ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-09T11:41:54Z", "url": "https://mastodon.bida.im/@redhotcyber/109313662270377816", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-09:objectId=41665481:objectType=Conversation", "content": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/313/661/739/411/895/original/cc555566aef49a38.jpg", "name": null, "blurhash": "ULBojz$lD%jDJRW;oLay4mjE%MbdbFWBayof", "width": 800, "height": 480 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dropbox", "name": "#dropbox" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/vittima", "name": "#vittima" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/campagna", "name": "#campagna" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/phishing", "name": "#phishing" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/repository", "name": "#repository" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/github", "name": "#github" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/librerie", "name": "#librerie" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/prototipi", "name": "#prototipi" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/strumenti", "name": "#strumenti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/configurazione", "name": "#configurazione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/team", "name": "#team" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies", "items": [] } } }