ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": "https://www.w3.org/ns/activitystreams", "type": "OrderedCollectionPage", "orderedItems": [ { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:1005385856046637056", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "A career in Ethical Hacking: Top Courses and Certification in India<br />.<br />follow on insta <a class=\"u-url mention\" href=\"https://www.minds.com/icssindia\" target=\"_blank\">@icssindia</a>.in<br />more blogs - www.icssindia.in/blog<br /> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhacking\" title=\"#ethicalhacking\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhackingcourseinindia\" title=\"#ethicalhackingcourseinindia\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhackingcourseinindia</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhackingcourse\" title=\"#ethicalhackingcourse\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhackingcourse</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhackingcourseindelhi\" title=\"#ethicalhackingcourseindelhi\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhackingcourseindelhi</a> ", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/1005385856046637056", "published": "2019-08-06T08:04:27+00:00", "source": { "content": "A career in Ethical Hacking: Top Courses and Certification in India\n.\nfollow on insta @icssindia.in\nmore blogs - www.icssindia.in/blog\n #cybersecurity #ethicalhacking #ethicalhackingcourseinindia #ethicalhackingcourse #ethicalhackingcourseindelhi ", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:1005385856046637056/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:1001424792141332480", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "Why you should learn Ethical Hacking Nowadays???<br /><br /><a href=\"https://schoolofhackers.wordpress.com/2019/07/26/why-you-should-learn-hacking-nowadays/\" target=\"_blank\">https://schoolofhackers.wordpress.com/2019/07/26/why-you-should-learn-hacking-nowadays/</a><br /><a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhacking\" title=\"#ethicalhacking\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=whylearnhackingnowadays\" title=\"#whylearnhackingnowadays\" class=\"u-url hashtag\" target=\"_blank\">#whylearnhackingnowadays</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=learnhacking\" title=\"#learnhacking\" class=\"u-url hashtag\" target=\"_blank\">#learnhacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=hacking\" title=\"#hacking\" class=\"u-url hashtag\" target=\"_blank\">#hacking</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/1001424792141332480", "published": "2019-07-26T09:44:36+00:00", "source": { "content": "Why you should learn Ethical Hacking Nowadays???\n\nhttps://schoolofhackers.wordpress.com/2019/07/26/why-you-should-learn-hacking-nowadays/\n#cybersecurity #ethicalhacking #whylearnhackingnowadays #learnhacking #hacking", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:1001424792141332480/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:997753932524785664", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "A Beginners Guide to Ethical Hacking, Certifications, Career, and Average Salary<br /><br />If you are also fascinated by the term ‘ethical hacker’ and want to know everything about this career, you’re at the right place. Today, I will talk about ethical hacking, types of hacking, courses and certifications, ethical hacking as a career, responsibilities and nearly everything. So, without any further ado, let’s get started..!!<br /><a href=\"https://schoolofhackers.wordpress.com/2019/07/16/a-beginners-guide-to-ethical-hacking-certifications-career-and-average-salary/\" target=\"_blank\">https://schoolofhackers.wordpress.com/2019/07/16/a-beginners-guide-to-ethical-hacking-certifications-career-and-average-salary/</a><br /><br /> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=hacking\" title=\"#hacking\" class=\"u-url hashtag\" target=\"_blank\">#hacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhacking\" title=\"#ethicalhacking\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhacker\" title=\"#ethicalhacker\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhacker</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/997753932524785664", "published": "2019-07-16T06:37:54+00:00", "source": { "content": "A Beginners Guide to Ethical Hacking, Certifications, Career, and Average Salary\n\nIf you are also fascinated by the term ‘ethical hacker’ and want to know everything about this career, you’re at the right place. Today, I will talk about ethical hacking, types of hacking, courses and certifications, ethical hacking as a career, responsibilities and nearly everything. So, without any further ado, let’s get started..!!\nhttps://schoolofhackers.wordpress.com/2019/07/16/a-beginners-guide-to-ethical-hacking-certifications-career-and-average-salary/\n\n #hacking #ethicalhacking #cybersecurity #ethicalhacker", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:997753932524785664/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:996360555345657856", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"https://www.fbioyf.unr.edu.ar/evirtual/blog/index.php?entryid=79828\" target=\"_blank\">https://www.fbioyf.unr.edu.ar/evirtual/blog/index.php?entryid=79828</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/996360555345657856", "published": "2019-07-12T10:21:07+00:00", "source": { "content": "https://www.fbioyf.unr.edu.ar/evirtual/blog/index.php?entryid=79828", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:996360555345657856/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:996286331500441600", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "Did you know?<br />How to make an essay longer: Hit CTRL + F, search \".\" and change the font size of the periods 12 to 14. They look the exact same but will make your paper significantly longer<br /><br /><br /><a href=\"https://www.linkedin.com/feed/update/urn:li:activity:6555315044228395008\" target=\"_blank\">https://www.linkedin.com/feed/update/urn:li:activity:6555315044228395008</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/996286331500441600", "published": "2019-07-12T05:26:11+00:00", "source": { "content": "Did you know?\nHow to make an essay longer: Hit CTRL + F, search \".