A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Emoji": "toot:Emoji",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
}
}
],
"id": "https://infosec.exchange/users/hatr/collections/featured",
"type": "OrderedCollection",
"totalItems": 1,
"orderedItems": [
{
"id": "https://infosec.exchange/users/hatr/statuses/109303009635499465",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T14:32:47Z",
"url": "https://infosec.exchange/@hatr/109303009635499465",
"attributedTo": "https://infosec.exchange/users/hatr",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/hatr/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/hatr/statuses/109303009635499465",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2022-11-07:objectId=20264662:objectType=Conversation",
"content": "<p>Re-sharing this over here because it might be of interest to the people on this instance (also, it's sort of an introduction :ablobcool:). </p><p>I recently gave a talk at the Virusbulletin-conference on how reporters find and fact-check stories on hacking incidents.</p><p>I'm talking about looking at PassiveDNS data to find relevant domains connected to ongoing hacking campaigns but also on re-discovering information that was made public years ago to connect it to a campaign that is still active. </p><p>Some of the answers might be obvious, others not so much (at least, that's what I was aiming for.) </p><p>The talk is titled: "Why are you telling me this?" and all I'm doing is to answer that question for 40 minutes </p><p><a href=\"https://www.youtube.com/watch?v=rtlTF1Ajjdw\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">youtube.com/watch?v=rtlTF1Ajjdw</span><span class=\"invisible\"></span></a></p><p>(I have posted this yesterday, but just now saw (I think!) that I've sent it to just myself, it popped up in my DMs. STILL LEARNING! Apologies if this shows up twice.)</p>",
"contentMap": {
"en": "<p>Re-sharing this over here because it might be of interest to the people on this instance (also, it's sort of an introduction :ablobcool:). </p><p>I recently gave a talk at the Virusbulletin-conference on how reporters find and fact-check stories on hacking incidents.</p><p>I'm talking about looking at PassiveDNS data to find relevant domains connected to ongoing hacking campaigns but also on re-discovering information that was made public years ago to connect it to a campaign that is still active. </p><p>Some of the answers might be obvious, others not so much (at least, that's what I was aiming for.) </p><p>The talk is titled: "Why are you telling me this?" and all I'm doing is to answer that question for 40 minutes </p><p><a href=\"https://www.youtube.com/watch?v=rtlTF1Ajjdw\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">youtube.com/watch?v=rtlTF1Ajjdw</span><span class=\"invisible\"></span></a></p><p>(I have posted this yesterday, but just now saw (I think!) that I've sent it to just myself, it popped up in my DMs. STILL LEARNING! Apologies if this shows up twice.)</p>"
},
"attachment": [],
"tag": [
{
"id": "https://infosec.exchange/emojis/29047",
"type": "Emoji",
"name": ":ablobcool:",
"updated": "2018-11-25T18:35:15Z",
"icon": {
"type": "Image",
"mediaType": "image/png",
"url": "https://media.infosec.exchange/infosec.exchange/custom_emojis/images/000/029/047/original/c722ec7f805ca24f.png"
}
}
],
"replies": {
"id": "https://infosec.exchange/users/hatr/statuses/109303009635499465/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/hatr/statuses/109303009635499465/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/hatr/statuses/109303009635499465/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/hatr/statuses/109303009635499465/likes",
"type": "Collection",
"totalItems": 20
},
"shares": {
"id": "https://infosec.exchange/users/hatr/statuses/109303009635499465/shares",
"type": "Collection",
"totalItems": 5
}
}
]
}