Summary

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
softwareDatto RMMDatto RMM is a cloud-based tool used for remote monitoring and management (RMM).Platform query
softwareDatto SIRISDatto SIRIS is a business continuity and disaster recovery (BCDR) tool designed for MSPs.Platform query
softwareAteraAtera is an RMM tool.Platform query
softwareSimpleHelpSimpleHelp is an RMM tool.Platform query
softwareSplashtopSplashtop is an RMM tool.Platform query
softwareZoho AssistZoho Assist is an RMM tool.Platform query

New protocols and application scanners

Added support for the following protocols and applications.

Protocol/applicationQueryData availability
ANERMA_CF_FORTHPlatform queryData is only visible and searchable to users with access to the Critical Infrastructure module.
ICAPPlatform queryData is visible to and searchable by Starter, Core, and Enterprise users.
STUNPlatform queryData is visible to Starter users and is visible to and searchable by Core and Enterprise users.

Summary

Platform

  • Users with access to the Critical Infrastructure module can use the new Critical Infrastructure dashboard to quickly pivot through a filterable view of ICS/OT assets and data identified by Censys scans.

    • Use the dashboard to find assets of interest based on location, vendor, product name, protocol, text extracted from screenshots, and more. Learn more in the documentation.
  • Use new integrations to add Censys data enrichment to hosts, domains, certificates, and more to OpenCTI and CyWare.

    • These integrations were developed and are maintained by OpenCTI and CyWare, respectively.
  • Leverage the new get service history for a host API endpoint to retrieve time ranges during which services were detected on the host.

  • Use new extracted_text data on services and endpoints to find assets with screenshots that include keywords like vendor or product names, login interfaces, and more. This data can be found in the following new fields:

    • host.services.screenshots.extracted_text
    • host.services.endpoints.screenshots.extracted_text
    • web.endpoints.screenshots.extracted_text
    • extracted_text data is only available to users on the Core or Enterprise plans.

New fingerprints

Added the following fingerprints.

Note that new ASM risk fingerprints may be disabled by default in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

risk

Exposed Fast Reverse Proxy (FRP) Server

An exposed Fast Reverse Proxy (FRP) server dashboard has been detected. FRP is an open-source reverse proxy tool that allows users to expose internal services through NAT or firewalls to the internet without authorization. When deployed without IT approval, FRP constitutes shadow IT and creates significant security risks: it bypasses firewall controls, exposes internal services without proper security review, and has been observed being used by threat actors as a command-and-control tunneling mechanism.

ASM query:

risks.name: `Exposed Fast Reverse Proxy (FRP) Server`

risk

Exposed Gogs Application

This is an exposed HTTP service running Gogs. This self-hosted Git service often contains source code repositories, user credentials, and CI/CD configurations. The sensitive nature of the information contained in this application makes it a target.

ASM query:

risks.name: `Exposed Gogs Application`

risk

Exposed Gitea Application

This is an exposed HTTP service running Gitea. This self-hosted Git service often contains source code repositories, user credentials, and CI/CD configurations. The sensitive nature of the information contained in this application makes it a target.

ASM query:

risks.name: `Exposed Gitea Application`

risk

Exposed Nagios Fusion Application

A Nagios Fusion application is exposed to the internet. Nagios Fusion is a multi-server management platform that provides a unified view of monitoring servers. Exposure may allow unauthorized access to centralized monitoring management.

ASM query:

risks.name: `Exposed Nagios Fusion Application`

risk

Exposed Nagios Log Server Application

A Nagios Log Server application is exposed to the internet. Nagios Log Server is a centralized log management platform that can contain sensitive operational data. Exposure may allow unauthorized access to log data.

ASM query:

risks.name: `Exposed Nagios Log Server Application`

risk

Exposed Nagios Network Analyzer Application

A Nagios Network Analyzer application is exposed to the internet. Nagios Network Analyzer is a netflow and bandwidth monitoring tool that provides network traffic visibility. Exposure may allow unauthorized access to network analytics.

ASM query:

risks.name: `Exposed Nagios Network Analyzer Application`

risk

Exposed Nagios Core Application

A Nagios Core application is exposed to the internet. Nagios Core is an open-source monitoring platform that provides infrastructure monitoring and alerting. Exposure may allow unauthorized access to monitoring data.

