Live Webinar: 5 Things You Can Do To Up Your Security Game Today | Register Now

The Challenge

Threat hunters are looking for needles in the haystack, which is why, contrary to popular belief, they need as big a haystack as possible. Anomalies only become apparent in a broad and comprehensive data set.

While open-source intelligence tools like ZMap, Masscan, and Nmap are great (especially for one-offs), they require significant overhead to manage: the volume is unwieldy, freshness is a concern without massive infrastructure investments, and structuring data for easy pivoting takes too much manpower.

The Censys Solution

The creators of ZMap founded Censys to provide reliable, fresh, and highly-indexed Internet-wide scan data at scale, giving organizations the best visibility into threats. Use the most comprehensive view of the Internet for your analysis with no maintenance.

Data Screen

The Best Data in the Industry

Ports Icon

Scanning 2,029 Ports across the entire IPv4 address space

2,029 Ports

Lightweight banner grabs on 2,029 popular ports.
Port Detection Icon

Port-Independent Protocol Detection

36 Protocols

Detection of 36 protocols across the 2,029 ports, allowing for intelligent identification of services running on non-standard ports.
Gear Icon

Deep Data Scan

36 Scan Modules

Structured, indexable data to make searches more productive.
Certificates Icon

Largest Repository of TLS Certificates

3 Billion Total Certs

More than 3B certs ingested from scans and Certificate Transparency(CT) logs

5 Million Certs

5M Certs added daily

1,000 Indexed Fields

More than 1K+ attributes indexed

Choose the Format that Suits Your Needs

Analytics

BigQuery

Extract-Transfer-Load

BigQuery, Downloads

Annotation

High-Volume API

Exploration

BigQuery, Downloads
Checkmark Icon

Run SQL queries on Censys Data in Google BigQuery. We do the ETL, you manage the GCP instance. This method enables you to regex the entire Internet and easily build a data pipeline.

Checkmark Icon

The API powers automation, providing flexibility to scale operations. Build your own integration or use our open-source CLI tool and Python Library. Censys data can enrich many security products and platforms.

Checkmark Icon

Download scan data in JSON format for maximum flexibility in custom workflows (Elasticsearch, Cassandra, AWS Redshift, etc.). This is a great fit for organizations who are building a “data lake” or for large enterprises with very strict privacy restrictions.

Checkmark Icon

The Censys Search WebUI operates like a search engine, with the ability to construct queries on 10K+ unique attributes for exploratory searches.

Enhance with Other Censys Products

Censys Attack Surface Management Product

If you’re leveraging Censys Data to find assets belonging to your organization, Censys can help! Our Attack Surface Management platform helps organizations understand their external exposures.

Attack Surface Management Screen

Download the Censys Data one pager