Pricing
Get access to the industry’s most comprehensive and up-to-date view of the internet.
Get access to the industry’s most comprehensive and up-to-date view of the internet.
| Compare plans | Individual Contact Sales | Security Operations Contact Sales | Threat Hunting Contact Sales |
|---|---|---|---|
| Platform | |||
| Users | 1 | Customizable | Customizable |
| API Access | ✓ | ✓ | ✓ |
| Search Query TypesEntity performs single lookups. Standard search leverages Censys query. Advanced are queries that include regex. | Entity, Standard, & Advanced | Entity, Standard, & Advanced | Entity, Standard, & Advanced |
| RBAC SupportRole based access controls. | ✗ | Enterprise | Enterprise |
| SSO and SAML SupportSupports the use of 3rd Party identity provide to provide SSO & authentication services. | ✗ | ✓ | ✓ |
| Available SupportGold Support Add-On Available for Enterprise and Threat Hunting customers. Additional Threat Hunting Gold Support also available. | Community | Community | Community |
| Data Visibility | |||
| Platform Data Access | Expanded Protocols, Services & Certificates | All Protocols, Services & Certificates (excluding ICS protocols) | All Protocols, Services & Certificates (excluding ICS protocols) |
| Host Data History | 1 week | 1 month | 1 month |
| Results per QueryViewable results for each query (up to 100 per page). | Up to 500 | Unlimited | Unlimited |
| View and Download Raw/JSON DataEnables the ability to download detailed information about this asset in JSON or Raw format. | ✓ | ✓ | ✓ |
| Matched FieldsHelps pinpoint relevant fields on a host from a Censys query result. | ✓ | ✓ | ✓ |
| Search CPE-based context fieldsAbility to search across Common Platform Enumeration name of a host. | Limited Set | ✓ | ✓ |
| Application Scanner DataProvides full protocol data access and advanced insights provided by Censys deep application scanners. | ✗ | ✓ | ✓ |
| Censys CollectionsAutomates the tracking & monitoring of the results from a Censys query over time. | 2 | 15 | 15 |
| Security Operations & Threat Hunting | |||
| Vulnerability InsightsCommon Vulnerability Exposures + VulnCheck Exploit Intelligence. | ✗ | ✓ | ✓ |
| Censys Threat DatasetCurated threat insights into C2 Infrastructure used by 155+ Malware Families. | ✗ | ✗ | ✓ |
| CensEyeEnables hunters to quickly identify malicious infrastructure and find new infrastructure with similar characteristics. | ✗ | ✗ | ✓ |
| On-Demand ScanningEnables the ability to initiate a scan request against specific hosts, returning the freshest data. | ✗ | ✗ | ✓ |
| Certificate & Host Visualization | ✗ | ✓ | ✓ |
| Advanced Pivoting & Contextual Hashes | ✗ | ✗ | ✓ |
| Exploration Dashboards | ✗ | ✓ | ✓ |
Censys provides the most accurate and up-to-date picture of your internet-facing assets.
Censys provides purpose-built internet intelligence with specialized datasets to support government specific investigations and exposure management requirements.
Explore the power of the Censys Platform. Create your account today and gain basic visibility into standard ports and services.
Research Access Program
Students and many researchers can qualify for free access to Censys Platform data. Learn more and apply for our Research Access Program.
Censys Credits provide a flexible way for users to access and purchase the growing set of Censys Platform capabilities. Credits enable users to consume Censys services and data in a scalable way. Each action taken in the platform, whether it’s running a query, exporting data, purchasing datasets, or setting up and using a Collection, consumes Censys Credits. Credit packages start as low as $100.
Yes, you can integrate the Censys API into your current workflows. Censys Starter, Enterprise, and Government tiers include API access. For more information on the API and other integration tools, see our developer page.
Our Enterprise and Government users can take advantage of Single Sign-On (SSO) through a SAML-based integration, accommodating a broad range of Identity Providers that your team may choose to use. This means that whether your organization prefers widely-used providers like Okta, OneLogin, Microsoft Azure Active Directory, or any other SAML-compliant Identity Provider, Censys can facilitate a seamless and secure login experience for all team members.
Censys data is available to enhance your security offerings, such as for data modeling, providing additional context to detections, and investigating assets for underwriting. To discuss the full range of possibilities and to understand how Censys data can best serve your needs, please contact our sales team.