Example Queries
Use these example queries to explore your ASM inventory. Build your own queries using Censys Search Language (CSL) syntax.
General queries
| Query description | Query syntax | Run query in ASM |
|---|---|---|
| Find assets with risk | risks: * | Try it |
| List assets with a tag | tags: {example, example2} | Try it |
| Find all assets with a useful keyword in their name | web_entity.name: /.*dev.*/ OR certificate.names: /.*dev.*/ OR domain.name: /.*dev.*/ OR storage_bucket.name: /.*dev.*/ | Try it |
| Find assets discovered by Censys | source: "Censys Found Seed" or source: "Censys Scan" | Try it |
Host queries
Query description | Query syntax | Run query in ASM |
|---|---|---|
Find hosts whose IP address is within a range, written using CIDR notation or using initial and terminal values in brackets |
OR
| |
Find SSH services running on non-standard ports |
| |
Find hosts that support SSLv3, TLSv1.0, and TLSv1.1 |
| |
Hosts and web entities with exposed API endpoints | | Try it |
Hosts with exposed hardware and a self-signed certificate | | Try it |
Hosts with open ports associated with common services and high or critical risks | | Try it |
Web entity queries
Query description | Query syntax | Run query in ASM |
|---|---|---|
Find web entities that are serving one of the following HTTP applications |
| |
Web entities and hosts not behind Cloudflare | | Try it |
Find web entities that are redirecting to another location |
| |
Find web entities that are using a plain HTTP connection |
| |
Web entities with the default landing page label |
| Try it |
Find web entities that support SSLv3, TLSv1.0, and TLSv1.1 |
| Try it |
Vulnerability and risk queries
Query description | Query syntax | Run query in ASM |
|---|---|---|
Web entities with high-severity risks |
| |
High and critical risks discovered in the past three days |
| Try it |
Identify services with executables presenting in the HTTP body |
| |
List assets with a recently detected risk |
| |
Find potentially unknown assets with severe risks |
| |
Find newly discovered assets with a risk |
| |
Find hosts presenting a self-signed certificate |
| |
Find hosts presenting a certificate whose trust status is revoked |
| |
AWS storage exposed | | Try it |
Potential shadow cloud
| Query description | Query syntax | Run query in ASM |
|---|---|---|
| Search for hosts located in data centers outside of your sanctioned clouds | host.ip: * and not host.cloud:{aws, ovh} | Try it |
| Search for potentially unknown hosts in major Cloud Providers | source:"censys scan" and host.cloud: {"Amazon Aws", "Google Cloud", "Microsoft Azure", "Alibaba Cloud", "Soft Layer Technologies Inc.", "Tencent Cloud", "Digital Ocean Inc.", "Hetzner Online", "Verizon Communications Inc.", "Oracle Cloud", "Huawei Cloud Service", "US Signal", "Switch Communications Group LLC", "Internap Corporation", "Tier Point LLC", "American Internet Services", "Arvixe", "Cologix Inc.", "Confluence Networks Inc."} | Try it |
Updated 26 days ago
