A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://swecyb.com/users/nopatience/statuses/114171578638413663",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-03-16T10:13:55Z",
"url": "https://swecyb.com/@nopatience/114171578638413663",
"attributedTo": "https://swecyb.com/users/nopatience",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://swecyb.com/users/nopatience/followers",
"https://mastodon.social/users/Viss",
"https://infosec.exchange/users/cR0w",
"https://masto.deoan.org/users/neurovagrant"
],
"sensitive": false,
"atomUri": "https://swecyb.com/users/nopatience/statuses/114171578638413663",
"inReplyToAtomUri": null,
"conversation": "tag:swecyb.com,2025-03-16:objectId=5441643:objectType=Conversation",
"content": "<p>I just published the source code for my very naive <a href=\"https://swecyb.com/tags/Python\" class=\"mention hashtag\" rel=\"tag\">#<span>Python</span></a> implementation for generating a node network based on MITRE Intrusion Sets and Techniques. It will output linked <a href=\"https://swecyb.com/tags/Markdown\" class=\"mention hashtag\" rel=\"tag\">#<span>Markdown</span></a> files linking intrusion sets to their used techniques.</p><p>Perhaps someone finds it useful or interesting to experiment with.</p><p>Source code: <a href=\"https://github.com/cstromblad/markdown_node\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/cstromblad/markdown</span><span class=\"invisible\">_node</span></a></p><p>I hinted at this in a thread started by <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@Viss\" class=\"u-url mention\">@<span>Viss</span></a></span> where he asked for input on a few very likely malicious domains. Me <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@Viss\" class=\"u-url mention\">@<span>Viss</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@cR0w\" class=\"u-url mention\">@<span>cR0w</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://masto.deoan.org/@neurovagrant\" class=\"u-url mention\">@<span>neurovagrant</span></a></span> and others did some OSINT fun work with a couple of the original domains.</p><p>It was this thread: <a href=\"https://mastodon.social/@Viss/114145122623079635\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">mastodon.social/@Viss/11414512</span><span class=\"invisible\">2623079635</span></a></p><p>Now I posted a picture of a node network rendered in Obsidian and I hinted that perhaps Obsidian could be used as a poor mans version of performing threat intelligence work.</p><p><a href=\"https://swecyb.com/tags/ThreatIntel\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntel</span></a> <a href=\"https://swecyb.com/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://swecyb.com/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://swecyb.com/tags/Obsidian\" class=\"mention hashtag\" rel=\"tag\">#<span>Obsidian</span></a></p>",
"contentMap": {
"en": "<p>I just published the source code for my very naive <a href=\"https://swecyb.com/tags/Python\" class=\"mention hashtag\" rel=\"tag\">#<span>Python</span></a> implementation for generating a node network based on MITRE Intrusion Sets and Techniques. It will output linked <a href=\"https://swecyb.com/tags/Markdown\" class=\"mention hashtag\" rel=\"tag\">#<span>Markdown</span></a> files linking intrusion sets to their used techniques.</p><p>Perhaps someone finds it useful or interesting to experiment with.</p><p>Source code: <a href=\"https://github.com/cstromblad/markdown_node\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/cstromblad/markdown</span><span class=\"invisible\">_node</span></a></p><p>I hinted at this in a thread started by <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@Viss\" class=\"u-url mention\">@<span>Viss</span></a></span> where he asked for input on a few very likely malicious domains. Me <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@Viss\" class=\"u-url mention\">@<span>Viss</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@cR0w\" class=\"u-url mention\">@<span>cR0w</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://masto.deoan.org/@neurovagrant\" class=\"u-url mention\">@<span>neurovagrant</span></a></span> and others did some OSINT fun work with a couple of the original domains.</p><p>It was this thread: <a href=\"https://mastodon.social/@Viss/114145122623079635\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">mastodon.social/@Viss/11414512</span><span class=\"invisible\">2623079635</span></a></p><p>Now I posted a picture of a node network rendered in Obsidian and I hinted that perhaps Obsidian could be used as a poor mans version of performing threat intelligence work.</p><p><a href=\"https://swecyb.com/tags/ThreatIntel\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntel</span></a> <a href=\"https://swecyb.com/tags/ThreatIntelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>ThreatIntelligence</span></a> <a href=\"https://swecyb.com/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://swecyb.com/tags/Obsidian\" class=\"mention hashtag\" rel=\"tag\">#<span>Obsidian</span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/png",
"url": "https://media.swecyb.com/media_attachments/files/114/171/572/008/720/936/original/1d8a172d6fdc6eee.png",
"name": "Node network from Obsidian showing a network of MITRE Intrusion Sets and Techniques from MITRE ATT&CK.",
"blurhash": "U05Ey;%7IV~n-:oaWBog4--:-;9G%LobRiWE",
"focalPoint": [
0,
0
],
"width": 2875,
"height": 1845
}
],
"tag": [
{
"type": "Mention",
"href": "https://mastodon.social/users/Viss",
"name": "@Viss@mastodon.social"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/cR0w",
"name": "@cR0w@infosec.exchange"
},
{
"type": "Mention",
"href": "https://masto.deoan.org/users/neurovagrant",
"name": "@neurovagrant@masto.deoan.org"
},
{
"type": "Hashtag",
"href": "https://swecyb.com/tags/python",
"name": "#python"
},
{
"type": "Hashtag",
"href": "https://swecyb.com/tags/markdown",
"name": "#markdown"
},
{
"type": "Hashtag",
"href": "https://swecyb.com/tags/threatintel",
"name": "#threatintel"
},
{
"type": "Hashtag",
"href": "https://swecyb.com/tags/threatintelligence",
"name": "#threatintelligence"
},
{
"type": "Hashtag",
"href": "https://swecyb.com/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://swecyb.com/tags/obsidian",
"name": "#obsidian"
}
],
"replies": {
"id": "https://swecyb.com/users/nopatience/statuses/114171578638413663/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://swecyb.com/users/nopatience/statuses/114171578638413663/replies?only_other_accounts=true&page=true",
"partOf": "https://swecyb.com/users/nopatience/statuses/114171578638413663/replies",
"items": []
}
},
"likes": {
"id": "https://swecyb.com/users/nopatience/statuses/114171578638413663/likes",
"type": "Collection",
"totalItems": 24
},
"shares": {
"id": "https://swecyb.com/users/nopatience/statuses/114171578638413663/shares",
"type": "Collection",
"totalItems": 6
}
}