Platform Application and Endpoint Data
Censys uses sophisticated scanners to identify specific applications and non-root endpoints present on web assets. This document explains how to find and use application and non-root endpoint data.
Application data
Censys uses specialized scanners that identify details about services that run on top of HTTP. They go beyond a basic HTTP scan, offering richer detail about specific services. The information obtained from these scans is available in named data objects and fields for host service and web property endpoints.
Application-specific data is only available to customers on the Platform Enterprise plan. Industrial control system (ICS) application data is only available to customers with access to ICS protocols.
The data obtained from these scans allow you to:
- Enumerate high-risk services exposed to the public internet.
- Collect detailed application metadata, providing deeper visibility than basic banner grabs.
- Inform SOC, IR, and threat intel teams about exposures that adversaries actively seek and exploit.
The following table lists some of the application-specific scanners that Censys uses and the data objects or field paths used for recording their information. Where available, the application name links to the section of the web property Data Definitions table in the Platform web console that lists all of the data fields available for the application. Note that endpoint data is also available on hosts.
Application | Description |
---|---|
Chrome DevTools | Remote debugging interfaces. |
Cobalt Strike | C2 and threat emulation framework. |
Elasticsearch | Search and indexing engine. |
FortiGate | Perimeter firewall device. |
GraphQL | API query language. |
Ivanti Avalanche | Device and endpoint management. |
Kubernetes | Container orchestration. |
Ollama | AI and machine learning tooling. |
Plex Media Server | Media devices. |
Pprof | Go profiling interface. |
Prometheus | Monitoring and metrics system. |
Prometheus Target | Discovered service endpoints. |
Red Lion Web | Human-machine interfaces and other devices. |
Scada_View | Software used for industrial automation. |
The next two sections walk through how to use application data in real-world scenarios.
Cobalt Strike application data
Cobalt Strike is a penetration testing tool. However, it is commonly abused by threat actors for post-exploitation and command-and-control (C2) operations. Detecting exposed Cobalt Strike servers helps identify compromised environments or adversary-controlled infrastructure before widespread exploitation.
This section explains how you can use application data from Censys to protect your organization using an example web property record that Cobalt Strike was detected on.

Cobalt Strike was detected on the web property record shown above. You can incorporate this IP into your blocklist or cross-reference it with egress traffic in your SIEM to determine whether there were any communications between your devices and this IP. You can monitor your network for any beacons by looking for periodic HTTP requests to 45.192.104.206
over port 6003.

Additional application details for Cobalt Strike on the example web property record.
You can use the following application-specific data for further investigation. Most of this information is shown on the endpoint preview card. All scan data is available in the raw data output on the web property.
-
The URIs
/activity
,/ga.js
, and/submit.php
. In the Cobalt Strike data object, these values are contained in thehttp_get.uri
field. -
The user agent values
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BOIE9;ENUS)
andMozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENIN)
. This information is located in theuser_agent
field for the Cobalt Strike endpoint. -
The
sleep_time
value of 60 seconds. -
The absence of SSL. In the raw data output for this endpoint, the value for
ssl
isfalse
. -
You can use additional details like the
watermark
value to determine whether this Cobalt Strike service is being used for red team testing or malicious purposes. Additionally, you can create a collection to track resources that use the same watermark for continuous monitoring and alerting.
The data provided by the Cobalt Strike scanner in this example is much richer than a standard HTTP scanner. For example, contrast the Cobalt Strike scan data with the data obtained from an HTTP scan in the Platform. The data from the HTTP scanner is significantly less actionable than the data from the app scanner.

FortiGate application data
FortiGate firewalls are widely used for perimeter defense. If exposed, they can reveal, VPN access points, administrative panels, and security policy misconfigurations. Attackers actively scan for exposed FortiGate VPN endpoints due to known vulnerabilities (such as CVE-2022-42475) that allow remote code execution.
This section explains how you can use application data from Censys to protect your organization using an example web property record that FortiGate was detected on.

You can use the following application-specific data for further investigation. Most of this information is shown on the endpoint preview card. All scan data is available in the raw data output on the web property.
- This FortiGate instance is running version 7.2.3 (
web.endpoints.fortigate.version
in the raw data) and is mapped to multiple CVEs. - The TLS certificate is self-signed by Fortinet and is not trusted by major browsers (validation failed for NSS, Microsoft, Apple, Chrome).
- The
Strict-Transport-Security
HTTP header is is present but missingincludeSubDomains
(recorded inweb.endpoints.banner
). Additionally, the max-age is less than one year. You could flag this for your team to harden response headers. - Based on known firewall standards (NIST, ISO 27001), externally accessible firewall UIs are non-compliant.
- Given the existence of several critical and high CVEs associated with this FortiGate version, it is worthwhile to upgrade to the latest version.
Endpoint data
Extensive data about exposed endpoint paths beyond the root /
are available in the Platform datasets. In the Platform data schema, this information is available in the host.services.endpoints.path
and web.endpoints.path
fields. Examples of deeper endpoint paths include /webpages/login.html
, /sonicui/7/login/
, /admin/login.asp
, and so on. This data allows you to uncover detailed information about web applications beyond the ones that Censys has named scanners and data objects for.
Use a report for hosts or web properties broken down by the path
field to see example values that are useful for your investigations.
Updated 1 day ago