ASM query:

risks.name: `Exposed Nagios Core Application`

risk

Exposed Nagios Cross Platform Agent Application

A Nagios Cross Platform Agent (NCPA) application is exposed to the internet. Nagios Cross Platform Agent (NCPA) is a cross-platform monitoring agent that provides system metrics and remote management capabilities. Exposure may allow unauthorized access to system metrics and agent management.

ASM query:

risks.name: `Exposed Nagios Cross Platform Agent Application`

risk

Exposed Nagios XI Application

A Nagios XI application is exposed to the internet. Nagios XI is an enterprise monitoring platform that provides infrastructure visibility and alerting. Exposure may allow unauthorized access to monitoring data and system management.

ASM query:

risks.name: `Exposed Nagios XI Application`

software

N-able Take Control

N-able Take Control is a remote support solution that can give users access to Windows, Mac, Linux, and mobile devices.

Platform query

software

GrowthBook

GrowthBook is the an open-source platform for feature flagging and experimentation.

Platform query

hardware

Coslat Firewall

This is a Coslat Firewall instance.

Platform query

software

Blackboard Transact Suite

Blackboard Transact Suite is a cloud-based campus management solution used in higher education for integrated payments, security, and commerce.

Platform query

software

Zoho Meeting

Zoho Meeting is an online meeting platform.

Platform query

software

RAGFlow

RAGflow is an open-source Retrieval-Augmented Generation (RAG) engine.

Platform query

software

Cisco Catalyst SD-WAN Manager

This is a Cisco Catalyst SD-WAN Manager server.

Platform query

software

Nagios Log Server

This is a Nagios Log Server for centralized log management.

Platform query

software

Nagios NCPA

This is a Nagios Cross-Platform Agent (NCPA) web interface.

Platform query

software

Nagios Fusion

This is a Nagios Fusion monitoring dashboard.

Platform query

software

Nagios Network Analyzer

This is a Nagios Network Analyzer for netflow analysis and bandwidth monitoring.

Platform query

software

Raspberry Shake

Raspberry Shake is a low-cost, professional-grade personal seismograph that pairs with a Raspberry Pi computer to detect ground vibrations, including earthquakes, volcanic activity, and human-made noise.

Platform query

software

Remotely Admin Console

Remotely is an open-source, self-hosted remote control and management solution built with .NET 8, Blazor, and SignalR, designed as a TeamViewer alternative.

Platform query

software

Neo4j Graph Database

Neo4j is a graph database management system detected via HTTP API JSON response.

Platform query

Summary

Platform UI updates

The Censys Platform web UI has been updated to make the search bar the focus on the home page and improve navigation.

Left-side navigation panel

  • The organization you are currently logged into is displayed in the top of the left-side nav bar. Switch to your Free account or another organization and access your organizational and personal settings from the organization drop-down.
    • Open the account selector menu, select your account or organization, and click the credits section to go to the Credit Management page.
  • Access to search and the dashboards for the Threat Hunting and Critical Infrastructure modules is now located in the Intelligence section of the left-side nav bar.
  • The My Work section contains your collections, a link to the Investigation Manager, and your search history.
  • The Resources section includes links to the Release Notes feed, the Censys Community. Additional resources like the Censys Academy and Data Definitions are nested under Learn in this section.

Alerts and Notifications

  • Access webhook configuration by clicking the bell icon for Alerts and Notifications in the top-right corner.

Personal Access Tokens, account management, and more

  • Create and manage Personal Access Tokens (PATs), manage your account, and switch between light and dark mode using the profile menu in the top right corner.

Platform Search History page

New protocols and application scanners

Added support for the following protocol.

Protocol/applicationQueryData availability
GEMINIPlatform queryVisible and searchable to all user tiers.

New fingerprints

Added the following fingerprints.

Note that new ASM risk fingerprints may be disabled by default in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

risk

Exposed Ollama Application

An exposed Ollama server. This application allows users to run and manage large language models (LLMs) locally. Exposing this service to the public internet can allow unauthorized access to AI models and computational resources.

ASM query:

risks.name: "Exposed Ollama Application"

hardware

TiVo DVR

This is a TiVo digital video recorder (DVR).

Platform query

software

Gitea

Gitea is a self-hosted Git service.

