Summary

Platform UI updates

The Censys Platform web UI has been updated to make the search bar the focus on the home page and improve navigation.

Left-side navigation panel

  • The organization you are currently logged into is displayed in the top of the left-side nav bar. Switch to your Free account or another organization and access your organizational and personal settings from the organization drop-down.
    • Open the account selector menu, select your account or organization, and click the credits section to go to the Credit Management page.
  • Access to search and the dashboards for the Threat Hunting and Critical Infrastructure modules is now located in the Intelligence section of the left-side nav bar.
  • The My Work section contains your collections, a link to the Investigation Manager, and your search history.
  • The Resources section includes links to the Release Notes feed, the Censys Community. Additional resources like the Censys Academy and Data Definitions are nested under Learn in this section.

Alerts and Notifications

  • Access webhook configuration by clicking the bell icon for Alerts and Notifications in the top-right corner.

Personal Access Tokens, account management, and more

  • Create and manage Personal Access Tokens (PATs), manage your account, and switch between light and dark mode using the profile menu in the top right corner.

Platform Search History page

New protocols and application scanners

Added support for the following protocol.

Protocol/applicationQueryData availability
GEMINIPlatform queryVisible and searchable to all user tiers.

New fingerprints

Added the following fingerprints.

Note that new ASM risk fingerprints may be disabled by default in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

risk

Exposed Ollama Application

An exposed Ollama server. This application allows users to run and manage large language models (LLMs) locally. Exposing this service to the public internet can allow unauthorized access to AI models and computational resources.

ASM query:

risks.name: "Exposed Ollama Application"

hardware

TiVo DVR

This is a TiVo digital video recorder (DVR).

Platform query

software

Gitea

Gitea is a self-hosted Git service.

Platform query

software

Gogs

Gogs is a self-hosted Git service.

Platform query

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

As part of the plan to decommission Legacy Search (search.censys.io) in 2026, Censys will update its host data backend on March 28, 2026. In Legacy Search, this will result in changes to virtual host behavior, data freshness, select API fields, and other minor adjustments. These changes are described in detail below.

These changes do not remove host coverage from Legacy Search. Additionally, this change does not affect Platform (platform.censys.io) data or functionality.

Overall host coverage, scan cadence, historical data retention, existing functionality, query syntax, UI workflows, and entitlements in Legacy Search are not impacted.

Virtual hosts

The table below summarizes key changes to virtual host data after the change.

AreaBeforeAfterImpact
Virtual host definitionOne per each hostname and IP addressBased on latest scanned IP per portIncreased historical view of data
Service persistenceUp to 45 daysRemoved on next negative scan14-day expiry, yielding less stale data
IP associationServices persisted across IPsServices move scan IPsData “may” move between IPs
DuplicationCommonReducedMore accurate representation of web assets

Data freshness

  • Expiration is changing to 14 days (previously 45 days).
  • Index updates will occur only when a scan for that IP is received.
  • The "See Latest" UI indication may appear more often.
  • In general, there will be less long-lived stale data.

API and service lifecycle changes

  • Timeline API: Forward pagination will be removed. API users must set reversed=true.
  • Service lifecycle: Services pending removal will be immediately removed from assets when a scan indicates they are no longer visible, instead of being marked as pending.

Removed fields

The following fields will be removed from Legacy Search:

  • services.parsed.rocketmq.version (RocketMQ)
  • services.ipp.response (IPP)
  • services.ipp.cups_response (IPP)
  • services.elasticsearch.http_info (Elasticsearch)
  • services.tls.server_key_exchange (TLS)
  • services.prometheus.http_info (Prometheus)
  • services.transport_fingerprint.* (Transport)

DNS records

  • dns.records.record_type will no longer return CNAME.
  • Record types will be limited to A and AAAA only.

Certificate API update frequency

The update frequency for the following APIs will change from realtime to every six hours:

  • /v2/hosts/{ip}/certificates
  • /v2/certificates/{fingerprint}/observations

We encourage you to review your workflows and integrations to prepare for these upcoming changes. If you have any questions or concerns about this transition, please reach out to our team at [email protected].

Summary

New protocols and application scanners

Added support for the following protocols and applications.

