Adversary Investigation

Adversary Infrastructure Moves.
So Should You.

Censys Adversary Investigation turns first-party scanning into a curated, real-time map of attacker infrastructure.
Pivot from one signal to the full campaign footprint.

Our Customers

SanDisk logo with the brand name in bold, stylized black letters.
Censys Domino's logo features a tilted square with two dots and the brand name in bold text.
A shield with a white cross and the words "Schweizer Armee" in German, French, Italian, and Romansh.
T-Mobile logo with a magenta "T" and the word "Mobile" in black text.
The Walmart logo features the word "Walmart" with a spark symbol to the right.
Bank of America logo with the bank's name in dark blue and a stylized flag symbol to the right.
The Censys Bloomberg logo features the word "Bloomberg" in bold, dark blue text on a white background.
PepsiCo logo featuring a globe icon above the bold, uppercase "PEPSICO" text.
AT&T logo featuring a globe with horizontal stripes and the company name in bold letters.
The Raytheon logo features the company name in bold, dark blue letters with a stylized red and blue arrow symbol.
Merck logo featuring a stylized cluster of circles next to the word "MERCK" in bold uppercase letters.
Censys Evotec logo features a dark teal circle with two smaller circles and the word "evotec" beside it.

Why CTI & SecOps Teams Choose Censys

Real-Time Visibility for CTI and Security Operations

Censys ARC curated threat dataset

Censys ARC tracks adversaries’ recycled infrastructure signals and reuse patterns. Search and filter by threat types like C2 servers, phishing servers, botnet servers, and webshells — with evidence tied directly to a first-party scan of the service or endpoint.

Investigation Manager

Build a node-based pivot map to document your investigation trail, visualize relationships, and track adversary infrastructure as campaigns evolve.

Signal pivoting with CensEye

Extract rare, high-signal attributes (HTTP headers, SSH banners, TLS values) and instantly see how frequently they appear across the Internet to uncover hidden related infrastructure.

Investigate suspicious open directories

Use the Open Directory Explorer and “Suspicious Directory”-labeled threats to surface web-accessible directories hosting staged payloads, hacktools, webshells, and other risky artifacts.

Historical context + live rescanning

Use certificate timelines, contextual hashes (JARM, JA3/JA4, TLSH) to connect infrastructure, spot reuse, and build investigative timelines. Run on-demand Censys Live Discovery & Live Rescan to verify behavior in real time.

Turn investigations into automated intelligence

Operationalize hunting with the Censys Adversary Investigation MCP server and Censys Assistant. Convert saved Collections into continuously updated infrastructure intelligence for your SOC workflows.

Censys ARC tracks adversaries’ recycled infrastructure signals and reuse patterns. Search and filter by threat types like C2 servers, phishing servers, botnet servers, and webshells — with evidence tied directly to a first-party scan of the service or endpoint.

Build a node-based pivot map to document your investigation trail, visualize relationships, and track adversary infrastructure as campaigns evolve.

Extract rare, high-signal attributes (HTTP headers, SSH banners, TLS values) and instantly see how frequently they appear across the Internet to uncover hidden related infrastructure.

Use the Open Directory Explorer and “Suspicious Directory”-labeled threats to surface web-accessible directories hosting staged payloads, hacktools, webshells, and other risky artifacts.

Use certificate timelines, contextual hashes (JARM, JA3/JA4, TLSH) to connect infrastructure, spot reuse, and build investigative timelines. Run on-demand Censys Live Discovery & Live Rescan to verify behavior in real time.

Operationalize hunting with the Censys Adversary Investigation MCP server and Censys Assistant. Convert saved Collections into continuously updated infrastructure intelligence for your SOC workflows.

Case Study

The Citizen Lab

Highlights
  • Mapped Candiru’s global command and control infrastructure
  • Identified self-signed certificates associated with the spyware vendor
  • Uncovered over 750 websites impersonated by the attacker
  • Located victims and recovered critical spyware samples for analysis
Research Fellow, The Citizen Lab

Bill Marczak

“Censys structures Internet data in a way that’s easy to understand and query. Without regular expression queries and the ability to query specific fields, we wouldn’t have been able to search for hosts that matched [Candiru] signatures.”

Experience Censys Data in Action

A blue background with orange lines forming a minimalistic, abstract representation of a hero symbol for internet visibility.