Platform Application and Endpoint Data

Censys uses sophisticated scanners to identify specific applications and non-root endpoints present on web assets. This document explains how to find and use application and non-root endpoint data.

Application data

Censys uses specialized scanners that identify details about services that run on top of HTTP. They go beyond a basic HTTP scan, offering richer detail about specific services. The information obtained from these scans is available in named data objects and fields for host service and web property endpoints.

Application-specific data is only available to customers on the Censys Search and Censys Enterprise plans. Industrial control system (ICS) application data is only available to organizations that purchase the Critical Infrastructure module.

The data obtained from these scans allow you to:

  • Enumerate high-risk services exposed to the public internet.
  • Collect detailed application metadata, providing deeper visibility than basic banner grabs.
  • Inform SOC, IR, and threat intel teams about exposures that adversaries actively seek and exploit.

The following table lists some of the application-specific scanners that Censys uses, links to search for those applications, and describes the data Censys obtains for those apps.

Application name in Censys

Description

CHROME_DEVTOOLS

Remote debugging interfaces. Censys retrieves protocol, user agent, target information, and more.

COBALT_STRIKE

The Cobalt Strike C2 and threat emulation framework. Censys scanners obtain watermark data, beacon sleep time and jitter information, and much more.

ELASTICSEARCH

Elasticsearch search and indexing apps. Censys can retrieve a wide variety of data points about Elasticsearch instances.

FORTIGATE

Fortinet perimeter firewall devices. Censys data includes version info, status messages, and more.

GRAPHQL

Applications using the GraphQL API query language. Censys scanners obtain response and introspection data.

IVANTI_AVALANCHE

Ivanti Avalanche device and endpoint management apps. Data includes version, body, and status codes.

JENKINS

An open-source automation server. Censys data includes node, label, and job information.

KUBERNETES

Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Censys data includes roles, versions, endpoints, and more.

OLLAMA

Ollama is an open-source tool for running large language models (LLMs). AI and machine learning tooling. Data obtained from Censys scanners includes models, version info, and more.

OPEN_DIRECTORY

Web-accessible directories. Censys scanners retrieve information about file and directory names, file sizes, extensions, and more. Some open directories are marked as suspicious by Censys. Note that open directory metadata is only available to users with access to the Adversary Investigation module.

MCP

Anthropic's open-source protocol used for connecting AI applications with other tools. Censys obtains data about the tools, resources, and prompts used by applications leveraging MCP.

  • Tools are callable functions that a client can invoke, such as executing a command.
  • Resources are addressable data sources, typically referenced by URI, that a client can retrieve for context. This may be a configuration file or even API keys.
  • Prompts are predefined templates that guide client interactions with the server.
PLEX_MEDIA_SERVER

Plex servers are used for storing videos, music, and other files.

PPROF

pprof is a Golang profiling tool that collects and visualizes runtime performance data (CPU, memory, goroutines, and so on) to help identify bottlenecks in software.

Censys collect metadata about the following:

  • Allocation profile: history of memory allocations.
  • Heap: current heap usage (objects still in memory).
  • Goroutine: number of active goroutines.
  • Threadcreate: number of OS threads created.
  • Block: time spent for goroutines waiting on syncs.
  • Mutex: thread-based mutex count.
  • Profile: CPU profiling stats (time spent).
  • Trace: fine-grained runtime event timeline.

If a pprof service is open to the public, an attacker could get access to raw memory of the running process, and obtain stack traces of the current application.

PROMETHEUS

Prometheus is a monitoring and metrics system. Censys' Prometheus scanner identifies what a Prometheus server is monitoring and displays metadata about its configuration and environment.

  • Active scrape targets: discovered addresses, metrics paths, jobs, resolved labels, scrape URLs, last scrape time, health status, and any errors.
  • Dropped targets: discovered targets that were identified but not included in scraping.
  • Config exposed: indicates whether the Prometheus configuration is publicly accessible.
  • Build information: Prometheus version, revision, and Go runtime version.
PROMETHEUS_TARGET

PROMETHEUS_TARGET represents an individual scrape endpoint and the metrics it exposes, including a list of available Prometheus metrics (name and description) and what the service exports (such as process stats, Go runtime metrics, and application-specific counters).

