Pricing

Get access to the industry’s most comprehensive and up-to-date view of the internet.

Platform ASM Government
The Walmart logo features the word "Walmart" with a spark symbol to the right.
Lloyds Banking Group logo features a blue horse rearing beside the text "LLOYDS BANKING GROUP" in bold letters.
The Censys Bloomberg logo features the word "Bloomberg" in bold, dark blue text on a white background.
PepsiCo logo featuring a globe icon above the bold, uppercase "PEPSICO" text.
The HSBC logo features a hexagonal red and white geometric design with the text "HSBC" beside it.
SanDisk logo with the brand name in bold, stylized black letters.
Censys Domino's logo features a tilted square with two dots and the brand name in bold text.
SoftBank logo featuring a stylized equal sign icon followed by the text "SoftBank" in dark font.
T-Mobile logo with a magenta "T" and the word "Mobile" in black text.
Santander logo featuring a stylized flame icon and the word "Santander" in dark blue text.
Censys Stanford Medicine logo featuring a shield emblem and the text "Stanford Medicine | Health Care."
The Walmart logo features the word "Walmart" with a spark symbol to the right.
Lloyds Banking Group logo features a blue horse rearing beside the text "LLOYDS BANKING GROUP" in bold letters.
The Censys Bloomberg logo features the word "Bloomberg" in bold, dark blue text on a white background.
Compare plansIndividual
Contact Sales
Security Operations
Contact Sales
Threat Hunting
Contact Sales
Platform
Users1CustomizableCustomizable
API Access
Search Query TypesEntity performs single lookups. Standard search leverages Censys query. Advanced are queries that include regex.Entity, Standard, & AdvancedEntity, Standard, & AdvancedEntity, Standard, & Advanced
RBAC SupportRole based access controls.EnterpriseEnterprise
SSO and SAML SupportSupports the use of 3rd Party identity provide to provide SSO & authentication services.
Available SupportGold Support Add-On Available for Enterprise and Threat Hunting customers. Additional Threat Hunting Gold Support also available.CommunityCommunityCommunity
Data Visibility
Platform Data AccessExpanded Protocols, Services & CertificatesAll Protocols, Services & Certificates (excluding ICS protocols)All Protocols, Services & Certificates (excluding ICS protocols)
Host Data History1 week1 month1 month
Results per QueryViewable results for each query (up to 100 per page).Up to 500UnlimitedUnlimited
View and Download Raw/JSON DataEnables the ability to download detailed information about this asset in JSON or Raw format.
Matched FieldsHelps pinpoint relevant fields on a host from a Censys query result.
Search CPE-based context fieldsAbility to search across Common Platform Enumeration name of a host.Limited Set
Application Scanner DataProvides full protocol data access and advanced insights provided by Censys deep application scanners.
Censys CollectionsAutomates the tracking & monitoring of the results from a Censys query over time.21515
Security Operations & Threat Hunting
Vulnerability InsightsCommon Vulnerability Exposures + VulnCheck Exploit Intelligence.
Censys Threat DatasetCurated threat insights into C2 Infrastructure used by 155+ Malware Families.
CensEyeEnables hunters to quickly identify malicious infrastructure and find new infrastructure with similar characteristics.
On-Demand ScanningEnables the ability to initiate a scan request against specific hosts, returning the freshest data.
Certificate & Host Visualization
Advanced Pivoting & Contextual Hashes
Exploration Dashboards

Customize your Censys Attack Surface Management solution

Censys provides the most accurate and up-to-date picture of your internet-facing assets.

Censys helps organization address
  • Continuous attack surface discovery
  • Cloud attack surface visibility
  • Security risk assessments
  • M&A risk assessment
  • Supply chain risk assessment
  • Ransomware mitigation
Features:
  • Daily attack surface updates
  • Asset Inventory Search
  • Cloud connectors to AWS, Azure, & GCP
  • Tailored security alerts
  • CVE context for vulnerability prioritization
  • Integrations with ITSM, SIEMs, & other tools
  • Intuitive Dashboards & detailed reports
  • Automated seed refresh

For Government Agencies Worldwide

Censys provides purpose-built internet intelligence with specialized datasets to support government specific investigations and exposure management requirements.

What you’ll achieve:
  • Complete internet visibility with government-grade controls
  • Detect and neutralize advanced persistent threats with datasets specialized for government agencies
  • Enable cross-agency collaboration with mission-critical security controls
Features:
  • Search all protocols and services
  • Perform standard and advanced queries
  • Unlimited pages of results
  • Web property data from deep application scanners
  • 1 months of host history, or more
  • Raw/JSON data
  • API access
  • SSO and SAML login options
  • Gold support available
  • 10 users per account (add-on packs available)

Get Started for Free

Explore the power of the Censys Platform. Create your account today and gain basic visibility into standard ports and services.

Research Access Program

Research Access to Censys Data

Students and many researchers can qualify for free access to Censys Platform data. Learn more and apply for our Research Access Program.

Plans and Pricing FAQs

What are Censys Credits?

Censys Credits provide a flexible way for users to access and purchase the growing set of Censys Platform capabilities. Credits enable users to consume Censys services and data in a scalable way. Each action taken in the platform, whether it’s running a query, exporting data, purchasing datasets, or setting up and using a Collection, consumes Censys Credits. Credit packages start as low as $100.

Are we able to integrate the API into current workflows?

Yes, you can integrate the Censys API into your current workflows. Censys Starter, Enterprise, and Government tiers include API access. For more information on the API and other integration tools, see our developer page.

What SSO providers does Censys support?

Our Enterprise and Government users can take advantage of Single Sign-On (SSO) through a SAML-based integration, accommodating a broad range of Identity Providers that your team may choose to use. This means that whether your organization prefers widely-used providers like Okta, OneLogin, Microsoft Azure Active Directory, or any other SAML-compliant Identity Provider, Censys can facilitate a seamless and secure login experience for all team members.

Is Censys data available to download or use for enrichment?

Censys data is available to enhance your security offerings, such as for data modeling, providing additional context to detections, and investigating assets for underwriting. To discuss the full range of possibilities and to understand how Censys data can best serve your needs, please contact our sales team.

Protect What You Own With Unmatched Intelligence. Get Started Today.