{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"crowdsec.net","crawled_at":"2026-03-20T17:55:00.075631Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":7050,"rendered_text_length":7421,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":1067,"li_count":6,"tr_count":0,"th_count":0,"structure_score":0.5600000023841858,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"nextjs","server_header":"Vercel","cdn":"vercel","http_status":200,"load_time_ms":581,"total_html_bytes":123719,"useful_text_bytes":7050,"token_bloat_ratio":17.5,"images_total":25,"images_with_alt":10,"multimodal_pct":40,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":9015,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Curated Threat Intelligence Powered by the Crowd | CrowdSec","meta_description":"We turn crowd-powered intelligence into tactical intelligence with actionable blocklists to maximize your SOC efficiency and reduce your costs.","crawl_blocked":false,"ai_readiness_score":71,"sub_bot_access":100,"sub_rendering":99,"sub_structure":14,"sub_schema":42,"sub_tech_stack":70,"extractability_score":45,"crawl_cost_score":40,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":47,"acri_extractability":71,"acri_semantic_structure":35,"acri_content_integrity":64,"acri_retrieval_robustness":23,"acri_grade":"D","h1_text":"We Know the IPs Attacking You —  Do You?","h2_texts":"Outsmart Your Attackers Before They Get a Chance to Strike | CrowdSec is trusted by | “CrowdSec high threat list has 36% exclusive information compared to all other CTI sources.” | A Global Vision ofThreat Intelligence | Plug N’ Play with Immediate Benefits | Philosophy and Vision | Want to get a glimpse of what efficient security operations look like? | Seamless Integration,Anywhere | Leverage thePower of the Crowd | Community Pulse Newsletter","tranco_rank":11084,"category":"developer","title_length":59,"meta_desc_length":143,"has_canonical":true,"canonical_url":"https://www.crowdsec.net/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":10,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Curated Threat Intelligence Powered by the Crowd | CrowdSec","og_description":"We turn crowd-powered intelligence into tactical intelligence with actionable blocklists to maximize your SOC efficiency and reduce your costs.","og_image":"https://cms.crowdsec.net/wp-content/uploads/2024/09/Thumbnail-Homepage.png","twitter_card":"summary_large_image","ttfb_ms":581,"dom_node_count":666,"html_payload_kb":120.8,"has_hsts":true,"has_csp":false,"cache_control":"public, max-age=0, must-revalidate","sitemap_declared":true,"sitemap_url":"https://www.crowdsec.net/sitemap.xml","internal_links":46,"external_links":8,"tracker_scripts":0,"tracker_token_pct":0,"global_score":73,"seo_pillar":75,"geo_pillar":67,"perf_pillar":74,"arch_pillar":83,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":17835,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":12,"llm_analyzed":true,"llm_analyzed_at":"2026-02-28T22:58:58.880343Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CrowdSec provides a collaborative cybersecurity platform that helps users outnumber cybercriminals by sharing IP addresses and building a community-driven defense against automated hacking attacks (HackOps).","target_audience":"Sysadmins, Devops, Secops, cybersecurity professionals, SMBs, and organizations seeking to improve their cybersecurity posture through community collaboration.","pricing_model":"Freemium - Core functionality is free, with potential premium tiers for advanced features and support in the future.","integration_partners":[],"compliance_standards":[],"competitive_moat":"Community-driven threat intelligence and collaborative IP sharing, creating a significant advantage against automated attacks.","content_depth_score":7,"programmatic_seo_signals":["Template comparison pages","Integration directory pages"],"key_pain_points":["Complexity of SMB cybersecurity solutions","High costs of traditional cybersecurity investments","Vulnerability to automated hacking attacks (HackOps)"]}},"percentile":70,"similar_domains":[{"domain":"karenkane.com","acri_score":72,"ai_readiness_score":83,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":16.700000762939453,"schema_count":3,"distance":4.989999771118164,"page_title":"Karen Kane® | Women's Boho Chic Clothing \u0026 Goods","h1_text":"Karen Kane"},{"domain":"inseasonjewelry.com","acri_score":72,"ai_readiness_score":86,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":9.699999809265137,"schema_count":3,"distance":7.090000057220459,"page_title":"The Finest Children's Jewelry in The World®","h1_text":"The Finest   Children's Jewelry in The World®"},{"domain":"growthrocks.com","acri_score":72,"ai_readiness_score":84,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":8.100000381469727,"schema_count":6,"distance":9.069999885559081,"page_title":"Growth Hacking Agency | Growth Marketing Agency | GrowthRocks","h1_text":"What is Growth Hacking"},{"domain":"annexcloud.com","acri_score":72,"ai_readiness_score":92,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":17.200000762939453,"schema_count":2,"distance":12.339999771118164,"page_title":"Annex Cloud | Enterprise Loyalty Platform","h1_text":"The enterprise platform built for a lifetime of loyalty"},{"domain":"eropasture.com","acri_score":72,"ai_readiness_score":83,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":15,"schema_count":1,"distance":12.5,"page_title":"エロ画像の最新まとめ エロ牧場【毎日追加更新中】","h1_text":""}]}