Protocol/applicationQueryData availability
CISCO_NSIPlatform queryData is only visible and searchable to Core and Enterprise users.
FLASH_SOCKET_POLICYPlatform queryData is only visible and searchable to Core and Enterprise users.
MELSECPlatform queryData is only visible and searchable to users with access to the Critical Infrastructure module.
MEMBERLISTPlatform queryData is only visible and searchable to Core and Enterprise users.
ROUTEROS_APIPlatform queryData is only visible and searchable to Core and Enterprise users.
RUSTDESK_HEARTBEATPlatform queryVisible and searchable to all user tiers.
RUSTDESK_RELAYPlatform queryVisible and searchable to all user tiers.
RUSTDESK_RENDEZVOUSPlatform queryVisible and searchable to all user tiers.

New fingerprints

Added the following fingerprint.

Note that new ASM risk fingerprints may be disabled by default in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

risk

Exposed NextGen Healthcare Mirth Connect

A NextGen Healthcare Mirth Connect administrator interface is exposed to the internet. Mirth Connect is healthcare integration software that processes and transforms medical data. Exposure may allow unauthorized access to sensitive health information.

ASM query:

risks.name: "Exposed NextGen Healthcare Mirth Connect"

Summary

Platform

  • To improve usability, when web properties have multiple endpoints they are now collected on a single hostname and port card instead of split across multiple cards.

  • Redirect chains are now shown on host service and web endpoint cards.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
operating_systemApple macOSThis is a device running Apple macOS.Platform query
softwareFortinet FortiClient Endpoint Management ServerThis is a FortiClient Endpoint Management Server (EMS). EMS is a security management solution that enables scalable and centralized management of multiple endpoints.Platform query
softwareQuestDBThis is a QuestDB instance. QuestDB is an open-source time-series database.Platform query

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

Summary

Platform

Threat Hunting

  • Platform Threat Hunting users can use the new Platform threat history API endpoints to obtain the history of any threats present on a host or web property.
    • You can define a specific time frame of interest for each of these endpoints. If you do not specify a time frame, this endpoint will search the historical dataset that is available to your account.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
softwareDrayTek SSL VPNThis is a DrayTek SSL VPN server.Platform query
softwareFatPipe MPVPNThis is a FatPipe MPVPN server.Platform query
softwareH3C SSL VPNThis is an H3C SSL VPN server.Platform query
softwareJuniper Secure ConnectThis is a Juniper Secure Connect VPN client application.Platform query
softwareQiAnXin VPNThis is a QiAnXin (奇安信) VPN server.Platform query
softwareRuijie SSL VPNThis is a Ruijie SSL VPN server.Platform query
softwareSaima Systems VPNThis is a Saima Systems Saiwall-MS VPN server.Platform query
softwareSangfor SSL VPNThis is a Sangfor SSL VPN server.Platform query
softwareOdooOdoo is an open-source ERP and CRM system.Platform query
softwareWordPressWordPress is a free and open-source content management system (CMS) based on PHP and MySQL.Platform query

Summary

Platform

  • The new Service History timeline on host records is a visualization of service presence over time broken down by protocol and port pairs. Use it to quickly understand service history, persistence, anomalies, and other points of interest.

  • Added several parsed data fields for HTTP redirect chains to hosts and web properties.

    • Use this data to map relationships, identify misconfigurations, find parked domains, locate abandoned infrastructure, and more. For example, run web.endpoints.http.redirect_chain.hostname="censys.com" to find web properties that redirect to censys.com.

    • Redirect data is provided in the following fields.

      FieldDescription
      [host.services or web].endpoints.http.redirect_chainThe nested object that contains redirect chain data.
      *.endpoints.http.redirect_chain.reasonThe reason for the redirect. Can be HTTP_3XX, REFRESH_HEADER, or UNRECOGNIZED.
      *.endpoints.http.redirect_chain.transport_protocolThe transport protocol used for the redirect.
      *.endpoints.http.redirect_chain.hostnameThe hostname that the redirect points to.
      *.endpoints.http.redirect_chain.pathThe path that the redirect points to, like /, /login, /admin, and so on.
      *.endpoints.http.redirect_chain.portThe port that the redirect points to.
    • Redirect data is visible to and searchable by users on the Core and Enterprise plans. Redirect data is visible to Starter and Free users, but they cannot search across it.

  • You can now use the Censys Assistant to quickly generate human-readable summaries of certificates and web properties in the Platform web UI.

