{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"codeby.net","crawled_at":"2026-03-21T15:36:04.37702Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":41503,"rendered_text_length":41503,"ghost_ratio":0,"rendering_type":"SSR","word_count":1955,"li_count":89,"tr_count":0,"th_count":0,"structure_score":4.550000190734863,"has_org_schema":true,"has_product_schema":false,"schema_count":2,"tech_stack":"wordpress","server_header":"ddos-guard","cdn":"","http_status":200,"load_time_ms":1065,"total_html_bytes":159164,"useful_text_bytes":41503,"token_bloat_ratio":3.799999952316284,"images_total":42,"images_with_alt":42,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":27224,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Форум информационной безопасности - Codeby.net","meta_description":"Программирование, этичный хакинг и тестирование на проникновение, форензика - Codeby.net","logo_url":"https://codeby.net/data/assets/logo/codeby_logo_192.png","crawl_blocked":false,"ai_readiness_score":78,"sub_bot_access":100,"sub_rendering":100,"sub_structure":39,"sub_schema":44,"sub_tech_stack":85,"extractability_score":68,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":62,"acri_extractability":90,"acri_semantic_structure":49,"acri_content_integrity":73,"acri_retrieval_robustness":36,"acri_grade":"C","h1_text":"Форум информационной безопасности - Codeby.net","h2_texts":"Статья\n\t\t\t\t\t\tPivoting и tunneling в Active Directory: как это видит Blue Team | Статья\n\t\t\t\t\t\tАтаки на XML-структуры: XPath Injection и XXE на практике | Статья\n\t\t\t\t\t\tKong и Nginx как точка контроля безопасности для API | Статья\n\t\t\t\t\t\tNAC в SCADA: как защитить OT-сеть от внутренних угроз | Статья\n\t\t\t\t\t\tPython для форензики: Автоматизация анализа логов и артефактов (Pandas, RegEx) | Статья\n\t\t\t\t\t\tAdversarial Attacks против статических PE-классификаторов: где feature-space атака превращается в реальный malware обходах | Статья\n\t\t\t\t\t\tPWN: Buffer Overflow с обходом ASLR через ret2libc | Статья\n\t\t\t\t\t\tForensics: Анализ PCAP трафика с Wireshark | Network Challenge | CTF\n\t\t\t\t\t\t⚠️Новая про-лаборатория — Shadow Pipeline | Статья\n\t\t\t\t\t\tLateral Movement в Windows: техники и detection","tranco_rank":266162,"category":"infrastructure","title_length":77,"meta_desc_length":154,"has_canonical":false,"canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":10,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"ru-RU","og_title":"Форум информационной безопасности - Codeby.net","og_description":"Программирование, этичный хакинг и тестирование на проникновение, форензика - Codeby.net","og_image":"https://codeby.net/styles/default/codeby/logo.og.png","ttfb_ms":1065,"dom_node_count":1375,"html_payload_kb":155.4,"has_hsts":true,"has_csp":true,"cache_control":"private, no-cache, max-age=0","sitemap_declared":true,"sitemap_url":"https://codeby.net/sitemap.php","internal_links":155,"external_links":14,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":72,"seo_pillar":61,"geo_pillar":82,"perf_pillar":47,"arch_pillar":100,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":342943,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":9,"llm_analyzed":true,"llm_analyzed_at":"2026-03-13T00:05:46.179761Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Codeby.net provides a cybersecurity forum and resources for CTF, ethical hacking, and penetration testing.","target_audience":"Security professionals, penetration testers, ethical hackers, and cybersecurity enthusiasts.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Focus on specialized cybersecurity topics and practical exploitation techniques.","content_depth_score":5}},"percentile":88,"similar_domains":[{"domain":"profitserver.ru","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.799999952316284,"schema_count":2,"distance":3.5999999999999996,"page_title":"VPS/VDS серверы в аренду от 190 руб/месяц - купить виртуальный хостинг, серверы облачные cloud","h1_text":"Аренда виртуального сервера VPS/VDS"},{"domain":"profitserver.net","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.799999952316284,"schema_count":2,"distance":3.5999999999999996,"page_title":"Rent VPS from $1.9/mo. Unlimited, full root. 24/7 support. Virtual Private Server. VPS Hosting Plans.","h1_text":"Rent virtual VPS server"},{"domain":"driphydration.com","acri_score":86,"ai_readiness_score":95,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.899999976158142,"schema_count":2,"distance":4.169999992847442,"page_title":"Drip Hydration - IV Therapy \u0026 Mobile Wellness","h1_text":"The Global Leader in Mobile IV Therapy"},{"domain":"hi-ad.jp","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.0999999046325684,"schema_count":5,"distance":5.310000014305114,"page_title":"販促花子|ノベルティ・販促品・名入れ・記念品のオリジナルグッズ印刷・制作","h1_text":"ノベルティ・販促品・記念品の名入れなら販促花子|激安コミコミ価格・高品質・小ロット・最短翌日発送"},{"domain":"meriambet.us.com","acri_score":87,"ai_readiness_score":95,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.099999904632568,"schema_count":6,"distance":5.839999985694885,"page_title":"MERIAMBET 🌟 Akses VIP Situs Toto88 SLot Online Depo 5k Terpercaya Mudah JP","h1_text":"MERIAMBET 🌟 Akses VIP Situs Toto88 SLot Online Depo 5k Terpercaya Mudah JP"}]}
