ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", "https://w3id.org/security/v1", { "manuallyApprovesFollowers": "as:manuallyApprovesFollowers", "toot": "http://joinmastodon.org/ns#", "featured": { "@id": "toot:featured", "@type": "@id" }, "featuredTags": { "@id": "toot:featuredTags", "@type": "@id" }, "alsoKnownAs": { "@id": "as:alsoKnownAs", "@type": "@id" }, "movedTo": { "@id": "as:movedTo", "@type": "@id" }, "schema": "http://schema.org#", "PropertyValue": "schema:PropertyValue", "value": "schema:value", "discoverable": "toot:discoverable", "suspended": "toot:suspended", "memorial": "toot:memorial", "indexable": "toot:indexable", "attributionDomains": { "@id": "toot:attributionDomains", "@type": "@id" }, "Emoji": "toot:Emoji", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/seanmartin", "type": "Person", "following": "https://infosec.exchange/users/seanmartin/following", "followers": "https://infosec.exchange/users/seanmartin/followers", "inbox": "https://infosec.exchange/users/seanmartin/inbox", "outbox": "https://infosec.exchange/users/seanmartin/outbox", "featured": "https://infosec.exchange/users/seanmartin/collections/featured", "featuredTags": "https://infosec.exchange/users/seanmartin/collections/tags", "preferredUsername": "seanmartin", "name": "Sean Martin 🎙️✨:verified_paw: :donor:", "summary": "<p>Founder ITSPmagazine | At the Intersection of <a href=\"https://infosec.exchange/tags/Technology\" class=\"mention hashtag\" rel=\"tag\">#<span>Technology</span></a>, <a href=\"https://infosec.exchange/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> and <a href=\"https://infosec.exchange/tags/Society\" class=\"mention hashtag\" rel=\"tag\">#<span>Society</span></a>™ | Professor Pepperdine Graziadio School of Business</p><p>I carry with me the strong belief that we, as <a href=\"https://infosec.exchange/tags/InfoSec\" class=\"mention hashtag\" rel=\"tag\">#<span>InfoSec</span></a> professionals, can help the <a href=\"https://infosec.exchange/tags/business\" class=\"mention hashtag\" rel=\"tag\">#<span>business</span></a> define the <a href=\"https://infosec.exchange/tags/systems\" class=\"mention hashtag\" rel=\"tag\">#<span>systems</span></a>, <a href=\"https://infosec.exchange/tags/applications\" class=\"mention hashtag\" rel=\"tag\">#<span>applications</span></a>, <a href=\"https://infosec.exchange/tags/workflows\" class=\"mention hashtag\" rel=\"tag\">#<span>workflows</span></a>, and more BEFORE they are designed and implemented to reduce the risk of exposure in the first place as opposed to trying to patch our way to safety afterward and burning out the security operations team as they attempt to block and tackle and pick up the pieces when it all hits the fan. Just sayin&#39;...</p>", "url": "https://infosec.exchange/@seanmartin", "manuallyApprovesFollowers": false, "discoverable": false, "indexable": false, "published": "2022-11-11T00:00:00Z", "memorial": false, "publicKey": { "id": "https://infosec.exchange/users/seanmartin#main-key", "owner": "https://infosec.exchange/users/seanmartin", "publicKeyPem": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqazlkGQGVgOCb2D7mJ2B\n1Fu11QWRUpyHO+w0k7gFFUZKIyG45Qht5G4KRu4UK4AjJyVJ1D8eil38fvX8JAv+\nUXmTATZ2Rctpy6x1JXYnXup5swQOaB51xldzyWhXzSzcm0vGQ0BH0HbC1jT8XvSr\n5sEzhta+xop3Gc7JZd6r79u/RsCi7tbu1L5BPw5eDlkq3RM8u2kKVEzMhmZh+fxh\nIFbDmXVuJaLLtsfG+BPsWrm/Dm3Mn4r6ynQzTCLi9Bf59Dcwb0KWzz92d/THQuyI\nrbKykCaIaXFaXZ0QsyE1XuOaYyX3e2HFX8eqqCqmblmKcKcLWPbRDUE5bnJs2xnj\n2QIDAQAB\n-----END PUBLIC KEY-----\n" }, "tag": [ { "id": "https://infosec.exchange/emojis/162404", "type": "Emoji", "name": ":verified_paw:", "updated": "2022-11-15T12:36:57Z", "icon": { "type": "Image", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/custom_emojis/images/000/162/404/original/e464c64f5a98dc53.png" } }, { "id": "https://infosec.exchange/emojis/183594", "type": "Emoji", "name": ":donor:", "updated": "2022-12-06T01:54:59Z", "icon": { "type": "Image", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/custom_emojis/images/000/183/594/original/61a35b247fc91e55.png" } }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/technology", "name": "#technology" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/society", "name": "#society" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/business", "name": "#business" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/applications", "name": "#applications" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/workflows", "name": "#workflows" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/systems", "name": "#systems" } ], "attachment": [ { "type": "PropertyValue", "name": "👉😬👈", "value": "<a href=\"https://www.seanmartin.com\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">seanmartin.com</span><span class=\"invisible\"></span></a>" }, { "type": "PropertyValue", "name": "ITSPmagazine", "value": "<a href=\"https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">itspmagazine.com/itspmagazine-</span><span class=\"invisible\">podcast-radio-hosts/sean-martin</span></a>" }, { "type": "PropertyValue", "name": "Podcast", "value": "<a href=\"https://www.itspmagazine.com/redefining-cybersecurity-podcast\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">itspmagazine.com/redefining-cy</span><span class=\"invisible\">bersecurity-podcast</span></a>" }, { "type": "PropertyValue", "name": "LinkedIn", "value": "<a href=\"https://www.linkedin.com/in/imsmartin/\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">linkedin.com/in/imsmartin/</span><span class=\"invisible\"></span></a>" }, { "type": "PropertyValue", "name": "CISSP", "value": "<a href=\"https://www.youracclaim.com/badges/40a8cf78-9180-4bea-ae63-b70cdb60e0bc/public_url\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">youracclaim.com/badges/40a8cf7</span><span class=\"invisible\">8-9180-4bea-ae63-b70cdb60e0bc/public_url</span></a>" }, { "type": "PropertyValue", "name": "🎙✨", "value": "<a href=\"https://techhub.social/@ITSPmagazine\" target=\"_blank\" rel=\"nofollow noopener me\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">techhub.social/@ITSPmagazine</span><span class=\"invisible\"></span></a>" } ], "endpoints": { "sharedInbox": "https://infosec.exchange/inbox" }, "icon": { "type": "Image", "mediaType": "image/jpeg", "url": "https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/323/405/528/403/481/original/7fb7b6496e7f7dda.jpg" }, "image": { "type": "Image", "mediaType": "image/jpeg", "url": "https://media.infosec.exchange/infosec.exchange/accounts/headers/109/323/405/528/403/481/original/dd8e4cb6e7527b65.jpeg" } }