Event JSON
{
"id": "77b1cb129112b51316d1aea9e7d6ac33a76195a7fca19b5fd0ceec82521acb62",
"pubkey": "4299afec593da6053a215436638da2c07fc0229beb90909d314defc9a34c2f97",
"created_at": 1724258229,
"kind": 1,
"tags": [
[
"p",
"4ecd4976c321e77e76594bd4c9419e33838bb9d92dde45a372f4c9362f15ece6"
],
[
"proxy",
"https://podcastindex.social/@js/113000987359936514",
"web"
],
[
"proxy",
"https://podcastindex.social/users/js/statuses/113000987359936514",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://podcastindex.social/users/js/statuses/113000987359936514",
"pink.momostr"
],
[
"-"
]
],
"content": "interesting what shows up when running a podcast measurement service\n\nsome Florida man made over 500,000 http calls on Monday to various combination urls of one of nostr:npub1fmx5jakry8nhuajef02vjsv7xwpchwwe9h0ytgmj7nynvtc4annqd7wp74 's shows - various combo urls that don't exist\n\nOP3 doesn't store ip addresses, but anyone can query by hashedIpAddress = c1cf85ed0bcb71afdc52ce52ad54cba30cf05a7e\n\nhttps://op3.dev/api/1/hits?start=2024-08-19\u0026format=json\u0026token=preview07ce\u0026hashedIpAddress=c1cf85ed0bcb71afdc52ce52ad54cba30cf05a7e\u0026include=asn\u0026limit=1000",
"sig": "3865a7ea9bfe3749a17aa3eed81f1046484176cc886ed137f08fc3012705d760c405c56e87b7a6e6704b673a1260173f83205ea0f89533ab8ec6094ab0aadad3"
}