A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973",
"published": "2024-12-03T18:29:17Z",
"url": "https://infosec.exchange/@screaminggoat/113590308562550002",
"attributedTo": "https://infosec.exchange/users/screaminggoat",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/screaminggoat/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002",
"inReplyToAtomUri": "https://infosec.exchange/users/screaminggoat/statuses/113590301352371973",
"conversation": "tag:infosec.exchange,2024-12-03:objectId=218852443:objectType=Conversation",
"content": "<p><strong>NSA</strong>: <a href=\"https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3982793/guidance-urges-visibility-and-device-hardening-against-prc-affiliated-threat-ac/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Guidance Urges Visibility and Device Hardening against PRC-Affiliated Threat Actor</a><br>Cybersecurity Information Sheet (CSI), \"<a href=\"https://media.defense.gov/2024/Dec/03/2003596322/-1/-1/0/JOINT-GUIDANCE-ENHANCED-VISIBILITY-HARDENING-GUIDE-FOR-COMMS-INFRASTRUCTURE.PDF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a>,\" (PDF) provides defensive measures to strengthen visibility – detailed insight into network traffic, user activity, and data flow – for engineers and system administrators overseeing communications infrastructure. The guidance may also be applicable to organizations with on-premises enterprise equipment. The CSI also covers hardening of devices and network architecture to limit potential entry points for this type of cyber threat.</p><blockquote><p>The CSI also notes specific hardening best practices for Cisco operating systems, which were targeted by the PRC-affiliated threat actor.</p></blockquote><p><a href=\"https://infosec.exchange/tags/china\" class=\"mention hashtag\" rel=\"tag\">#<span>china</span></a> <a href=\"https://infosec.exchange/tags/cyberespionage\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberespionage</span></a> <a href=\"https://infosec.exchange/tags/cisa\" class=\"mention hashtag\" rel=\"tag\">#<span>cisa</span></a> <a href=\"https://infosec.exchange/tags/fbi\" class=\"mention hashtag\" rel=\"tag\">#<span>fbi</span></a> <a href=\"https://infosec.exchange/tags/nsa\" class=\"mention hashtag\" rel=\"tag\">#<span>nsa</span></a> <a href=\"https://infosec.exchange/tags/cccs\" class=\"mention hashtag\" rel=\"tag\">#<span>cccs</span></a> <a href=\"https://infosec.exchange/tags/ncscnz\" class=\"mention hashtag\" rel=\"tag\">#<span>ncscnz</span></a> <a href=\"https://infosec.exchange/tags/acsc\" class=\"mention hashtag\" rel=\"tag\">#<span>acsc</span></a> <a href=\"https://infosec.exchange/tags/salttyphoon\" class=\"mention hashtag\" rel=\"tag\">#<span>salttyphoon</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/cyberthreatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberthreatintelligence</span></a> <a href=\"https://infosec.exchange/tags/CTI\" class=\"mention hashtag\" rel=\"tag\">#<span>CTI</span></a></p>",
"contentMap": {
"en": "<p><strong>NSA</strong>: <a href=\"https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3982793/guidance-urges-visibility-and-device-hardening-against-prc-affiliated-threat-ac/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Guidance Urges Visibility and Device Hardening against PRC-Affiliated Threat Actor</a><br>Cybersecurity Information Sheet (CSI), \"<a href=\"https://media.defense.gov/2024/Dec/03/2003596322/-1/-1/0/JOINT-GUIDANCE-ENHANCED-VISIBILITY-HARDENING-GUIDE-FOR-COMMS-INFRASTRUCTURE.PDF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a>,\" (PDF) provides defensive measures to strengthen visibility – detailed insight into network traffic, user activity, and data flow – for engineers and system administrators overseeing communications infrastructure. The guidance may also be applicable to organizations with on-premises enterprise equipment. The CSI also covers hardening of devices and network architecture to limit potential entry points for this type of cyber threat.</p><blockquote><p>The CSI also notes specific hardening best practices for Cisco operating systems, which were targeted by the PRC-affiliated threat actor.</p></blockquote><p><a href=\"https://infosec.exchange/tags/china\" class=\"mention hashtag\" rel=\"tag\">#<span>china</span></a> <a href=\"https://infosec.exchange/tags/cyberespionage\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberespionage</span></a> <a href=\"https://infosec.exchange/tags/cisa\" class=\"mention hashtag\" rel=\"tag\">#<span>cisa</span></a> <a href=\"https://infosec.exchange/tags/fbi\" class=\"mention hashtag\" rel=\"tag\">#<span>fbi</span></a> <a href=\"https://infosec.exchange/tags/nsa\" class=\"mention hashtag\" rel=\"tag\">#<span>nsa</span></a> <a href=\"https://infosec.exchange/tags/cccs\" class=\"mention hashtag\" rel=\"tag\">#<span>cccs</span></a> <a href=\"https://infosec.exchange/tags/ncscnz\" class=\"mention hashtag\" rel=\"tag\">#<span>ncscnz</span></a> <a href=\"https://infosec.exchange/tags/acsc\" class=\"mention hashtag\" rel=\"tag\">#<span>acsc</span></a> <a href=\"https://infosec.exchange/tags/salttyphoon\" class=\"mention hashtag\" rel=\"tag\">#<span>salttyphoon</span></a> <a href=\"https://infosec.exchange/tags/threatintel\" class=\"mention hashtag\" rel=\"tag\">#<span>threatintel</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/cyberthreatintelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberthreatintelligence</span></a> <a href=\"https://infosec.exchange/tags/CTI\" class=\"mention hashtag\" rel=\"tag\">#<span>CTI</span></a></p>"
},
"updated": "2024-12-03T18:29:56Z",
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/china",
"name": "#china"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberespionage",
"name": "#cyberespionage"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cisa",
"name": "#cisa"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/fbi",
"name": "#fbi"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/nsa",
"name": "#nsa"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cccs",
"name": "#cccs"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ncscnz",
"name": "#ncscnz"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/acsc",
"name": "#acsc"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/salttyphoon",
"name": "#salttyphoon"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/threatintel",
"name": "#threatintel"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberthreatintelligence",
"name": "#cyberthreatintelligence"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cti",
"name": "#cti"
}
],
"replies": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/replies?min_id=113590967359421180&page=true",
"partOf": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/replies",
"items": [
"https://infosec.exchange/users/screaminggoat/statuses/113590967359421180"
]
}
},
"likes": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/likes",
"type": "Collection",
"totalItems": 4
},
"shares": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/113590308562550002/shares",
"type": "Collection",
"totalItems": 1
}
}