A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-11T19:03:06Z",
"url": "https://infosec.exchange/@m_rothe/113465870688854802",
"attributedTo": "https://infosec.exchange/users/m_rothe",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/m_rothe/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-11:objectId=212104675:objectType=Conversation",
"content": "<p>Anyone seeing a significant uptick in SSLVPN brute force (specifically fortigate) in the last 24h? Looks like cred stuffing with some fairly targeted usernames but can't see them in any public breaches. Observed against multiple UK companies in different industry verticals. <br />Greynoise shows the source IPs from Russia and Latvia hitting various alt-https ports (4443, 8443,9433) <a href=\"https://infosec.exchange/tags/ThreatIntel\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntel</span></a> <a href=\"https://infosec.exchange/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://infosec.exchange/tags/fortigate\" class=\"mention hashtag\" rel=\"tag\">#<span>fortigate</span></a> <a href=\"https://infosec.exchange/tags/blueteam\" class=\"mention hashtag\" rel=\"tag\">#<span>blueteam</span></a></p>",
"contentMap": {
"en": "<p>Anyone seeing a significant uptick in SSLVPN brute force (specifically fortigate) in the last 24h? Looks like cred stuffing with some fairly targeted usernames but can't see them in any public breaches. Observed against multiple UK companies in different industry verticals. <br />Greynoise shows the source IPs from Russia and Latvia hitting various alt-https ports (4443, 8443,9433) <a href=\"https://infosec.exchange/tags/ThreatIntel\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntel</span></a> <a href=\"https://infosec.exchange/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://infosec.exchange/tags/fortigate\" class=\"mention hashtag\" rel=\"tag\">#<span>fortigate</span></a> <a href=\"https://infosec.exchange/tags/blueteam\" class=\"mention hashtag\" rel=\"tag\">#<span>blueteam</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threatintel",
"name": "#threatintel"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threatintelligence",
"name": "#threatintelligence"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/fortigate",
"name": "#fortigate"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/blueteam",
"name": "#blueteam"
}
],
"replies": {
"id": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802/likes",
"type": "Collection",
"totalItems": 5
},
"shares": {
"id": "https://infosec.exchange/users/m_rothe/statuses/113465870688854802/shares",
"type": "Collection",
"totalItems": 3
}
}