{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"censys.com","crawled_at":"2026-03-21T08:37:17.895843Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":25227,"rendered_text_length":25227,"ghost_ratio":0,"rendering_type":"SSR","word_count":1645,"li_count":224,"tr_count":0,"th_count":0,"structure_score":13.619999885559082,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":524,"total_html_bytes":172518,"useful_text_bytes":25227,"token_bloat_ratio":6.800000190734863,"images_total":46,"images_with_alt":46,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":6762,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Censys | The Authority for Internet Intelligence and Insights","meta_description":"Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats.","logo_url":"https://censys.com/wp-content/uploads/Censys-Favicon.jpg","crawl_blocked":false,"ai_readiness_score":83,"sub_bot_access":100,"sub_rendering":100,"sub_structure":67,"sub_schema":42,"sub_tech_stack":85,"extractability_score":70,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":72,"acri_extractability":86,"acri_semantic_structure":68,"acri_content_integrity":71,"acri_retrieval_robustness":56,"acri_grade":"B","h1_text":"The Authority for Internet Intelligence and Insights","h2_texts":"Trusted by Governments, Global 2000, and Cyber Companies Worldwide | Censys Internet Map | Intelligence and Insights | Why Organizations Around the World Choose Censys | Research and Resources to Guide Your Strategy | Protect What You Own With Unmatched Intelligence. Get Started Today.","tranco_rank":174803,"category":"healthcare","title_length":61,"meta_desc_length":152,"has_canonical":true,"canonical_url":"https://censys.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":6,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Censys | The Authority for Internet Intelligence and Insights","og_description":"Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats.","og_image":"https://censys.com/wp-content/uploads/Censys-Featured-Image-1200x1200-1.jpg","twitter_card":"summary_large_image","ttfb_ms":524,"dom_node_count":1474,"html_payload_kb":168.5,"has_hsts":true,"has_csp":false,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://censys.com/sitemap_index.xml","internal_links":171,"external_links":16,"tracker_scripts":1,"tracker_domains":"crazyegg.com","tracker_token_pct":0,"global_score":79,"seo_pillar":75,"geo_pillar":87,"perf_pillar":59,"arch_pillar":93,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":218262,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":10,"llm_analyzed":true,"llm_analyzed_at":"2026-03-09T04:09:28.109013Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Censys provides a platform for real-time threat intelligence and internet visibility, empowering security teams to understand and respond to cyber threats effectively.","target_audience":"Cybersecurity analysts, threat hunters, security operations teams, government agencies, and infrastructure security professionals.","pricing_model":"Pricing information not explicitly stated, but offers a ‘Request Demo’ and ‘Get Started Now’ option, suggesting a tiered or custom pricing structure.","integration_partners":["Youtube","Linkedin","500px"],"compliance_standards":[],"competitive_moat":"AI-powered Internet scanning and analysis, providing unmatched visibility and insights into internet infrastructure, enabling proactive threat detection and response.","content_depth_score":7,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["Lack of trustworthy Internet intelligence during investigations","Need for proactive defense and operational resilience","Difficulty prioritizing risks with confidence"]}},"percentile":97,"similar_domains":[{"domain":"volunteerforever.com","acri_score":80,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":4.800000190734863,"schema_count":1,"distance":1.7999999999999998,"page_title":"Best Meaningful Travel Programs Abroad | Volunteer Forever","h1_text":"Read  expert recommendations to plan your perfect meaningful trip abroad"},{"domain":"trinityhealth.org","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":6,"schema_count":2,"distance":2.240000057220459,"page_title":"Home - Trinity Health","h1_text":"How can we help you?"},{"domain":"blogs.juniper.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":2.5500000715255737,"page_title":"HPE Juniper Networking Blogs | Insights and expertise","h1_text":"Juniper Blogs"},{"domain":"reliantmedicalgroup.org","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":2.5,"schema_count":1,"distance":2.7900000572204586,"page_title":"Reliant Medical Group - Central Massachusetts Healthcare","h1_text":""},{"domain":"newly-registered-domains.whoisxmlapi.com","acri_score":81,"ai_readiness_score":84,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":1.899999976158142,"schema_count":1,"distance":2.820000064373016,"page_title":"Newly Registered Domains | WhoisXML API","h1_text":"Newly Registered Domains: Find hidden business opportunities and potential threats"}]}
