Jump to Content
Censys Documentation
HomeDocumentationAPI ReferenceChangelog
Log InCensys Documentation
Documentation
Log In
v1.0HomeDocumentationAPI ReferenceChangelog
All
Pages
Start typing to search…

Product Information and Updates

  • Release Notes
  • Research Access to Censys Data
  • Opt Out of Data Collection
  • Policy for Enhancement Requests
  • Policy for Sharing Censys Rapid Response Queries

Platform

  • Get Started
    • Quick Start Guide
    • Transition to Censys Platform from Legacy Search
      • Transition Guide for Enterprise Customers
      • Transition Guides for Free Users, Solo, and Teams Subscribers
      • Platform API Transition Guide
      • Dataset Differences: Censys Platform vs. Legacy Search
      • Censys Platform Syntax Differences
      • Query Converter
    • Organization Switcher
    • Data Access Tiers and Entitlements
    • Report Builder
  • Censys Query Language
    • Relative Time in CenQL
    • Regex in CenQL
  • Platform Datasets
    • Platform Host Dataset
    • Platform Web Property Dataset
    • Platform Certificate Dataset
    • Software Confidence
  • Threat Hunting
    • Threat Dataset
    • Explore Threats
    • CensEye
    • Live Rescan, Live Discovery, and Event History
    • Certificate History
  • Censys Credits
    • Manage and Monitor Censys Credits
  • Collections
    • Create, Delete, or Archive a Collection
    • Track and Monitor Collections
    • Share a Collection
    • Collection Webhooks
      • Slack Collection Webhooks
    • Collection Credit Costs
    • Troubleshooting Collection Issues
  • Administration
    • Organization Management
    • Role-Based Access Control
    • SAML Authentication
    • Delete Account
  • Platform API and SDKs
  • Censys Platform FAQs

Attack Surface Management

  • Get Started
    • Quick Start Guide
    • ASM Overview Dashboard
      • Trends & Benchmarks
      • Ports & Protocols
      • Metrics
      • Reports
    • Seed Your Attack Surface
      • Use Censys to Find Seeds
    • Understand and Investigate Your Attack Surface
    • Build, Save, and Automate Queries
      • Example Queries
    • Activity Logbook
      • Logbook REST API Event Catalog
    • Workspaces and User Access
  • Inventory Assets
    • Hosts
      • Host Data Definitions (ASM)
    • Certificates
      • Certificate Data Definitions (ASM)
    • Web Entities
      • Web Entity Data Definitions (ASM)
    • Domains
      • Domain Data Definitions (ASM)
    • Storage Buckets
      • Storage Bucket Data Definitions (ASM)
    • Software
  • Risks
    • Risk Categories
    • Configure Risks
    • CVE Risks
      • CVE Risks FAQ
  • Integrations
    • Cloud Connectors
      • AWS Hosted Cloud Connector
      • Azure Hosted Cloud Connector
      • GCP Hosted Cloud Connector
    • Atlassian Jira
    • Cisco Webex Teams
    • Google Security Operations
    • Microsoft Sentinel
    • Microsoft Teams
    • Qualys VMDR
    • Rapid Response Email Notifications
    • Risk Email Notifications
    • ServiceNow CMDB
    • ServiceNow ITSM
    • ServiceNow VR
    • Slack
    • Splunk
    • Tenable Vulnerability Management
    • Webhook
    • Wiz
  • Shrink Your Attack Surface
    • Secure Subsidiaries, Acquisitions, and Mergers
    • Eliminate Shadow IT
    • Identify Unsanctioned Cloud Usage
    • Exclude Assets
  • Attack Surface Management API

Legacy Search

  • Get Started
    • Quick Start
    • Introductory Use Cases
    • Export Search Results
  • Censys Search Language
    • Regular Expression (Regex) in Legacy Search
    • Advanced Legacy Search Methods and Queries
    • Legacy Search and CSL FAQs
  • Legacy Search Datasets
    • Hosts
      • Virtual Hosts
      • Autonomous System
      • C2 Label
      • DNS
      • JARM
      • Labels
      • Location
      • Operating System
      • Service Information
      • Software
      • TLS
      • WHOIS
    • Certificates
      • Certificate Transparency and Precertificates
      • Lite Certificates
    • CVE Context
  • Administration and Authentication
    • Manage a Team
    • View Your Quota
    • Enable and Configure SAML
      • Microsoft AD FS SSO
      • Azure Active Directory SSO
      • Okta SSO
      • Ping Identity SSO
    • Delete Account or Cancel Subscription
  • Legacy Search Video Walkthroughs
    • Find Malicious Infrastructure Assets
    • Vendor Compliance
    • Monitor SSL TLS Certs
    • Find Rogue Assets
  • Legacy Search API

ASM and Legacy Search Developer Resources

  • Legacy Search and ASM Python CLI
  • Censeye Automated Threat Hunting Tool
  • Legacy Search Integrations

Data Downloads

  • Download Censys Universal Internet Dataset
  • Download Certs 2.0 Data
  • Google BigQuery
    • Add Censys Datasets to Google BigQuery
    • Censys Universal Internet Dataset
    • Certificates Dataset
    • Domains Dataset

Platform Search

Updated 30 days ago


Release Notes