Feature and Data Access Tiers

Censys offers tiered data and feature access solutions for a wide range of users, from hobbyists to enterprise security teams. All users have a Censys Free account that offers basic internet visibility, access to basic protocols and certificates, and limited web property data such as root endpoints.

To access more detailed data that provides deeper insights, you must upgrade to a higher tier account. Each tier builds upon comprehensive internet scanning data, offering progressively deeper scan results and context about assets and their importance to security workflows.

Censys offers four main tiers: Censys Free, Censys Starter, Censys Search, and Censys Enterprise. These tiers are often referred to as plans, levels, or entitlements.

Any Censys Free user may upgrade their account to the Censys Starter tier by purchasing Censys Credits. To gain access to Censys Search or Censys Enterprise-level data and features, contact the Censys sales team.

Additional modules and add-ons, like the Adversary Investigation module and the Critical Infrastructure module, are available to Censys Enterprise customers to address specific use cases.

If you encounter data with a lock icon next to it, you must upgrade or switch to an upgraded account to access it. Upgrading your account unlocks this data and provides enhanced security insights. You can see a list of data that is available and unavailable to you on the Data Definitions page in the Platform console.

You may also see the following image or a similar one when attempting to access a feature that is unavailable to your tier.

Overview

The following tables explain which data and features are available to each Platform tier.

Data access

Data featureCensys FreeCensys StarterCensys SearchCensys Enterprise
Basic protocols and data (HTTP, RDP, SSH, telnet, and more - 41 protocols total)YesYesYesYes
Basic context data (software product and vendor information, and more)YesYesYesYes
LabelsYesYesYesYes
Host DNS and WHOIS informationYesYesYesYes
Advanced protocols and protocol data (MQTT, IPP, and more - over 140 protocols)Visible on records but not searchableMost protocol data is visible and searchable; some data is only available in higher tiers or additional modulesAlmost all protocol data is visible and searchable; some data is only available in additional modulesAlmost all protocol data is visible and searchable; some data is only available in additional modules
Additional context data (software and hardware and component CPE values, version data, life cycle information, and more)NoNoYesYes
Host historyNo1 week30 days or more, depending on access level purchased30 days or more, depending on access level purchased
Certificate data including extensions, chains, ZLint data, and moreCertificate data is visible but not all is searchableAll certificate data is visible and searchableAll certificate data is visible and searchableAll certificate data is visible and searchable
Host and web property CVE and risk data (CVE IDs, KEV presence, and more)NoNoNoYes
Root (/) and non-root (/account/login, /admin/login.html, for example) endpoint dataYesYesYesYes
HTTP redirect chain data for host services and web propertiesVisible but not searchableVisible but not searchableVisible and searchableVisible and searchable
Deep application scan data for Cobalt Strike, Kubernetes, Elasticsearch, and moreNoNoYesYes
Threat dataNoNoNoCensys Enterprise users can view some threat data on host and web property records; to search and pivot across threat data, users must have access to the Adversary Investigation module
Open directory data and threatsNoNoNoYes - with Adversary Investigation module
JARM fingerprints and context hashes (JARM, JA4X, JA3S, and more)NoNoNoYes - with Adversary Investigation module
ICS protocols and screenshotsNoNoYes - with Critical Infrastructure moduleYes - with Critical Infrastructure module
CVE vulnerability dataNoNoNoYes

Features

FeatureCensys FreeCensys StarterCensys SearchCensys Enterprise
API accessYes - lookup endpoints onlyYesYesYes
Single sign-on (SSO)NoNoYesYes
Additional organization usersNoNoYesYes
Regular expression in query syntaxNoYesYesYes
Censys AssistantYes - assistant prompt responses may consume creditsYes - assistant prompt responses may consume creditsYes - assistant prompt responses may consume creditsYes - assistant prompt responses may consume credits
Censys Query AssistantYesYesYesYes
Matched fields for search resultsYesYesYesYes
Download search results in CSV formatNoNoYesYes
Pages of search results (100 per page)15UnlimitedUnlimited
Maximum concurrent actions111010+
Collections1 with a maximum of 100 assets210+15+
WebhooksNoYesYesYes
Live RescanNoNoYesYes
Live DiscoveryNoNoNoYes - with Adversary Investigation module
Explore Threats pageNoNoNoYes - with Adversary Investigation module
Investigation ManagerNoNoNoYes - with Adversary Investigation module
CensEye automated pivoting toolNoNoNoYes - with Adversary Investigation module
Certificate history timelineNoNoNoYes - with Adversary Investigation module
Web screenshots (including extracted text data)NoNoYesYes
MCP ServerNoYesYesYes
Suspicious Directory threat, open directory metadata, and open directory UINoNoNoYes - with Adversary Investigation module

Tier information

Censys Free

The Censys Free tier is designed for preliminary security investigations and is useful for testing Platform functionality. Users can search and view basic protocols and services, but some protocols and their attendant data are excluded.

Basic host, web property, and certificate information is searchable and viewable for Censys Free users. To search for additional certificate fields and view historical host data, you must upgrade to a paid tier. Censys Free users are limited to 1 page of 100 results.

Censys Starter

If you purchase credits through the Censys website, your account is upgraded to the Starter tier, granting you API access, additional internet visibility and actionable insights.

Starter tier accounts are limited to a maximum of 500 results per search query, with 100 results shown per page.

Censys Search and Censys Enterprise

Both of these tiers include all of the features of the Censys Starter tier.

Vulnerability data is not available to the Censys Search tier, but is available to the Censys Enterprise tier.

Both tiers offer full protocol data access and advanced internet visibility provided by deep application scanners. This allows you to search and view protocols, services, web applications, and view 30 days of host history, excluding industrial control system (ICS) protocols. Censys Enterprise search results include all CPE-based fields and provide access to unlimited paginated results.

Censys Enterprise customers may view some threat data, but cannot search and pivot off of it. To see complete threat data and search and pivot across it, you must have access to the Adversary Investigation module, which may be purchased by Censys Enterprise customers.

Threat data is not visible to Censys Search customers.

Censys Enterprise customers may purchase access to Critical Infrastructure data separately.