Platform query

software

Gogs

Gogs is a self-hosted Git service.

Platform query

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

As part of the plan to decommission Legacy Search (search.censys.io) in 2026, Censys will update its host data backend on March 28, 2026. In Legacy Search, this will result in changes to virtual host behavior, data freshness, select API fields, and other minor adjustments. These changes are described in detail below.

These changes do not remove host coverage from Legacy Search. Additionally, this change does not affect Platform (platform.censys.io) data or functionality.

Overall host coverage, scan cadence, historical data retention, existing functionality, query syntax, UI workflows, and entitlements in Legacy Search are not impacted.

Virtual hosts

The table below summarizes key changes to virtual host data after the change.

AreaBeforeAfterImpact
Virtual host definitionOne per each hostname and IP addressBased on latest scanned IP per portIncreased historical view of data
Service persistenceUp to 45 daysRemoved on next negative scan14-day expiry, yielding less stale data
IP associationServices persisted across IPsServices move scan IPsData “may” move between IPs
DuplicationCommonReducedMore accurate representation of web assets

Data freshness

  • Expiration is changing to 14 days (previously 45 days).
  • Index updates will occur only when a scan for that IP is received.
  • The "See Latest" UI indication may appear more often.
  • In general, there will be less long-lived stale data.

API and service lifecycle changes

  • Timeline API: Forward pagination will be removed. API users must set reversed=true.
  • Service lifecycle: Services pending removal will be immediately removed from assets when a scan indicates they are no longer visible, instead of being marked as pending.

Removed fields

The following fields will be removed from Legacy Search:

  • services.parsed.rocketmq.version (RocketMQ)
  • services.ipp.response (IPP)
  • services.ipp.cups_response (IPP)
  • services.elasticsearch.http_info (Elasticsearch)
  • services.tls.server_key_exchange (TLS)
  • services.prometheus.http_info (Prometheus)
  • services.transport_fingerprint.* (Transport)

DNS records

  • dns.records.record_type will no longer return CNAME.
  • Record types will be limited to A and AAAA only.

Certificate API update frequency

The update frequency for the following APIs will change from realtime to every six hours:

  • /v2/hosts/{ip}/certificates
  • /v2/certificates/{fingerprint}/observations

We encourage you to review your workflows and integrations to prepare for these upcoming changes. If you have any questions or concerns about this transition, please reach out to our team at [email protected].

Summary

New protocols and application scanners

Added support for the following protocols and applications.

Protocol/applicationQueryData availability
CISCO_NSIPlatform queryData is only visible to and searchable by Core and Enterprise users.
FLASH_SOCKET_POLICYPlatform queryData is only visible to and searchable by Core and Enterprise users.
MELSECPlatform queryData is only visible to and searchable by users with access to the Critical Infrastructure module.
MEMBERLISTPlatform queryData is only visible to and searchable by Core and Enterprise users.
ROUTEROS_APIPlatform queryData is only visible to and searchable by Core and Enterprise users.
RUSTDESK_HEARTBEATPlatform queryVisible to and searchable by all user tiers.
RUSTDESK_RELAYPlatform queryVisible to and searchable by all user tiers.
RUSTDESK_RENDEZVOUSPlatform queryVisible to and searchable by all user tiers.

New fingerprints

Added the following fingerprint.

Note that new ASM risk fingerprints may be disabled by default in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

risk

Exposed NextGen Healthcare Mirth Connect

A NextGen Healthcare Mirth Connect administrator interface is exposed to the internet. Mirth Connect is healthcare integration software that processes and transforms medical data. Exposure may allow unauthorized access to sensitive health information.

ASM query:

risks.name: "Exposed NextGen Healthcare Mirth Connect"

Summary

Platform

  • To improve usability, when web properties have multiple endpoints they are now collected on a single hostname and port card instead of split across multiple cards.