  • Version 1.0 of the cencli command line tool was released. It includes:

    • The option to retrieve informative and conciseshort outputs for numerous commands.
    • New org commands to view organization details including credits, members, and organization information.
    • Support for streaming output, allowing you to fetch large amounts of data without performance issues.

New fingerprints

Added the following fingerprints.

Note that new ASM risk fingerprints may be disabled in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

software

OpenClaw Interface

OpenClaw (formerly Clawdbot/Moltbot) is an open-source personal AI assistant that can execute commands, automate tasks, and manage workflows on the host system.

Platform query

risk

Exposed OpenClaw Interface

An OpenClaw control interface is exposed to the internet. OpenClaw (formerly Clawdbot/Moltbot) is an open-source personal AI assistant that can automate tasks on the host system. Exposing this interface may allow unauthorized access to execute arbitrary commands and access sensitive data.

ASM risk query:

risks.name= `Exposed OpenClaw Interface`

risk

EIP (EtherNet/IP) Service Exposed

This service is running EtherNet/IP (EIP), an industrial communication protocol for PLCs, HMIs, and industrial automation equipment. Exposure could allow attackers to read/write PLC programs, modify control logic, disrupt industrial processes, or cause equipment damage.

ASM risk query:

risks.name= `EIP (EtherNet/IP) Service Exposed`

risk

CODESYS Service Exposed

This service is running CODESYS, an automation platform for industrial control systems. Exposure could allow attackers to read/write PLC programs, modify control logic, disrupt industrial processes, or cause equipment damage.

ASM risk query:

risks.name= `CODESYS Service Exposed`

risk

Exposed MCP Inspector

Exposed MCP Inspector instance. This is a visual developer tool for testing and debugging Model Context Protocol servers.

ASM risk query:

risks.name="Exposed MCP Inspector"

risk

Vulnerable SmarterMail [CVE-2026-23760]

This SmarterMail server is running a build version vulnerable to CVE-2026-23760, a critical authentication bypass vulnerability that allows unauthenticated attackers to reset administrator accounts without verifying credentials or reset tokens. Since SmarterMail administrator privileges include the ability to execute operating system commands, successful exploitation results in complete administrative compromise with SYSTEM or root-level access on the underlying host. Build versions 9510 and earlier are vulnerable.

ASM risk query:

risks.name="Vulnerable SmarterMail [CVE-2026-23760]"

Summary

  • Use the new cloud asset context in ASM to help you identify asset ownership for easier remediation. This contextual metadata is retrieved for all assets sourced from the AWS, GCP, and Azure Cloud Connectors and the Wiz integration.
  • You can now obtain your Platform organization ID from the Account Management page in the Platform web console.
  • Added three new software fingerprints for TorGuard VPN servers, Nessus Vulnerability Scanners, and Scope Sentry.

ASM

  • Use cloud asset context in ASM to help you identify asset ownership for easier remediation.

    • You can see the context data for an asset by clicking the linked text in the Source column in the Inventory table view in the ASM web console.
    • Contextual metadata is retrieved for all assets sourced from the AWS, GCP, and Azure Cloud Connectors and the Wiz integration.
    • This data is shown in the ASM web console and can be queried by the inventory search API endpoint.

Platform

  • You can now obtain your organization ID from the Account Management page in the Platform web console.
    1. Open the Platform web console and ensure that your organization account is selected. Go to Settings > Account Management > Personal Access Tokens.

    2. The ID for your organization is shown in the "Current Organization" box. Click Copy to copy it to your clipboard.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
softwareTorGuard VPN serverThis is a TorGuard VPN server.Platform query
softwareNessus Vulnerability ScannerThis is a Nessus vulnerability scanner, a tool developed by Tenable for identifying security issues.Platform query
softwareScope SentryThis is a Scope Sentry instance. Scope Sentry is a tool with functions such as asset mapping, subdomain enumeration, information leakage detection, vulnerability scanning, directory scanning, subdomain takeover, crawler, and page monitoring.Platform query

Summary

Platform

  • The Censys Assistant AI tool is now available in the Platform web app for all users. Use the assistant to input questions or prompts in a natural language and obtain answers based on the assets and data present in the Censys Internet Map. Learn more about the assistant in the video below.

