosec.exchange/users/InfobloxThreatIntel",
"publicKeyPem": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1kEYNvN52D9V6PD+VVxS\nToKSvHopTDbZw74/3unkSc3AWyjKPbwQ8ETlEyj9MieVq1BRB1ZSe/uL69iUQdX3\nuPy/Lo0EnrmJeNjQwbhWD8C8SBRIXM5v7woCMLjob2iK66Rc48nV/EgD/Bp00cOg\nL8IGl5+frzt8jF5U/lGvnJRDeHJ7lKZn7lakFtA+QxTiImJNJSQEPjyaRhjoxSbB\n5wPRDtndARbOUG+i+Iio9fp9BtES+CGt/1LuTIHZJ+K5f4qclRGbUvwczfT+j2O2\n/bKj9xTmuyXUlIlEk2QhBeSiuBKwIOyUzHg3BWNTM5g6rY1SQqnlR2yRCXGt7MeD\nwwIDAQAB\n-----END PUBLIC KEY-----\n"
},
"tag": [],
"attachment": [
{
"type": "PropertyValue",
"name": "Prolific Puma Malicious Link Shortener",
"value": "<a href=\"https://blogs.infoblox.com/cyber-threat-intelligence/prolific-puma-shadowy-link-shortening-service-enables-cybercrime/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/cyber-threa</span><span class=\"invisible\">t-intelligence/prolific-puma-shadowy-link-shortening-service-enables-cybercrime/</span></a>"
},
{
"type": "PropertyValue",
"name": "Sitting Ducks DNS Attack",
"value": "<a href=\"https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/threat-inte</span><span class=\"invisible\">lligence/who-knew-domain-hijacking-is-so-easy/</span></a>"
},
{
"type": "PropertyValue",
"name": "Vigorish Viper China Organized Crime",
"value": "<a href=\"https://insights.infoblox.com/resources-report/infoblox-report-vigorish-viper-a-venomous-bet\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">insights.infoblox.com/resource</span><span class=\"invisible\">s-report/infoblox-report-vigorish-viper-a-venomous-bet</span></a>"
},
{
"type": "PropertyValue",
"name": "VexTrio Deploys New DNS TDS",
"value": "<a href=\"https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/vextrio-deploys-dns-based-tds-server/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/cyber-threa</span><span class=\"invisible\">t-intelligence/cyber-threat-advisory/vextrio-deploys-dns-based-tds-server/</span></a>"
},
{
"type": "PropertyValue",
"name": "Decoy Dog is No Ordinary Pupy",
"value": "<a href=\"https://blogs.infoblox.com/cyber-threat-intelligence/decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blogs.infoblox.com/cyber-threa</span><span class=\"invisible\">t-intelligence/decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns/</span></a>"
},
{
"type": "PropertyValue",
"name": "Infoblox Threat Intel",
"value": "<a href=\"https://www.infoblox.com/threat-intel/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">infoblox.com/threat-intel/</span><span class=\"invisible\"></span></a>"
}
],
"endpoints": {
"sharedInbox": "https://infosec.exchange/inbox"
},
"icon": {
"type": "Image",
"mediaType": "image/png",
"url": "https://media.infosec.exchange/infosec.exchange/accounts/avatars/111/613/491/894/728/033/original/9b1aee375c334b3e.png"
},
"image": {
"type": "Image",
"mediaType": "image/jpeg",
"url": "https://media.infosec.exchange/infosec.exchange/accounts/headers/111/613/491/894/728/033/original/5e4707654935313b.jpg"
}
}