ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730", "type": "Note", "summary": null, "inReplyTo": null, "published": "2025-02-24T16:24:13Z", "url": "https://infosec.exchange/@AlexandreSieira/114059788507862730", "attributedTo": "https://infosec.exchange/users/AlexandreSieira", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/AlexandreSieira/followers", "https://infosec.exchange/users/sawaba", "https://infosec.exchange/users/TenchiSecurity" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2025-02-24:objectId=244963259:objectType=Conversation", "content": "<p>The second episode of the Alice in Supply Chains podcast is out!</p><p>This is a podcast where <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@sawaba\" class=\"u-url mention\">@<span>sawaba</span></a></span> and I discuss what we consider some of most important news related to Third-Party Cyber Risk Management from the previous month.</p><p>You can check it out on the major podcast platforms.</p><p>Youtube: <a href=\"https://www.youtube.com/watch?v=CMYDeb56FWs\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">youtube.com/watch?v=CMYDeb56FWs</span><span class=\"invisible\"></span></a></p><p>Spotify: <a href=\"https://open.spotify.com/episode/7qPB7IauZ1QGdmuczircB8?nd=1&amp;dlsi=7972d56c585442c6\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">open.spotify.com/episode/7qPB7</span><span class=\"invisible\">IauZ1QGdmuczircB8?nd=1&amp;dlsi=7972d56c585442c6</span></a></p><p>Apple Music: <a href=\"https://podcasts.apple.com/br/podcast/episode-2-february-2025/id1791990827?i=1000694446509\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">podcasts.apple.com/br/podcast/</span><span class=\"invisible\">episode-2-february-2025/id1791990827?i=1000694446509</span></a></p><p>Amazon Music: <a href=\"https://music.amazon.com.br/podcasts/baac01b9-a19b-4c3a-837b-637fad39be4d/alice-in-supply-chains\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">music.amazon.com.br/podcasts/b</span><span class=\"invisible\">aac01b9-a19b-4c3a-837b-637fad39be4d/alice-in-supply-chains</span></a></p><p>This is based on the longer monthly newsletter of the same name published by <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@TenchiSecurity\" class=\"u-url mention\">@<span>TenchiSecurity</span></a></span> on LinkedIN. You can find the latest edition at <a href=\"https://www.linkedin.com/pulse/issue-30-february-2025-tenchisecurity-aejkf/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">linkedin.com/pulse/issue-30-fe</span><span class=\"invisible\">bruary-2025-tenchisecurity-aejkf/</span></a></p><p><a href=\"https://infosec.exchange/tags/tprm\" class=\"mention hashtag\" rel=\"tag\">#<span>tprm</span></a> <a href=\"https://infosec.exchange/tags/tpcrm\" class=\"mention hashtag\" rel=\"tag\">#<span>tpcrm</span></a> <a href=\"https://infosec.exchange/tags/cyber\" class=\"mention hashtag\" rel=\"tag\">#<span>cyber</span></a> <a href=\"https://infosec.exchange/tags/risk\" class=\"mention hashtag\" rel=\"tag\">#<span>risk</span></a> <a href=\"https://infosec.exchange/tags/compliance\" class=\"mention hashtag\" rel=\"tag\">#<span>compliance</span></a> <a href=\"https://infosec.exchange/tags/management\" class=\"mention hashtag\" rel=\"tag\">#<span>management</span></a></p>", "contentMap": { "en": "<p>The second episode of the Alice in Supply Chains podcast is out!</p><p>This is a podcast where <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@sawaba\" class=\"u-url mention\">@<span>sawaba</span></a></span> and I discuss what we consider some of most important news related to Third-Party Cyber Risk Management from the previous month.</p><p>You can check it out on the major podcast platforms.</p><p>Youtube: <a href=\"https://www.youtube.com/watch?v=CMYDeb56FWs\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">youtube.com/watch?v=CMYDeb56FWs</span><span class=\"invisible\"></span></a></p><p>Spotify: <a href=\"https://open.spotify.com/episode/7qPB7IauZ1QGdmuczircB8?nd=1&amp;dlsi=7972d56c585442c6\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">open.spotify.com/episode/7qPB7</span><span class=\"invisible\">IauZ1QGdmuczircB8?nd=1&amp;dlsi=7972d56c585442c6</span></a></p><p>Apple Music: <a href=\"https://podcasts.apple.com/br/podcast/episode-2-february-2025/id1791990827?i=1000694446509\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">podcasts.apple.com/br/podcast/</span><span class=\"invisible\">episode-2-february-2025/id1791990827?i=1000694446509</span></a></p><p>Amazon Music: <a href=\"https://music.amazon.com.br/podcasts/baac01b9-a19b-4c3a-837b-637fad39be4d/alice-in-supply-chains\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">music.amazon.com.br/podcasts/b</span><span class=\"invisible\">aac01b9-a19b-4c3a-837b-637fad39be4d/alice-in-supply-chains</span></a></p><p>This is based on the longer monthly newsletter of the same name published by <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@TenchiSecurity\" class=\"u-url mention\">@<span>TenchiSecurity</span></a></span> on LinkedIN. You can find the latest edition at <a href=\"https://www.linkedin.com/pulse/issue-30-february-2025-tenchisecurity-aejkf/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">linkedin.com/pulse/issue-30-fe</span><span class=\"invisible\">bruary-2025-tenchisecurity-aejkf/</span></a></p><p><a href=\"https://infosec.exchange/tags/tprm\" class=\"mention hashtag\" rel=\"tag\">#<span>tprm</span></a> <a href=\"https://infosec.exchange/tags/tpcrm\" class=\"mention hashtag\" rel=\"tag\">#<span>tpcrm</span></a> <a href=\"https://infosec.exchange/tags/cyber\" class=\"mention hashtag\" rel=\"tag\">#<span>cyber</span></a> <a href=\"https://infosec.exchange/tags/risk\" class=\"mention hashtag\" rel=\"tag\">#<span>risk</span></a> <a href=\"https://infosec.exchange/tags/compliance\" class=\"mention hashtag\" rel=\"tag\">#<span>compliance</span></a> <a href=\"https://infosec.exchange/tags/management\" class=\"mention hashtag\" rel=\"tag\">#<span>management</span></a></p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/sawaba", "name": "@sawaba" }, { "type": "Mention", "href": "https://infosec.exchange/users/TenchiSecurity", "name": "@TenchiSecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/tprm", "name": "#tprm" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/tpcrm", "name": "#tpcrm" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cyber", "name": "#cyber" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/risk", "name": "#risk" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/compliance", "name": "#compliance" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/management", "name": "#management" } ], "replies": { "id": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730/likes", "type": "Collection", "totalItems": 2 }, "shares": { "id": "https://infosec.exchange/users/AlexandreSieira/statuses/114059788507862730/shares", "type": "Collection", "totalItems": 2 } }