A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"Hashtag": "as:Hashtag"
}
],
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/112160496311535813",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-03-26T06:09:14Z",
"url": "https://mastodon.bida.im/@redhotcyber/112160496311535813",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/112160496311535813",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2024-03-26:objectId=71739192:objectType=Conversation",
"content": "<p>Cos’è l’Exploit Prediction Scoring System (EPSS)</p><p>L’Exploit Prediction Scoring System (<a href=\"https://mastodon.bida.im/tags/EPSS\" class=\"mention hashtag\" rel=\"tag\">#<span>EPSS</span></a>) è una <a href=\"https://mastodon.bida.im/tags/metodologia\" class=\"mention hashtag\" rel=\"tag\">#<span>metodologia</span></a> <a href=\"https://mastodon.bida.im/tags/avanzata\" class=\"mention hashtag\" rel=\"tag\">#<span>avanzata</span></a> che riveste un ruolo cruciale nel panorama della <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> moderna. Fondata su <a href=\"https://mastodon.bida.im/tags/algoritmi\" class=\"mention hashtag\" rel=\"tag\">#<span>algoritmi</span></a> sofisticati e analisi <a href=\"https://mastodon.bida.im/tags/predittive\" class=\"mention hashtag\" rel=\"tag\">#<span>predittive</span></a>, l’<a href=\"https://mastodon.bida.im/tags/EPSS\" class=\"mention hashtag\" rel=\"tag\">#<span>EPSS</span></a> si pone l’obiettivo di prevedere e mitigare le <a href=\"https://mastodon.bida.im/tags/minacce\" class=\"mention hashtag\" rel=\"tag\">#<span>minacce</span></a> informatiche prima che possano essere sfruttate.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/online\" class=\"mention hashtag\" rel=\"tag\">#<span>online</span></a> <a href=\"https://mastodon.bida.im/tags/it\" class=\"mention hashtag\" rel=\"tag\">#<span>it</span></a> <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> <a href=\"https://mastodon.bida.im/tags/ai\" class=\"mention hashtag\" rel=\"tag\">#<span>ai</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligence</span></a> <a href=\"https://mastodon.bida.im/tags/intelligenzaartificiale\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligenzaartificiale</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://www.redhotcyber.com/post/cose-lexploit-prediction-scoring-system-epss/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">redhotcyber.com/post/cose-lexp</span><span class=\"invisible\">loit-prediction-scoring-system-epss/</span></a></p>",
"contentMap": {
"it": "<p>Cos’è l’Exploit Prediction Scoring System (EPSS)</p><p>L’Exploit Prediction Scoring System (<a href=\"https://mastodon.bida.im/tags/EPSS\" class=\"mention hashtag\" rel=\"tag\">#<span>EPSS</span></a>) è una <a href=\"https://mastodon.bida.im/tags/metodologia\" class=\"mention hashtag\" rel=\"tag\">#<span>metodologia</span></a> <a href=\"https://mastodon.bida.im/tags/avanzata\" class=\"mention hashtag\" rel=\"tag\">#<span>avanzata</span></a> che riveste un ruolo cruciale nel panorama della <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> moderna. Fondata su <a href=\"https://mastodon.bida.im/tags/algoritmi\" class=\"mention hashtag\" rel=\"tag\">#<span>algoritmi</span></a> sofisticati e analisi <a href=\"https://mastodon.bida.im/tags/predittive\" class=\"mention hashtag\" rel=\"tag\">#<span>predittive</span></a>, l’<a href=\"https://mastodon.bida.im/tags/EPSS\" class=\"mention hashtag\" rel=\"tag\">#<span>EPSS</span></a> si pone l’obiettivo di prevedere e mitigare le <a href=\"https://mastodon.bida.im/tags/minacce\" class=\"mention hashtag\" rel=\"tag\">#<span>minacce</span></a> informatiche prima che possano essere sfruttate.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/online\" class=\"mention hashtag\" rel=\"tag\">#<span>online</span></a> <a href=\"https://mastodon.bida.im/tags/it\" class=\"mention hashtag\" rel=\"tag\">#<span>it</span></a> <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> <a href=\"https://mastodon.bida.im/tags/ai\" class=\"mention hashtag\" rel=\"tag\">#<span>ai</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligence</span></a> <a href=\"https://mastodon.bida.im/tags/intelligenzaartificiale\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligenzaartificiale</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://www.redhotcyber.com/post/cose-lexploit-prediction-scoring-system-epss/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">redhotcyber.com/post/cose-lexp</span><span class=\"invisible\">loit-prediction-scoring-system-epss/</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/EPSS",
"name": "#EPSS"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/metodologia",
"name": "#metodologia"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/avanzata",
"name": "#avanzata"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/algoritmi",
"name": "#algoritmi"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/predittive",
"name": "#predittive"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/minacce",
"name": "#minacce"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/online",
"name": "#online"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/it",
"name": "#it"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/web",
"name": "#web"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ai",
"name": "#ai"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/intelligence",
"name": "#intelligence"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/intelligenzaartificiale",
"name": "#intelligenzaartificiale"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/112160496311535813/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/112160496311535813/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/112160496311535813/replies",
"items": []
}
}
}