These metrics can reveal details about the underlying system, runtime (like Go), and application behavior (such as Docker engine, etcd, and swarm state).

REDLION_WEB

Red Lion web instances. Censys data includes log names, titles, and more. This data is only available to users with access to the Critical Infrastructure module.

SCADA_VIEW

Software used for industrial automation. The Censys SCADAview scanner attempts to capture a screenshot of the underlying HMI, if accessible. It also retrieves any built-in title and description exposed by the interface, as defined by the system owner.

This data is only available to users with access to the Critical Infrastructure module.

The next two sections walk through how to use application data in real-world scenarios.

Cobalt Strike application data

Cobalt Strike is a penetration testing tool. However, it is commonly abused by threat actors for post-exploitation and command-and-control (C2) operations. Detecting exposed Cobalt Strike servers helps identify compromised environments or adversary-controlled infrastructure before widespread exploitation.

This section explains how you can use application data from Censys to protect your organization using an example web property record that Cobalt Strike was detected on.

Cobalt Strike was detected on the web property record shown above. You can incorporate this IP into your blocklist or cross-reference it with egress traffic in your SIEM to determine whether there were any communications between your devices and this IP. You can monitor your network for any beacons by looking for periodic HTTP requests to 45.192.104.206 over port 6003.

Additional application details for Cobalt Strike on the example web property record.

You can use the following application-specific data for further investigation. Most of this information is shown on the endpoint preview card. All scan data is available in the raw data output on the web property.

  • The URIs /activity, /ga.js, and /submit.php. In the Cobalt Strike data object, these values are contained in the http_get.uri field.

  • The user agent values Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BOIE9;ENUS) and Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENIN). This information is located in the user_agent field for the Cobalt Strike endpoint.

  • The sleep_timevalue of 60 seconds.

  • The absence of SSL. In the raw data output for this endpoint, the value forssl is false.

  • You can use additional details like the watermark value to determine whether this Cobalt Strike service is being used for red team testing or malicious purposes. Additionally, you can create a collection to track resources that use the same watermark for continuous monitoring and alerting.

The data provided by the Cobalt Strike scanner in this example is much richer than a standard HTTP scanner. For example, contrast the Cobalt Strike scan data with the data obtained from an HTTP scan in the Platform. The data from the HTTP scanner is significantly less actionable than the data from the app scanner.

FortiGate application data

FortiGate firewalls are widely used for perimeter defense. If exposed, they can reveal, VPN access points, administrative panels, and security policy misconfigurations. Attackers actively scan for exposed FortiGate VPN endpoints due to known vulnerabilities (such as CVE-2022-42475) that allow remote code execution.

This section explains how you can use application data from Censys to protect your organization using an example web property record that FortiGate was detected on.

You can use the following application-specific data for further investigation. Most of this information is shown on the endpoint preview card. All scan data is available in the raw data output on the web property.

  • This FortiGate instance is running version 7.2.3 (web.endpoints.fortigate.version in the raw data) and is mapped to multiple CVEs.
  • The TLS certificate is self-signed by Fortinet and is not trusted by major browsers (validation failed for NSS, Microsoft, Apple, Chrome).
  • The Strict-Transport-Security HTTP header is is present but missing includeSubDomains (recorded in web.endpoints.banner). Additionally, the max-age is less than one year. You could flag this for your team to harden response headers.
  • Based on known firewall standards (NIST, ISO 27001), externally accessible firewall UIs are non-compliant.
  • Given the existence of several critical and high CVEs associated with this FortiGate version, it is worthwhile to upgrade to the latest version.

Endpoint data

Extensive data about exposed endpoint paths beyond the root / are available in the Platform datasets. In the Platform data schema, this information is available in the host.services.endpoints.path and web.endpoints.path fields. Examples of deeper endpoint paths include /webpages/login.html, /sonicui/7/login/, /admin/login.asp, and so on. This data allows you to uncover detailed information about web applications beyond the ones that Censys has named scanners and data objects for.

Use a report for hosts or web properties broken down by the path field to see example values that are useful for your investigations.