A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-09T11:41:54Z",
"url": "https://mastodon.bida.im/@redhotcyber/109313662270377816",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-09:objectId=41665481:objectType=Conversation",
"content": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/313/661/739/411/895/original/cc555566aef49a38.jpg",
"name": null,
"blurhash": "ULBojz$lD%jDJRW;oLay4mjE%MbdbFWBayof",
"width": 800,
"height": 480
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dropbox",
"name": "#dropbox"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/vittima",
"name": "#vittima"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/campagna",
"name": "#campagna"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/phishing",
"name": "#phishing"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/repository",
"name": "#repository"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/github",
"name": "#github"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/librerie",
"name": "#librerie"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/prototipi",
"name": "#prototipi"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/strumenti",
"name": "#strumenti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/configurazione",
"name": "#configurazione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/team",
"name": "#team"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies",
"items": []
}
}
}