ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/adulau/statuses/112699166062272421", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-06-29T09:20:02Z", "url": "https://infosec.exchange/@adulau/112699166062272421", "attributedTo": "https://infosec.exchange/users/adulau", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/adulau/followers", "https://misp-community.org/users/misp" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/adulau/statuses/112699166062272421", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-06-29:objectId=171577209:objectType=Conversation", "content": "<p>The Analyst Data has been integrated into the MISP core standard format, enabling analysts to express opinions, notes, and relationships within any element of the MISP standard format. This extension is available to all analysts and is backward compatible with the MISP core standard format.</p><p>If you are running MISP, it's available in the latest version.</p><p>🔗 <a href=\"https://www.misp-standard.org/rfc/misp-standard-core.html#name-analyst-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">misp-standard.org/rfc/misp-sta</span><span class=\"invisible\">ndard-core.html#name-analyst-data</span></a></p><p><a href=\"https://infosec.exchange/tags/misp\" class=\"mention hashtag\" rel=\"tag\">#<span>misp</span></a> <a href=\"https://infosec.exchange/tags/threatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintelligence</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/dfir\" class=\"mention hashtag\" rel=\"tag\">#<span>dfir</span></a> <a href=\"https://infosec.exchange/tags/informationsharing\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsharing</span></a> </p><p><span class=\"h-card\" translate=\"no\"><a href=\"https://misp-community.org/@misp\" class=\"u-url mention\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@<span>misp</span></a></span></p>", "contentMap": { "en": "<p>The Analyst Data has been integrated into the MISP core standard format, enabling analysts to express opinions, notes, and relationships within any element of the MISP standard format. This extension is available to all analysts and is backward compatible with the MISP core standard format.</p><p>If you are running MISP, it's available in the latest version.</p><p>🔗 <a href=\"https://www.misp-standard.org/rfc/misp-standard-core.html#name-analyst-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">misp-standard.org/rfc/misp-sta</span><span class=\"invisible\">ndard-core.html#name-analyst-data</span></a></p><p><a href=\"https://infosec.exchange/tags/misp\" class=\"mention hashtag\" rel=\"tag\">#<span>misp</span></a> <a href=\"https://infosec.exchange/tags/threatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintelligence</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/dfir\" class=\"mention hashtag\" rel=\"tag\">#<span>dfir</span></a> <a href=\"https://infosec.exchange/tags/informationsharing\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsharing</span></a> </p><p><span class=\"h-card\" translate=\"no\"><a href=\"https://misp-community.org/@misp\" class=\"u-url mention\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@<span>misp</span></a></span></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/112/699/140/901/396/464/original/386cd741c6d390ee.png", "name": "Analyst Data are objects that can take different forms within the MISP format, including objects, attributes, events, or detached formats from the MISP core. They can express an Opinion, Note, or a Relationship from an analyst. These three types define the key components of analyst data and can be applied at various levels within the data structure. Analyst data can also be nested to provide additional complementary analysis on itself.", "blurhash": "U7SigR9D-=~qWBWBWCj[xtofRjM{j]j?ayWB", "focalPoint": [ 0, 0 ], "width": 1507, "height": 1071 }, { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/112/699/161/873/685/777/original/93f25d41f2e903c1.png", "name": "An opinion example on a MISP event expressed with the new format. ", "blurhash": "UZQ9_^n#ozR-9EM|oKoJ9FNGWBof00n}W=oz", "focalPoint": [ 0, 0 ], "width": 1495, "height": 988 } ], "tag": [ { "type": "Mention", "href": "https://misp-community.org/users/misp", "name": "@misp@misp-community.org" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/misp", "name": "#misp" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/threatintelligence", "name": "#threatintelligence" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/threatintel", "name": "#threatintel" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/dfir", "name": "#dfir" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/informationsharing", "name": "#informationsharing" } ], "replies": { "id": "https://infosec.exchange/users/adulau/statuses/112699166062272421/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/adulau/statuses/112699166062272421/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/adulau/statuses/112699166062272421/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/adulau/statuses/112699166062272421/likes", "type": "Collection", "totalItems": 8 }, "shares": { "id": "https://infosec.exchange/users/adulau/statuses/112699166062272421/shares", "type": "Collection", "totalItems": 9 } }