  • Redirect chains are now shown on host service and web endpoint cards.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
operating_systemApple macOSThis is a device running Apple macOS.Platform query
softwareFortinet FortiClient Endpoint Management ServerThis is a FortiClient Endpoint Management Server (EMS). EMS is a security management solution that enables scalable and centralized management of multiple endpoints.Platform query
softwareQuestDBThis is a QuestDB instance. QuestDB is an open-source time-series database.Platform query

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

Summary

Platform

Threat Hunting

  • Platform Threat Hunting users can use the new Platform threat history API endpoints to obtain the history of any threats present on a host or web property.
    • You can define a specific time frame of interest for each of these endpoints. If you do not specify a time frame, this endpoint will search the historical dataset that is available to your account.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
softwareDrayTek SSL VPNThis is a DrayTek SSL VPN server.Platform query
softwareFatPipe MPVPNThis is a FatPipe MPVPN server.Platform query
softwareH3C SSL VPNThis is an H3C SSL VPN server.Platform query
softwareJuniper Secure ConnectThis is a Juniper Secure Connect VPN client application.Platform query
softwareQiAnXin VPNThis is a QiAnXin (奇安信) VPN server.Platform query
softwareRuijie SSL VPNThis is a Ruijie SSL VPN server.Platform query
softwareSaima Systems VPNThis is a Saima Systems Saiwall-MS VPN server.Platform query
softwareSangfor SSL VPNThis is a Sangfor SSL VPN server.Platform query
softwareOdooOdoo is an open-source ERP and CRM system.Platform query
softwareWordPressWordPress is a free and open-source content management system (CMS) based on PHP and MySQL.Platform query

Summary

Platform

  • The new Service History timeline on host records is a visualization of service presence over time broken down by protocol and port pairs. Use it to quickly understand service history, persistence, anomalies, and other points of interest.

  • Added several parsed data fields for HTTP redirect chains to hosts and web properties.

    • Use this data to map relationships, identify misconfigurations, find parked domains, locate abandoned infrastructure, and more. For example, run web.endpoints.http.redirect_chain.hostname="censys.com" to find web properties that redirect to censys.com.

    • Redirect data is provided in the following fields.

      FieldDescription
      [host.services or web].endpoints.http.redirect_chainThe nested object that contains redirect chain data.
      *.endpoints.http.redirect_chain.reasonThe reason for the redirect. Can be HTTP_3XX, REFRESH_HEADER, or UNRECOGNIZED.
      *.endpoints.http.redirect_chain.transport_protocolThe transport protocol used for the redirect.
      *.endpoints.http.redirect_chain.hostnameThe hostname that the redirect points to.
      *.endpoints.http.redirect_chain.pathThe path that the redirect points to, like /, /login, /admin, and so on.
      *.endpoints.http.redirect_chain.portThe port that the redirect points to.
    • Redirect data is visible to and searchable by users on the Core and Enterprise plans. Redirect data is visible to Starter and Free users, but they cannot search across it.

  • You can now use the Censys Assistant to quickly generate human-readable summaries of certificates and web properties in the Platform web UI.

  • Version 1.0 of the cencli command line tool was released. It includes:

    • The option to retrieve informative and conciseshort outputs for numerous commands.
    • New org commands to view organization details including credits, members, and organization information.
    • Support for streaming output, allowing you to fetch large amounts of data without performance issues.

New fingerprints

Added the following fingerprints.

Note that new ASM risk fingerprints may be disabled in your workspace. Reference your risk type configuration in the ASM web console to review new risk types.

Type

Name

Description

Query

software

OpenClaw Interface

OpenClaw (formerly Clawdbot/Moltbot) is an open-source personal AI assistant that can execute commands, automate tasks, and manage workflows on the host system.

Platform query

risk

Exposed OpenClaw Interface

An OpenClaw control interface is exposed to the internet. OpenClaw (formerly Clawdbot/Moltbot) is an open-source personal AI assistant that can automate tasks on the host system. Exposing this interface may allow unauthorized access to execute arbitrary commands and access sensitive data.

ASM risk query:

risks.name= `Exposed OpenClaw Interface`

risk

EIP (EtherNet/IP) Service Exposed

This service is running EtherNet/IP (EIP), an industrial communication protocol for PLCs, HMIs, and industrial automation equipment. Exposure could allow attackers to read/write PLC programs, modify control logic, disrupt industrial processes, or cause equipment damage.

ASM risk query:

risks.name= `EIP (EtherNet/IP) Service Exposed`

risk

CODESYS Service Exposed

This service is running CODESYS, an automation platform for industrial control systems. Exposure could allow attackers to read/write PLC programs, modify control logic, disrupt industrial processes, or cause equipment damage.

