Statements (69)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:API
|
gptkbp:allows |
number of requests per minute
searching for hosts and certificates |
gptkbp:can_be |
JSON responses
|
gptkbp:can_provide |
risk assessment
threat intelligence gathering geolocation data of hosts |
gptkbp:developed_by |
Censys Inc.
|
https://www.w3.org/2000/01/rdf-schema#label |
Censys API
|
gptkbp:is_a_resource_for |
gptkb:software
incident responders |
gptkbp:is_a_source_of |
network visibility
|
gptkbp:is_a_tool_for |
security audits
cyber threat analysis threat hunting |
gptkbp:is_accessible_by |
API clients
RES Tful endpoints curl commands |
gptkbp:is_available_for |
commercial use
|
gptkbp:is_available_on |
gptkb:archive
|
gptkbp:is_compatible_with |
Python libraries
|
gptkbp:is_documented_in |
Censys API documentation
|
gptkbp:is_integrated_with |
third-party tools
|
gptkbp:is_known_for |
its user-friendly interface
its extensive database its comprehensive data provide real-time data support multiple programming languages |
gptkbp:is_part_of |
cybersecurity research
Censys data ecosystem Censys data services Censys platform Censys search engine |
gptkbp:is_popular_in |
penetration testers
|
gptkbp:is_used_by |
network administrators
security researchers |
gptkbp:is_used_for |
vulnerability assessment
perform reconnaissance automate data collection analyze SSL/ TLS configurations detect anomalies in network traffic discover misconfigured services identify exposed services identify potential attack vectors track internet trends validate SSL certificates |
gptkbp:is_used_to |
analyze network exposure
gather intelligence on Io T devices monitor SSL certificate changes monitor digital assets track changes in the internet landscape |
gptkbp:is_utilized_in |
gptkb:software
compliance checks data enrichment security compliance audits network security monitoring |
gptkbp:offers |
data on I Pv4 hosts
data on SSL certificates |
gptkbp:provides |
internet-wide scanning data
|
gptkbp:provides_access_to |
historical data
|
gptkbp:receives_funding_from |
research purposes
|
gptkbp:requires |
API key for access
|
gptkbp:services |
Censys Inc.
|
gptkbp:supports |
gptkb:file_format
incident response security posture assessment |
gptkbp:updates |
regularly
|
gptkbp:bfsParent |
gptkb:Censys
|
gptkbp:bfsLayer |
6
|