A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://join-lemmy.org/context.json",
"https://www.w3.org/ns/activitystreams"
],
"type": "Page",
"id": "https://programming.dev/post/29831303",
"attributedTo": "https://programming.dev/u/Pro",
"to": [
"https://infosec.pub/c/cybersecurity",
"https://www.w3.org/ns/activitystreams#Public"
],
"name": "\"Mirai\" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)",
"cc": [],
"mediaType": "text/html",
"attachment": [
{
"href": "https://isc.sans.edu/diary/rss/31920",
"mediaType": "text/html; charset=utf-8",
"type": "Link"
}
],
"image": {
"type": "Image",
"url": "https://programming.dev/pictrs/image/9e6b31b3-2950-409c-a8c9-a4c3e50aa2f3.jpeg"
},
"sensitive": false,
"published": "2025-05-06T08:04:46.553533Z",
"audience": "https://infosec.pub/c/cybersecurity",
"tag": [
{
"href": "https://programming.dev/post/29831303",
"name": "#cybersecurity",
"type": "Hashtag"
}
]
}