ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002", "type": "Note", "summary": null, "inReplyTo": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973", "published": "2024-12-03T18:29:17Z", "url": "https://infosec.exchange/@screaminggoat/113590308562550002", "attributedTo": "https://infosec.exchange/users/screaminggoat", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/screaminggoat/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002", "inReplyToAtomUri": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973", "conversation": "tag:infosec.exchange,2024-12-03:objectId=218852443:objectType=Conversation", "content": "<p><strong>NSA</strong>: <a href=\"https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3982793/guidance-urges-visibility-and-device-hardening-against-prc-affiliated-threat-ac/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Guidance Urges Visibility and Device Hardening against PRC-Affiliated Threat Actor</a><br>Cybersecurity Information Sheet (CSI), \"<a href=\"https://media.defense.gov/2024/Dec/03/2003596322/-1/-1/0/JOINT-GUIDANCE-ENHANCED-VISIBILITY-HARDENING-GUIDE-FOR-COMMS-INFRASTRUCTURE.PDF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a>,\" (PDF) provides defensive measures to strengthen visibility – detailed insight into network traffic, user activity, and data flow – for engineers and system administrators overseeing communications infrastructure. The guidance may also be applicable to organizations with on-premises enterprise equipment. The CSI also covers hardening of devices and network architecture to limit potential entry points for this type of cyber threat.</p><blockquote><p>The CSI also notes specific hardening best practices for Cisco operating systems, which were targeted by the PRC-affiliated threat actor.</p></blockquote><p><a href=\"https://infosec.exchange/tags/china\" class=\"mention hashtag\" rel=\"tag\">#<span>china</span></a> <a href=\"https://infosec.exchange/tags/cyberespionage\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberespionage</span></a> <a href=\"https://infosec.exchange/tags/cisa\" class=\"mention hashtag\" rel=\"tag\">#<span>cisa</span></a> <a href=\"https://infosec.exchange/tags/fbi\" class=\"mention hashtag\" rel=\"tag\">#<span>fbi</span></a> <a href=\"https://infosec.exchange/tags/nsa\" class=\"mention hashtag\" rel=\"tag\">#<span>nsa</span></a> <a href=\"https://infosec.exchange/tags/cccs\" class=\"mention hashtag\" rel=\"tag\">#<span>cccs</span></a> <a href=\"https://infosec.exchange/tags/ncscnz\" class=\"mention hashtag\" rel=\"tag\">#<span>ncscnz</span></a> <a href=\"https://infosec.exchange/tags/acsc\" class=\"mention hashtag\" rel=\"tag\">#<span>acsc</span></a> <a href=\"https://infosec.exchange/tags/salttyphoon\" class=\"mention hashtag\" rel=\"tag\">#<span>salttyphoon</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/cyberthreatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberthreatintelligence</span></a> <a href=\"https://infosec.exchange/tags/CTI\" class=\"mention hashtag\" rel=\"tag\">#<span>CTI</span></a></p>", "contentMap": { "en": "<p><strong>NSA</strong>: <a href=\"https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3982793/guidance-urges-visibility-and-device-hardening-against-prc-affiliated-threat-ac/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Guidance Urges Visibility and Device Hardening against PRC-Affiliated Threat Actor</a><br>Cybersecurity Information Sheet (CSI), \"<a href=\"https://media.defense.gov/2024/Dec/03/2003596322/-1/-1/0/JOINT-GUIDANCE-ENHANCED-VISIBILITY-HARDENING-GUIDE-FOR-COMMS-INFRASTRUCTURE.PDF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a>,\" (PDF) provides defensive measures to strengthen visibility – detailed insight into network traffic, user activity, and data flow – for engineers and system administrators overseeing communications infrastructure. The guidance may also be applicable to organizations with on-premises enterprise equipment. The CSI also covers hardening of devices and network architecture to limit potential entry points for this type of cyber threat.</p><blockquote><p>The CSI also notes specific hardening best practices for Cisco operating systems, which were targeted by the PRC-affiliated threat actor.</p></blockquote><p><a href=\"https://infosec.exchange/tags/china\" class=\"mention hashtag\" rel=\"tag\">#<span>china</span></a> <a href=\"https://infosec.exchange/tags/cyberespionage\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberespionage</span></a> <a href=\"https://infosec.exchange/tags/cisa\" class=\"mention hashtag\" rel=\"tag\">#<span>cisa</span></a> <a href=\"https://infosec.exchange/tags/fbi\" class=\"mention hashtag\" rel=\"tag\">#<span>fbi</span></a> <a href=\"https://infosec.exchange/tags/nsa\" class=\"mention hashtag\" rel=\"tag\">#<span>nsa</span></a> <a href=\"https://infosec.exchange/tags/cccs\" class=\"mention hashtag\" rel=\"tag\">#<span>cccs</span></a> <a href=\"https://infosec.exchange/tags/ncscnz\" class=\"mention hashtag\" rel=\"tag\">#<span>ncscnz</span></a> <a href=\"https://infosec.exchange/tags/acsc\" class=\"mention hashtag\" rel=\"tag\">#<span>acsc</span></a> <a href=\"https://infosec.exchange/tags/salttyphoon\" class=\"mention hashtag\" rel=\"tag\">#<span>salttyphoon</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/cyberthreatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberthreatintelligence</span></a> <a href=\"https://infosec.exchange/tags/CTI\" class=\"mention hashtag\" rel=\"tag\">#<span>CTI</span></a></p>" }, "updated": "2024-12-03T18:29:56Z", "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/china", "name": "#china" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cyberespionage", "name": "#cyberespionage" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cisa", "name": "#cisa" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/fbi", "name": "#fbi" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/nsa", "name": "#nsa" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cccs", "name": "#cccs" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/ncscnz", "name": "#ncscnz" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/acsc", "name": "#acsc" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/salttyphoon", "name": "#salttyphoon" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/threatintel", "name": "#threatintel" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cyberthreatintelligence", "name": "#cyberthreatintelligence" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cti", "name": "#cti" } ], "replies": { "id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/replies?min_id=113590967359421180&page=true", "partOf": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/replies", "items": [ "https://infosec.exchange/users/screaminggoat/statuses/113590967359421180" ] } }, "likes": { "id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/likes", "type": "Collection", "totalItems": 4 }, "shares": { "id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/shares", "type": "Collection", "totalItems": 1 } }