CensEye
CensEye helps you identify assets on the internet that share a specific key-value pair with the asset you are currently viewing. It extracts data values then shows how many other assets present the same value. This allows you to pivot into related infrastructure and begin building queries based on shared characteristics. CensEye can also be executed via API.
CensEye saves you time during investigations and supports the creation of queries or fingerprints to identify activity linked to specific methods, indicators, or threat actors—even those that may not have been fingerprinted or categorized already.
Once you identify related assets, you can group and monitor them using collections. Collections enable you to track threat-related infrastructure over time. Use webhooks with collections to receive alerts about new assets affiliated with a threat in near-real-time.
NoteRead this detailed blog written by a Censys team member to learn about how to use CensEye for advanced threat hunting.
Video walkthrough
Use CensEye in the Platform web UI
To use CensEye:
- In the Platform web console, go to an asset.
- Click the Discover Pivots tab.

-
Click Run CensEye.
-
Review the extracted key-value pairs.
CensEye identifies key-value pairs that the asset shares with other data records. In the screenshot below, the number to the left shows how many internet-facing assets share the same attribute for the indicated field-value pair.
This data can be used to pivot from one asset to a broader set of related infrastructure that share the same attribute. You can track patterns across assets with similar characteristics and investigate the assets to determine shared usage or intent.

- Click 🔍 to the right of the key-value pair to execute a search. Using the example above, a search is executed the
host.services.endpoints.http.body_hash_sha256
field-value pair. - The search returned 48 assets. Filter the data to isolate the most relevant infrastructure. In the left-hand navigation, the Threats filter shows that 3 of these assets are associated with Viper malware. At this point, you might look for other outliers such as unusual port numbers.

NoteWhen you use CensEye on a historical host record, the key-value pairs are obtained from the historical appearance of that host and compared against current data.
View historical CensEye runs
You can see previous CensEye runs against web assets executed by members of your organization by clicking the run count dropdown within the Discover Pivots tab. Each historical run lists its timestamp and the number of interesting pivots discovered. Click the entry for a historical run to see the full list of results.

Default pivot fields
CensEye searches across the following fields for assets with matching values. To define specific fields to target with CensEye, use the value counts API endpoint.
Host fields
Banner information
host.services.banner_hex
host.services.banner_hash_sha256
Certificate information
host.services.cert.fingerprint_sha256
host.services.cert.parsed.subject_dn
host.services.cert.parsed.subject.common_name
host.services.cert.parsed.subject.organization
host.services.cert.parsed.subject.organizational_unit
host.services.cert.parsed.issuer_dn
host.services.cert.parsed.issuer.common_name
host.services.cert.parsed.issuer.locality
host.services.cert.parsed.ja4x
TLS hashes
host.services.jarm.fingerprint
host.services.tls.ja4s
host.services.tls.ja3s
HTTP
host.services.endpoints.banner_hash_sha256
host.services.endpoints.http.headers
host.services.endpoints.http.html_title
host.services.endpoints.http.body_hash_sha256
host.services.endpoints.http.favicons.hash_sha256
host.services.endpoints.http.favicons.name
SSH
host.services.ssh.endpoint_id.raw
host.services.ssh.server_host_key.fingerprint_sha256
Cobalt Strike
host.services.endpoints.cobalt_strike.x64.http_post.uri
host.services.endpoints.cobalt_strike.x64.public_key
host.services.endpoints.cobalt_strike.x64.user_agent
host.services.endpoints.cobalt_strike.x64.watermark
host.services.endpoints.cobalt_strike.x86.http_post.uri
host.services.endpoints.cobalt_strike.x86.public_key
host.services.endpoints.cobalt_strike.x86.user_agent
host.services.endpoints.cobalt_strike.x86.watermark
Other endpoints
host.services.endpoints.kubernetes.nodes.name
host.services.endpoints.scada_view.title
Other protocols
host.services.cwmp.server
host.services.pc_anywhere.name
host.services.pptp.hostname
host.services.smb.group_name
host.services.winrm.ntlm_info.netbios_computer_name
host.services.redline.settings_response
host.services.mssql.instance_name
host.services.vnc.desktop_name
host.services.s7.plant_id
host.services.bacnet.object_name
host.services.dhcpdiscover.params.device_info.machine_name
host.services.snmp.oid_system.name
Web property fields
Certificate information
web.cert.fingerprint_sha256
web.cert.parsed.subject_dn
web.cert.parsed.subject.common_name
web.cert.parsed.subject.organization
web.cert.parsed.subject.organizational_unit
web.cert.parsed.issuer_dn
web.cert.parsed.issuer.common_name
web.cert.parsed.issuer.locality
web.cert.parsed.ja4x
HTTP
web.endpoints.banner_hash_sha256
web.endpoints.http.body_hash_sha256
web.endpoints.http.favicons.hash_sha256
web.endpoints.http.favicons.name
web.endpoints.http.headers
web.endpoints.http.html_title
TLS hashes
web.jarm.fingerprint
web.tls.ja4s
web.tls.ja3s
Cobalt Strike
web.endpoints.cobalt_strike.x64.http_post.uri
web.endpoints.cobalt_strike.x64.public_key
web.endpoints.cobalt_strike.x64.user_agent
web.endpoints.cobalt_strike.x64.watermark
web.endpoints.cobalt_strike.x86.http_post.uri
web.endpoints.cobalt_strike.x86.public_key
web.endpoints.cobalt_strike.x86.user_agent
web.endpoints.cobalt_strike.x86.watermark
Other endpoints
web.endpoints.kubernetes.nodes.name
web.endpoints.scada_view.title
Certificate fields
Subject
cert.parsed.subject_dn
cert.parsed.subject.organization
cert.parsed.subject.organizational_unit
Issuer
cert.parsed.issuer_dn
cert.parsed.issuer.common_name
cert.parsed.issuer.locality
Other
cert.parsed.ja4x
Additional resources
The Censys team maintains the Censeye-NG tool for advanced configuration options and threat hunting.
Updated 25 days ago