Integrating Tines and Censys optimizes threat detection and response workflows by automating intelligence gathering and incident analysis, enhancing overall security efficiency.
With Tines, you can easily take any action that has a defined API. We've already pre-built some of the most popular ones for you, so you can build quickly.
With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.
cURL request
curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'Paste in your Tines story
Explore pre-built workflows for Censys. Use them for inspiration or as a starting point to build your custom automation solution.
Look up subdomains using Censys. Select a subdomain to view all certificates related to it.
Tools: Censys



Continuously scan Censys for known Covenant Command and Control (C2) servers, adding them as individual IoCs in CrowdStrike. Maintain an up-to-date list of IPs within CrowdStrike by removing outdated servers and adding newly discovered ones.
Tools: Censys, CrowdStrike


Type free text Censys queries in Slack. Translate the free text to a structured Censys search query and reply to the original message with search results.
Tools: Censys, Slack


Leverage open-source threat intel against cobalt strike attacks.
Tools: Censys



It takes minutes, not months, to connect to tools in Tines.
Check out our blogs, browse our learning paths, and more.
Tines blog
Update from Tines; the smart, secure workflow builder for your whole team.
Go to blog
Case studies
Discover how companies – from Fortune 10 to startups – apply Tines to transform the way their teams operate.
Read case studies
Learn
Build your knowledge with dedicated learning paths at all levels.
Start learning
Learn
Go to docs