A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/screaminggoat/statuses/113589903472294678",
"published": "2024-12-03T18:27:27Z",
"url": "https://infosec.exchange/@screaminggoat/113590301352371973",
"attributedTo": "https://infosec.exchange/users/screaminggoat",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/screaminggoat/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973",
"inReplyToAtomUri": "https://infosec.exchange/users/screaminggoat/statuses/113589903472294678",
"conversation": "tag:infosec.exchange,2024-12-03:objectId=218852443:objectType=Conversation",
"content": "<p><strong>FBI</strong>: <a href=\"https://www.ic3.gov/CSA/2024/241203.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a> (PDF)<br>FBI hosted their own copy of the security guidance. FBI, CISA, and partners encourage network defenders and engineers of communications infrastructure, and other critical infrastructure organizations with on-premises enterprise equipment, to review and apply the provided best practices, including patching vulnerable devices and services, to reduce opportunities for intrusion (by People's Republic of China (PRC)-affiliated threat actors).</p><p><a href=\"https://infosec.exchange/tags/china\" class=\"mention hashtag\" rel=\"tag\">#<span>china</span></a> <a href=\"https://infosec.exchange/tags/cyberespionage\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberespionage</span></a> <a href=\"https://infosec.exchange/tags/cisa\" class=\"mention hashtag\" rel=\"tag\">#<span>cisa</span></a> <a href=\"https://infosec.exchange/tags/fbi\" class=\"mention hashtag\" rel=\"tag\">#<span>fbi</span></a> <a href=\"https://infosec.exchange/tags/nsa\" class=\"mention hashtag\" rel=\"tag\">#<span>nsa</span></a> <a href=\"https://infosec.exchange/tags/cccs\" class=\"mention hashtag\" rel=\"tag\">#<span>cccs</span></a> <a href=\"https://infosec.exchange/tags/ncscnz\" class=\"mention hashtag\" rel=\"tag\">#<span>ncscnz</span></a> <a href=\"https://infosec.exchange/tags/acsc\" class=\"mention hashtag\" rel=\"tag\">#<span>acsc</span></a> <a href=\"https://infosec.exchange/tags/salttyphoon\" class=\"mention hashtag\" rel=\"tag\">#<span>salttyphoon</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/cyberthreatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberthreatintelligence</span></a> <a href=\"https://infosec.exchange/tags/CTI\" class=\"mention hashtag\" rel=\"tag\">#<span>CTI</span></a></p>",
"contentMap": {
"en": "<p><strong>FBI</strong>: <a href=\"https://www.ic3.gov/CSA/2024/241203.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a> (PDF)<br>FBI hosted their own copy of the security guidance. FBI, CISA, and partners encourage network defenders and engineers of communications infrastructure, and other critical infrastructure organizations with on-premises enterprise equipment, to review and apply the provided best practices, including patching vulnerable devices and services, to reduce opportunities for intrusion (by People's Republic of China (PRC)-affiliated threat actors).</p><p><a href=\"https://infosec.exchange/tags/china\" class=\"mention hashtag\" rel=\"tag\">#<span>china</span></a> <a href=\"https://infosec.exchange/tags/cyberespionage\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberespionage</span></a> <a href=\"https://infosec.exchange/tags/cisa\" class=\"mention hashtag\" rel=\"tag\">#<span>cisa</span></a> <a href=\"https://infosec.exchange/tags/fbi\" class=\"mention hashtag\" rel=\"tag\">#<span>fbi</span></a> <a href=\"https://infosec.exchange/tags/nsa\" class=\"mention hashtag\" rel=\"tag\">#<span>nsa</span></a> <a href=\"https://infosec.exchange/tags/cccs\" class=\"mention hashtag\" rel=\"tag\">#<span>cccs</span></a> <a href=\"https://infosec.exchange/tags/ncscnz\" class=\"mention hashtag\" rel=\"tag\">#<span>ncscnz</span></a> <a href=\"https://infosec.exchange/tags/acsc\" class=\"mention hashtag\" rel=\"tag\">#<span>acsc</span></a> <a href=\"https://infosec.exchange/tags/salttyphoon\" class=\"mention hashtag\" rel=\"tag\">#<span>salttyphoon</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/cyberthreatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberthreatintelligence</span></a> <a href=\"https://infosec.exchange/tags/CTI\" class=\"mention hashtag\" rel=\"tag\">#<span>CTI</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/china",
"name": "#china"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberespionage",
"name": "#cyberespionage"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cisa",
"name": "#cisa"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/fbi",
"name": "#fbi"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/nsa",
"name": "#nsa"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cccs",
"name": "#cccs"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ncscnz",
"name": "#ncscnz"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/acsc",
"name": "#acsc"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/salttyphoon",
"name": "#salttyphoon"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threatintel",
"name": "#threatintel"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberthreatintelligence",
"name": "#cyberthreatintelligence"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cti",
"name": "#cti"
}
],
"replies": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973/replies?min_id=113590308562550002&page=true",
"partOf": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973/replies",
"items": [
"https://infosec.exchange/users/screaminggoat/statuses/113590308562550002"
]
}
},
"likes": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973/likes",
"type": "Collection",
"totalItems": 6
},
"shares": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973/shares",
"type": "Collection",
"totalItems": 2
}
}