\" and change the font size of the periods 12 to 14. They look the exact same but will make your paper significantly longer\n\n\nhttps://www.linkedin.com/feed/update/urn:li:activity:6555315044228395008", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:996286331500441600/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:996285868804440064", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"https://www.reddit.com/r/cybersecurity/comments/cc6jx0/how_to_learn_ethical_hacking/?utm_source=share&amp;utm_medium=web2x\" target=\"_blank\">https://www.reddit.com/r/cybersecurity/comments/cc6jx0/how_to_learn_ethical_hacking/?utm_source=share&amp;utm_medium=web2x</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/996285868804440064", "published": "2019-07-12T05:24:21+00:00", "source": { "content": "https://www.reddit.com/r/cybersecurity/comments/cc6jx0/how_to_learn_ethical_hacking/?utm_source=share&utm_medium=web2x", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:996285868804440064/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995923965858996224", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "David J'ai Reussi why he thinks ICSS is the Best Cyber Security Institute.<br /><br /><a href=\"https://www.youtube.com/watch?v=shLV1woT-lU\" target=\"_blank\">https://www.youtube.com/watch?v=shLV1woT-lU</a><br /> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=hacking\" title=\"#hacking\" class=\"u-url hashtag\" target=\"_blank\">#hacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=ethicalhacking\" title=\"#ethicalhacking\" class=\"u-url hashtag\" target=\"_blank\">#ethicalhacking</a> <a href=\"https://www.minds.com/search?f=top&amp;t=all&amp;q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995923965858996224", "published": "2019-07-11T05:26:16+00:00", "source": { "content": "David J'ai Reussi why he thinks ICSS is the Best Cyber Security Institute.\n\nhttps://www.youtube.com/watch?v=shLV1woT-lU\n #hacking #ethicalhacking #cybersecurity", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995923965858996224/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995920814879727616", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"https://in.pinterest.com/pin/756956649851326558\" target=\"_blank\">https://in.pinterest.com/pin/756956649851326558</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995920814879727616", "published": "2019-07-11T05:13:45+00:00", "source": { "content": "https://in.pinterest.com/pin/756956649851326558", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995920814879727616/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995576213299728384", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"https://schoolofhackers.wordpress.com/2019/07/10/what-is-mitm-how-to-attack-prevent/\" target=\"_blank\">https://schoolofhackers.wordpress.com/2019/07/10/what-is-mitm-how-to-attack-prevent/</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995576213299728384", "published": "2019-07-10T06:24:26+00:00", "source": { "content": "https://schoolofhackers.wordpress.com/2019/07/10/what-is-mitm-how-to-attack-prevent/", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995576213299728384/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995568710836604928", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"http://icssindia.strikingly.com/blog/what-is-mitm-how-to-attack-prevent\" target=\"_blank\">http://icssindia.strikingly.com/blog/what-is-mitm-how-to-attack-prevent</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995568710836604928", "published": "2019-07-10T05:54:37+00:00", "source": { "content": "http://icssindia.strikingly.com/blog/what-is-mitm-how-to-attack-prevent", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995568710836604928/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995566707680026624", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"https://medium.com/@vishal0708/what-is-mitm-how-to-attack-prevent-9f3e3008ce26?source=friends_link&amp;sk=8f616ec42b8b7e6832981ca77067bd40\" target=\"_blank\">https://medium.com/@vishal0708/what-is-mitm-how-to-attack-prevent-9f3e3008ce26?source=friends_link&amp;sk=8f616ec42b8b7e6832981ca77067bd40</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995566707680026624", "published": "2019-07-10T05:46:39+00:00", "source": { "content": "https://medium.com/@vishal0708/what-is-mitm-how-to-attack-prevent-9f3e3008ce26?source=friends_link&sk=8f616ec42b8b7e6832981ca77067bd40", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995566707680026624/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995562689103474688", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "<a href=\"https://www.instagram.com/p/BzuWX-oJ-sD/?utm_source=ig_web_copy_link\" target=\"_blank\">https://www.instagram.com/p/BzuWX-oJ-sD/?utm_source=ig_web_copy_link</a><br />", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995562689103474688", "published": "2019-07-10T05:30:41+00:00", "source": { "content": "https://www.instagram.com/p/BzuWX-oJ-sD/?utm_source=ig_web_copy_link\n", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995562689103474688/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/994911658339999754", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995202626710073344", "attributedTo": "https://www.minds.com/api/activitypub/users/994911658339999754", "content": "Thinking About A Career In Cyber Security or Ethical Hacking?<br /><br />A career in cyber security or ethical hacking<br />How to build your career in cyber security (career in ethical hacking) career in cyber security?<br /><a href=\"https://medium.com/@vishal0708/thinking-about-a-career-in-cyber-security-or-ethical-hacking-3bea7e41ca5\" target=\"_blank\">https://medium.com/@vishal0708/thinking-about-a-career-in-cyber-security-or-ethical-hacking-3bea7e41ca5</a>", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/994911658339999754/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/995202626710073344", "published": "2019-07-09T05:39:56+00:00", "source": { "content": "Thinking About A Career In Cyber Security or Ethical Hacking?\n\nA career in cyber security or ethical hacking\nHow to build your career in cyber security (career in ethical hacking) career in cyber security?\nhttps://medium.com/@vishal0708/thinking-about-a-career-in-cyber-security-or-ethical-hacking-3bea7e41ca5", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/994911658339999754/entities/urn:activity:995202626710073344/activity" } ], "id": "https://www.minds.com/api/activitypub/users/994911658339999754/outbox", "partOf": "https://www.minds.com/api/activitypub/users/994911658339999754/outboxoutbox" }