ASM risk query:

risks.name= `CODESYS Service Exposed`

risk

Exposed MCP Inspector

Exposed MCP Inspector instance. This is a visual developer tool for testing and debugging Model Context Protocol servers.

ASM risk query:

risks.name="Exposed MCP Inspector"

risk

Vulnerable SmarterMail [CVE-2026-23760]

This SmarterMail server is running a build version vulnerable to CVE-2026-23760, a critical authentication bypass vulnerability that allows unauthenticated attackers to reset administrator accounts without verifying credentials or reset tokens. Since SmarterMail administrator privileges include the ability to execute operating system commands, successful exploitation results in complete administrative compromise with SYSTEM or root-level access on the underlying host. Build versions 9510 and earlier are vulnerable.

ASM risk query:

risks.name="Vulnerable SmarterMail [CVE-2026-23760]"

Summary

  • Use the new cloud asset context in ASM to help you identify asset ownership for easier remediation. This contextual metadata is retrieved for all assets sourced from the AWS, GCP, and Azure Cloud Connectors and the Wiz integration.
  • You can now obtain your Platform organization ID from the Account Management page in the Platform web console.
  • Added three new software fingerprints for TorGuard VPN servers, Nessus Vulnerability Scanners, and Scope Sentry.

ASM

  • Use cloud asset context in ASM to help you identify asset ownership for easier remediation.

    • You can see the context data for an asset by clicking the linked text in the Source column in the Inventory table view in the ASM web console.
    • Contextual metadata is retrieved for all assets sourced from the AWS, GCP, and Azure Cloud Connectors and the Wiz integration.
    • This data is shown in the ASM web console and can be queried by the inventory search API endpoint.

Platform

  • You can now obtain your organization ID from the Account Management page in the Platform web console.
    1. Open the Platform web console and ensure that your organization account is selected. Go to Settings > Account Management > Personal Access Tokens.

    2. The ID for your organization is shown in the "Current Organization" box. Click Copy to copy it to your clipboard.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
softwareTorGuard VPN serverThis is a TorGuard VPN server.Platform query
softwareNessus Vulnerability ScannerThis is a Nessus vulnerability scanner, a tool developed by Tenable for identifying security issues.Platform query
softwareScope SentryThis is a Scope Sentry instance. Scope Sentry is a tool with functions such as asset mapping, subdomain enumeration, information leakage detection, vulnerability scanning, directory scanning, subdomain takeover, crawler, and page monitoring.Platform query

Summary

Platform

  • The Censys Assistant AI tool is now available in the Platform web app for all users. Use the assistant to input questions or prompts in a natural language and obtain answers based on the assets and data present in the Censys Internet Map. Learn more about the assistant in the video below.

  • Use the new audit log in the UI or API to review user and organization events for the Platform and user, organization, and workspace events for Attack Surface Management (ASM).

    • The Censys team has started migrating ASM customers to the Platform for organization management. Contact your Censys team representative to learn more about migrating your team.
  • Use personalized fields in the Platform web app to highlight data fields of interest in your search results.

    • Using personalized fields does not filter your search results like the filters on the left side of the page; it simply displays your configured fields on results that have already been returned by your query.
  • You can now target a time range up to 365 days with the get organization credit usage and get organization member credit usage API endpoints.

  • Added an API endpoint to retrieve Free user credit usage information.

Threat Hunting

  • Use the new threat history visual timeline on hosts and web properties to quickly understand previous threat presence on an asset.

    • Hover over a plot line to see the first observed and last observed timestamps. By default, the date range displayed is the previous 30 days. Use the date picker to adjust the displayed range.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

Open WebUI

This is an Open WebUI web interface.

Platform query

software

Advantech IoTSuite

This is an Advantech IoTSuite system.

Platform query

risk

Exposed Flowise Application

This is an exposed HTTP service running Flowise. This web application provides an interface for building Large Language Models (LLM) workflows and agents. Exposure could lead to data leakage or unauthorized use of the system.

ASM risk query:

risks.name: `Exposed Flowise Application`

risk

Exposed Open WebUI Application

This is an exposed HTTP service running Open WebUI. This web application provides an interface for interacting with Large Language Models (LLM). Exposure could lead to data leakage or unauthorized use of the system.

Asm risk query:

risks.name: `Exposed Open WebUI Application`