Get full access to data about 50% more hosts. Learn More

Menu

Ready to Get
Started?

Request a Demo or

Blog

Prevent Unnecessary Risk from pcAnywhere

by · May 21st, 2019

pcAnywhere is an insecure remote access application, but your employees may be using it without your knowledge. Find those instances in Censys and then provide employees with secure remote access alternatives so they can work remotely.

Around 1600 Sharepoint Servers Vulnerable to Attack

by · May 21st, 2019

A new security vulnerability leaves about 1600 Sharepoint servers open to attack. Explore how we tracked this CVE and see if your organization is affected.

How to Make Sure Your Elasticsearch Databases Aren’t Exposed

by · May 7th, 2019

Most organizations that use Elasticsearch databases use it to store business and customer information. It’s popular for web applications because it allows for easy ingestion and search, making powerful applications easy to develop. Use Censys to find out if your company is properly securing Elasticsearch databases.

Now Available: Maltego Integration for Censys Users

by · April 18th, 2019

We’re excited to announce that Censys users can now take advantage of the incredible power of Maltego’s visualization tools to help enrich and understand their assets. Using Censys with Maltego makes it easier for you to visualize vulnerabilities and complex relationships between digital assets.

Hunting for Threats: Coinhive Cryptocurrency Miner

by · April 10th, 2019

In this article, we’ll teach you how to think like threat hunters and use the open source tool YARA alongside Censys to find Coinhive, a cryptocurrency miner service.

Update ASAP: Apache HTTP Web Server Patch Fixes Critical Security Issue

by · April 3rd, 2019

Apache HTTP Web Server users should update their servers immediately to prevent critical security flaws for cloud and shared web hosting providers. Use Censys to find the Apache HTTP Web Servers your organization is using, even the ones you didn’t already know about, that are actually connected to the Internet, potentially vulnerable, and require patching.

New Whitepaper: Why Internet Data Should be Part of Your Security Strategy

by · April 2nd, 2019

In our latest whitepaper, we walk through how to use Internet security data within your organization to find what you didn’t know you had and secure it. Internet security data provides comprehensive visibility into your business’ infrastructure, including all the hosts and servers outside your traditional managed network.

Discover SSL/TLS Protocol in Use in Your Organization

by · March 24th, 2019

Censys indexes TLS certificates associated with hosts and services and also tracks a few specific vulnerabilities, which means you can use it to find outdated, insecure devices and certificates in your organization. We’ll take you through a few of those searches, related to TLS.

Banners from Top 1,000 Ports Now Available to Enterprise Customers

by · March 20th, 2019

Censys now performs broad, lightweight scans on over 1,000 TCP/IP services and publishes a daily snapshot that includes the certificates and banners found on each host.

How to Find Servers Using MQTT and AMQP Protocols

by · March 19th, 2019

We recently added MQ Telemetry Transport (MQTT) and the Advanced Message Queuing Protocol (AMQP) protocols to our data set. Here’s a quick rundown of what these protocols are used for, what security risks they carry with them, how to search for servers and devices that use MQTT and AMQP, and how to secure those servers.

Finding and Securing FTP Sites with Censys

by · March 11th, 2019

FTP sites can act as easy gateways for attackers to get into business systems, due to common misuse and misconfiguration issues. In this article, we show you how to use FTP banner grabs to find unknown and/or unsecured business FTP sites. Once located, we’ll walk you through steps for securing them or, better yet, moving to SaaS file-sharing offerings with security tools built-in.

Finding Hacked Web Servers

by · March 5th, 2019

In this article, we’ll show you one way to find hacked web servers. There are endless methods of hunting for affected web servers and this is just one example to get you started in thinking about your efforts in this area.

17K Building Control (BACnet) Servers Connected to the Internet

by · February 26th, 2019

Building Automation and Control network (BACnet) is one of the most popular SCADA protocols that building automation and control systems use to operate. Censys searches for five of the most popular SCADA protocol (including Modbus, S7, BACnet, DNP3, Tridium Fox) and a quick search shows that there are 16,899 BACnet servers accessible across the Internet.

Hunting Mirai Control Servers Using Known Shell Scripts

by · February 19th, 2019

The Mirai Botnet made much of the Internet inaccessible for the US East Coast back in late 2016, taking advantage of insecure IoT devices. Malware similar to Mirai in both behavior and structure is still very much in use across the Internet today. We set out find the servers that host it using Censys.

A Dream of the 90s - Bulletin Board Systems

by Paul A. Parkanzky · February 13th, 2019

There was a time before widespread adoption of the Internet when communities of local Bulletin Board Systems (BBSes) ruled the day in all their ANSI-colored text-based glory. Some BBSes are still active in 2019 and you can find them in Censys. To the nostalgia machine…

Ready to Get Started?

Get a real-time view of all your organization's assets so you can proactively prevent threats.