{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"attackiq.com","crawled_at":"2026-03-19T21:46:32.199619Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":30448,"rendered_text_length":30448,"ghost_ratio":0,"rendering_type":"SSR","word_count":3343,"li_count":90,"tr_count":0,"th_count":0,"structure_score":2.690000057220459,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":548,"total_html_bytes":948664,"useful_text_bytes":30448,"token_bloat_ratio":31.200000762939453,"images_total":39,"images_with_alt":2,"multimodal_pct":5,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":60916,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Proactive Security Validation \u0026 Exposure Management - AttackIQ","meta_description":"Strengthen your cyber defenses with AttackIQ Adversarial Exposure Validation (AEV). Uncover exposures, validate controls, and prioritize risks using adversary emulations aligned with MITRE ATT\u0026CK®️.","logo_url":"https://www.attackiq.com/wp-content/uploads/2025/03/attackiq-favicon.png","crawl_blocked":false,"ai_readiness_score":76,"sub_bot_access":100,"sub_rendering":100,"sub_structure":30,"sub_schema":42,"sub_tech_stack":85,"extractability_score":48,"crawl_cost_score":95,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":51,"acri_extractability":65,"acri_semantic_structure":45,"acri_content_integrity":60,"acri_retrieval_robustness":33,"acri_grade":"D","h1_text":"How Do You Manage Exposure?","h2_texts":"Platform Overview | AttackIQ Flex | AttackIQ Ready | AttackIQ Enterprise | Command Center | Watchtower | Platform Overview | AttackIQ Flex | AttackIQ Ready | AttackIQ Enterprise","tranco_rank":96309,"category":"infrastructure","title_length":62,"meta_desc_length":201,"has_canonical":true,"canonical_url":"https://www.attackiq.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":21,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Home","og_description":"Strengthen your cyber defenses with AttackIQ Adversarial Exposure Validation (AEV). Uncover exposures, validate controls, and prioritize risks using adversary emulations aligned with MITRE ATT\u0026CK®️.","og_image":"https://www.attackiq.com/wp-content/uploads/2025/07/standard-smg.webp","twitter_card":"summary_large_image","ttfb_ms":548,"dom_node_count":2772,"html_payload_kb":926.4,"has_hsts":false,"has_csp":true,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.attackiq.com/sitemap_index.xml","internal_links":129,"external_links":8,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":59,"seo_pillar":60,"geo_pillar":58,"perf_pillar":47,"arch_pillar":74,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-05T11:49:10.234776Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"This website provides news and information related to cybersecurity, specifically focusing on data breaches and security incidents like the 2013","target_audience":"Chief Information Security Officers (CISOs), Cybersecurity Professionals, Executives, and Stakeholders in Information Security.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Provides timely and in-depth coverage of cybersecurity threats and incidents, offering a centralized resource for CISOs and security professionals.","content_depth_score":6,"programmatic_seo_signals":["Event listing pages","Category pages (News, Threats, Features, etc.)"],"key_pain_points":["Lack of centralized cybersecurity news and analysis","Difficulty staying informed about emerging threats and vulnerabilities"]}},"percentile":83,"similar_domains":[{"domain":"catherines.com","acri_score":76,"ai_readiness_score":88,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.5999999046325684,"schema_count":1,"distance":8.75,"page_title":"Affordable Plus Size Clothing \u0026 Fashion for Women |\n    Catherines","h1_text":""},{"domain":"autocontrol.es","acri_score":76,"ai_readiness_score":89,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":10.199999809265137,"schema_count":1,"distance":8.75,"page_title":"AUTOCONTROL - Autorregulación de la industria publicitaria en España","h1_text":"Webinar:La publicidad de créditos al consumo: presente y futuro"},{"domain":"design-milk.com","acri_score":76,"ai_readiness_score":86,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.400000095367432,"schema_count":1,"distance":8.75,"page_title":"Home - Design Milk","h1_text":"Design Milk"},{"domain":"trefac.jp","acri_score":76,"ai_readiness_score":84,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":2.5999999046325684,"schema_count":1,"distance":8.75,"page_title":"トレファク公式ファッション通販【TREFAC FASHION】｜ブランド品や人気の古着を販売","h1_text":""},{"domain":"fujisafari.co.jp","acri_score":76,"ai_readiness_score":84,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":8.75,"page_title":"富士サファリパーク 公式サイト","h1_text":""}]}