  • Use the new audit log in the UI or API to review user and organization events for the Platform and user, organization, and workspace events for Attack Surface Management (ASM).

    • The Censys team has started migrating ASM customers to the Platform for organization management. Contact your Censys team representative to learn more about migrating your team.
  • Use personalized fields in the Platform web app to highlight data fields of interest in your search results.

    • Using personalized fields does not filter your search results like the filters on the left side of the page; it simply displays your configured fields on results that have already been returned by your query.
  • You can now target a time range up to 365 days with the get organization credit usage and get organization member credit usage API endpoints.

  • Added an API endpoint to retrieve Free user credit usage information.

Threat Hunting

  • Use the new threat history visual timeline on hosts and web properties to quickly understand previous threat presence on an asset.

    • Hover over a plot line to see the first observed and last observed timestamps. By default, the date range displayed is the previous 30 days. Use the date picker to adjust the displayed range.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

Open WebUI

This is an Open WebUI web interface.

Platform query

software

Advantech IoTSuite

This is an Advantech IoTSuite system.

Platform query

risk

Exposed Flowise Application

This is an exposed HTTP service running Flowise. This web application provides an interface for building Large Language Models (LLM) workflows and agents. Exposure could lead to data leakage or unauthorized use of the system.

ASM risk query:

risks.name: `Exposed Flowise Application`

risk

Exposed Open WebUI Application

This is an exposed HTTP service running Open WebUI. This web application provides an interface for interacting with Large Language Models (LLM). Exposure could lead to data leakage or unauthorized use of the system.

Asm risk query:

risks.name: `Exposed Open WebUI Application`

Summary

Platform

  • Added the following aliases for Platform data fields:
    • threats
    • screenshots
    • sha1
    • org

ASM

  • Several improvements to the ASM web UI were made, including:
    • The workspace selection dropdown is now on the right side of the navigation bar.

    • Icons have been added to many of the items available in the top navigation dropdowns.

    • Scan frequency information is now located at the bottom of the Resources dropdown.

    • Added links to the Integrations dropdown to see all integrations, connected integrations, available integrations, and integrations that need attention.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

Coolify

This is Coolify, an open-source self-hosted platform for managing servers, applications, and databases.

Platform query

risk

Vulnerable n8n (Ni8mare) [CVE-2026-21858]

This is a service running a version of n8n workflow automation platform that is vulnerable to CVE-2026-21858 (Ni8mare), a critical unauthenticated Remote Code Execution vulnerability caused by a Content-Type confusion flaw in the webhook and file handling mechanism. Attackers can exploit this by sending specially crafted HTTP requests to form-based workflows to read arbitrary files, extract credentials, forge administrator sessions, and execute arbitrary commands..

ASM risk query:

risks.name: `Vulnerable n8n (Ni8mare) [CVE-2026-21858]`

Summary

ASM

  • ASM users can now configure their AWS Cloud Connectors to ingest or exclude cloud resources from the ap-east-2, ap-southeast-7, and ap-southeast-6 regions.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

HPE OneView

This is an HPE OneView infrastructure management platform.

Platform query

software

Hack the Box

This is a Hack the Box service or endpoint.

Platform query

risk

Unauthenticated NATS Service

A NATS messaging system is exposed without authentication. This allows unauthenticated clients to publish messages to subjects and subscribe to subjects to receive published messages, potentially exposing sensitive data or allowing unauthorized data manipulation.

ASM risk query:

risks.name: `Unauthenticated NATS Service`

risk

Unauthenticated ZeroMQ Service

A ZeroMQ service is exposed without authentication. ZeroMQ services allow unauthenticated clients to connect and interact with the messaging system, which introduces a risk of unintended data exposure or manipulation.

ASM risk query:

risks.name: `Unauthenticated ZeroMQ Service`

risk

Vulnerable SmarterMail [CVE-2025-52691]

This SmarterMail server is running a build version vulnerable to CVE-2025-52691, an arbitrary file upload vulnerability that allows unauthenticated attackers to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. Build versions 9406 and earlier are vulnerable.

ASM risk query:

risks.name: `Vulnerable SmarterMail [CVE-2025-52691]`

risk

Exposed HPE OneView

An HPE OneView infrastructure management application is exposed to the Internet.

ASM risk query:

risks.name: `Exposed HPE OneView`