Jump to Content
Censys Documentation
HomeDocumentationAPI ReferenceChangelog
Log InCensys Documentation
Documentation
Log In
v1.0HomeDocumentationAPI ReferenceChangelog
All
Pages
Start typing to search…

Product Information and Updates

  • Internet Scanning
    • Scanning FAQ
  • Release Notes
  • Research Access to Censys Data
  • Opt Out of Data Collection
  • Policy for Enhancement Requests
  • Policy for Sharing Censys Rapid Response Queries

Platform

  • Get Started
    • Quick Start Guide
    • Feature and Data Access Tiers
    • Live Rescan
    • Organization Switcher
    • Report Builder
    • Transition to Censys Platform from Legacy Search
      • Transition Guide for Enterprise Customers
      • Transition Guides for Free Users, Solo, and Teams Subscribers
      • Platform API Transition Guide
      • Dataset Differences: Censys Platform vs. Legacy Search
      • Censys Platform Syntax Differences
      • Query Converter
  • Threat Hunting
    • CensEye
    • Certificate History
    • Explore Threats
    • Investigation Manager
    • Live Discovery
    • Open Directory Data and Threats
    • Threat Data
  • Administration
    • Organization Management
    • Role-Based Access Control
    • SAML Authentication
    • Delete Account
  • Browser Extension
  • Censys Credits
    • Credits for Core and Enterprise Organizations
    • Credits for Free and Starter Users
    • Manage and Monitor Censys Credits
  • Censys Query Language
    • Query Assistant
    • Relative Time in CenQL
    • Regex in CenQL
  • Collections
    • Create, Delete, or Archive a Collection
    • Track and Monitor Collections
    • Share a Collection
    • Collection Webhooks
      • Slack Collection Webhooks
    • Troubleshooting Collection Issues
  • Platform API and SDKs
  • Platform Datasets
    • Platform Host Dataset
    • Platform Web Property Dataset
    • Platform Certificate Dataset
    • Platform Application and Endpoint Data
    • Platform ICS Protocols
  • Platform MCP Server
  • Platform FAQs
  • Web Screenshots

Attack Surface Management

  • Get Started
    • Quick Start Guide
    • ASM Overview Dashboard
      • Trends & Benchmarks
      • Ports & Protocols
      • Metrics
      • Reports
    • Seed Your Attack Surface
      • Use Censys to Find Seeds
    • Understand and Investigate Your Attack Surface
    • Build, Save, and Automate Queries
      • Example Queries
    • Activity Logbook
      • Logbook REST API Event Catalog
    • Workspaces and User Access
  • ASM MCP Server
  • Integrations
    • Cloud Connectors
      • AWS Hosted Cloud Connector
      • Azure Hosted Cloud Connector
      • GCP Hosted Cloud Connector
    • Atlassian Jira
    • Cisco Webex Teams
    • Google Security Operations
    • Microsoft Sentinel
    • Microsoft Teams
    • Qualys VMDR
    • Rapid Response Email Notifications
    • Risk Email Notifications
    • ServiceNow CMDB
    • ServiceNow ITSM
    • ServiceNow VR
    • Slack
    • Splunk
    • Tenable Vulnerability Management
    • Webhook
    • Wiz
  • Inventory Assets
    • Hosts
      • Host Data Definitions (ASM)
    • Certificates
      • Certificate Data Definitions (ASM)
    • Web Entities
      • Web Entity Data Definitions (ASM)
    • Domains
      • Domain Data Definitions (ASM)
    • Storage Buckets
      • Storage Bucket Data Definitions (ASM)
    • Software
    • Exclude Assets
  • Risks
    • Risk Categories
    • Configure Risks
    • CVE Risks
      • CVE Risks FAQ
  • Shrink Your Attack Surface
    • Secure Subsidiaries, Acquisitions, and Mergers
    • Eliminate Shadow IT
    • Identify Unsanctioned Cloud Usage
  • ASM API

Legacy Search

  • Get Started
    • Quick Start
    • Introductory Use Cases
    • Export Search Results
  • Censys Search Language
    • Regular Expression (Regex) in Legacy Search
    • Advanced Legacy Search Methods and Queries
    • Legacy Search and CSL FAQs
  • Legacy Search Datasets
    • Hosts
      • Virtual Hosts
      • Autonomous System
      • C2 Label
      • DNS
      • JARM
      • Labels
      • Location
      • Operating System
      • Service Information
      • Software
      • TLS
      • WHOIS
    • Certificates
      • Certificate Transparency and Precertificates
      • Lite Certificates
    • CVE Context
  • Administration and Authentication
    • Manage a Team
    • View Your Quota
    • Enable and Configure SAML
      • Microsoft AD FS SSO
      • Azure Active Directory SSO
      • Okta SSO
      • Ping Identity SSO
    • Delete Account or Cancel Subscription
  • Legacy Search Video Walkthroughs
    • Find Malicious Infrastructure Assets
    • Vendor Compliance
    • Monitor SSL TLS Certs
    • Find Rogue Assets
  • Legacy Search API

ASM and Legacy Search Developer Resources

  • Legacy Search and ASM Python CLI
  • Censeye Automated Threat Hunting Tool
  • Legacy Search Integrations

Data Downloads

  • Platform Data Downloads
  • Download Censys Universal Internet Dataset
  • Download Certs 2.0 Data

ASM API

Complete documentation for all Attack Surface Management (ASM) API endpoints is available in the ASM web console.

Updated 12 days ago


Identify Unsanctioned Cloud Usage
Get Started