What is the Censys Internet Map?
A Live, Continuously Updated Dataset of Every Device and Service on the Internet
The Censys Internet Map is the industry’s most comprehensive, up-to-date dataset of global Internet infrastructure and the foundation for our security solutions. Censys’ ML-driven scanning infrastructure continually learns the complex deployment patterns of Internet infrastructure, which it uses to track every IP, host, service, and website on the Internet in close to real time.
We enhance our data with external context, WHOIS, CVEs, and threat actor fingerprints — enabling security teams and researchers to uncover threats, track changes, and defend their Internet presence with precision.
How We Build The Internet Map
The Most Complete View of the Internet
The Censys Internet Map isn’t just a collection of raw scan data; it’s a continuously evolving, real-time representation of everything that exists on the Internet. Our technology doesn’t just find assets — it understands them, enriching each entity with context, ownership, risk profiles, relationships, and changes over time. This is how we build and maintain our Map of the Internet.
Predictive AI-driven internet scanning
Discovers services on non-standard ports, uncovering Internet services that would otherwise go uncovered.
Automatic protocol detection
Identifies services and protocols regardless of their port, revealing misconfigurations, unauthorized services, and backdoors.
Name-addressed web entities
Goes beyond IP addresses to detect technologies like WordPress, Kubernetes, ElasticSearch, and exposed APIs on web entities.
AI-driven context and relationships
Enriches data with deep intelligence on ownership, risk, and ties to threat actors.
A Living Map of the Internet – Tracking All Internet Infrastructure
More Than Scanning, We Contextualize and Understand the Internet
Beyond discovery: Understand every entity, its risks, and its potential threat
The Internet is more than just IP addresses and domains; it’s the intersection of global industry, commerce, and infrastructure. Censys curates the deepest, most contextualized map of everything connected to the Internet, helping security teams track not just their own assets and dependencies, but the infrastructure adversaries use to attack organizations.
Tracking how cybercriminals mount attacks
Attackers use a complex web of servers, domains, and compromised equipment to launch and manage campaigns. Censys maps these relationships in real time.
- Type: Command-and-control (C2) servers, phishing domains, and malware distribution sites
- Attribution: Nation-state actors, ransomware groups, and cybercriminal networks
- Indicators of Compromise (IOCs): TLS certificates, JA4+ fingerprints, and behavioral patterns
- Tracking: Known adversary clusters, tactics, techniques, and procedures (TTPs)
The infrastructure powering the global economy
Banks, hospitals, and multinational corporations rely on complex, distributed networks, but hidden risks exist across every exposed endpoint.
- Type: Cloud infrastructure, VPN gateways, and data center endpoints
- Industry: Banking, healthcare, and global enterprises
- Network providers: AWS, Google Cloud, Microsoft Azure, and major ISPs
- Risk exposure: Unpatched servers, exposed credentials, and phishing infrastructure
The digital freeways of the internet
ISPs, mobile networks, and backbone providers form the foundation of global connectivity, but misconfigurations and attacks threaten availability.
- Type: ISP routers, 5G modems, and DNS resolvers
- Operators: AT&T, Verizon, Cloudflare, and major backbone providers
- Geographic reach: Global, regional, and localized network tracking
- Impact: Connectivity disruptions and surveillance risks
The public face of the internet
From corporate websites to internal dashboards, misconfigured applications and exposed databases create significant attack surfaces.
- Type: Content management systems (CMS), authentication portals, and cloud-based apps
- Common technologies: WordPress, Cobalt Strike, Kubernetes, ElasticSearch
- Risk factors: Unsecured login interfaces, outdated software, and exploitable vulnerabilities
The backbone of essential services
From power grids to water distribution, industrial control systems manage essential operations, but they’re often unsecured and exposed online.
- Type: Human Machine Interfaces (HMI), SCADA systems, and PLC controllers
- Industry: Water distribution, energy grids, and transportation systems
- Location and ownership: Municipal water supplies, power plants, and government-operated infrastructure
- Risk exposure: Misconfigured remote access, unauthenticated controls, and outdated software
Tracking how cybercriminals mount attacks
Attackers use a complex web of servers, domains, and compromised equipment to launch and manage campaigns. Censys maps these relationships in real time.
- Type: Command-and-control (C2) servers, phishing domains, and malware distribution sites
- Attribution: Nation-state actors, ransomware groups, and cybercriminal networks
- Indicators of Compromise (IOCs): TLS certificates, JA4+ fingerprints, and behavioral patterns
- Tracking: Known adversary clusters, tactics, techniques, and procedures (TTPs)
The Proof Is In the Data
The Fastest, Most Comprehensive Internet Intelligence
Censys has pushed (and continues to push) the boundaries of Internet-wide scanning, and today, we remain light-years ahead in speed, coverage, and accuracy.
Unmatched accuracy
Censys reports the highest percentage of verified, real-time services with 92% accuracy, compared to the next highest competitor at 68% accuracy.
Complete coverage
We scan all 65,535 ports, detecting 82% of services, compared to just 43% by the next best competitor.
Freshest data
We refresh data nearly 10 times faster than alternative platforms, ensuring you work with real-time intelligence, not outdated data.
Fastest new service discovery
Censys identifies new services 7–34 times faster than the nearest competitor, catching emerging risks before they become active threats.
Datasheet
The Censys Internet Map
Modern security teams need more than surface-level visibility, they need deep, accurate intelligence about what’s happening across the entire internet. The “Censys Internet Map” datasheet explores the power behind Censys' industry-leading platform: a real-time, high-fidelity map of every active internet service.
What's New