{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"blog.ip2location.com","crawled_at":"2026-03-20T07:17:46.258649Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":13270,"rendered_text_length":13270,"ghost_ratio":0,"rendering_type":"SSR","word_count":578,"li_count":116,"tr_count":0,"th_count":0,"structure_score":20.06999969482422,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":829,"total_html_bytes":88089,"useful_text_bytes":13270,"token_bloat_ratio":6.599999904632568,"images_total":3,"images_with_alt":3,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":4953,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"How IP Geolocation or Proxy Detection Mitigate Account Takeovers | IP2Location.com","meta_description":"Learn how IP geolocation and proxy detection identify suspicious logins and stop credential stuffing before accounts are compromised.","crawl_blocked":false,"ai_readiness_score":86,"sub_bot_access":100,"sub_rendering":100,"sub_structure":82,"sub_schema":42,"sub_tech_stack":85,"extractability_score":75,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":71,"acri_extractability":86,"acri_semantic_structure":76,"acri_content_integrity":50,"acri_retrieval_robustness":64,"acri_grade":"B","h1_text":"Articles \u0026 Tutorials","h2_texts":"About IP Geolocation by IP2Location.com | General\n                113 Articles | Technical\n                247 Articles | IP2Location Sample Codes\n                126 Articles | IP2Proxy Sample Codes\n                57 Articles | Infographic\n                9 Articles | PHP SDK\n                10 Articles | Uncategorized","category":"developer","title_length":82,"meta_desc_length":133,"has_canonical":true,"canonical_url":"https://blog.ip2location.com/knowledge-base/how-ip-geolocation-or-proxy-detection-mitigate-account-takeovers/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":8,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"How IP Geolocation or Proxy Detection Mitigate Account Takeovers | IP2Location.com","og_description":"Learn how IP geolocation and proxy detection identify suspicious logins and stop credential stuffing before accounts are compromised.","og_image":"https://blog.ip2location.com/wp-content/uploads/2026/03/ipl-ip-ato-article-img.png","twitter_card":"summary_large_image","ttfb_ms":829,"dom_node_count":390,"html_payload_kb":86,"has_hsts":true,"has_csp":true,"cache_control":"must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://blog.ip2location.com/sitemap_index.xml","internal_links":65,"external_links":57,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":82,"seo_pillar":72,"geo_pillar":86,"perf_pillar":74,"arch_pillar":96,"data_tier":0,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":99,"similar_domains":[{"domain":"xn--80aefbvrodbz.xn--p1ai","acri_score":83,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":7.699999809265137,"schema_count":1,"distance":2.12999997138977,"page_title":"Интернет-магазин саженцев в Москве - Мой Садовод","h1_text":""},{"domain":"jitterbit.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":2.8199999570846557,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"fastpng.com","acri_score":84,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":2,"distance":3.259999942779541,"page_title":"100% Free PNG Images to use [1,000,000+ PNGs]- FastPNG","h1_text":""},{"domain":"furunavi.jp","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":3,"distance":3.459999942779541,"page_title":"ふるさと納税サイト【ふるなび】｜初めての方でも安心・かんたん寄附！","h1_text":""},{"domain":"blastengine.jp","acri_score":82,"ai_readiness_score":95,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":3,"distance":3.8199999570846557,"page_title":"【公式】ブラストエンジン（blastengine）｜API連携・SMTPリレー","h1_text":"99％以上の高いメール到達率を実現API連携・SMTPリレーで高速メール配信ブラストエンジン"}]}
