{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cyber.decode.media","crawled_at":"2026-03-17T23:32:32.30453Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":8327,"rendered_text_length":8327,"ghost_ratio":0,"rendering_type":"SSR","word_count":759,"li_count":44,"tr_count":0,"th_count":0,"structure_score":5.800000190734863,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"wordpress","server_header":"Apache","cdn":"","http_status":200,"load_time_ms":840,"total_html_bytes":67112,"useful_text_bytes":8327,"token_bloat_ratio":8.100000381469727,"images_total":18,"images_with_alt":9,"multimodal_pct":50,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":7176,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"CYBER.DECODE.MEDIA","logo_url":"https://cyber.decode.media/wp-content/uploads/2026/01/cropped-icon_cyber-32x32.png","crawl_blocked":false,"ai_readiness_score":72,"sub_bot_access":100,"sub_rendering":100,"sub_structure":44,"sub_schema":0,"sub_tech_stack":85,"extractability_score":51,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":48,"acri_extractability":76,"acri_semantic_structure":45,"acri_content_integrity":47,"acri_retrieval_robustness":25,"acri_grade":"D","h1_text":"DECODE CYBER","h2_texts":"De la défense périmétrique à l’architecture de confiance : les startups européennes qui transforment la cybersécurité | ESCAPE lève 15 millions d’euros pour tester automatiquement les vulnérabilités du code généré par l’IA | Sécurité cloud : le runtime prend le dessus sur la posture, UPWIND lève 212 millions d’euros | Sécurité des agents IA : Sweet Security accélère après une levée de 65 millions d’euros | Cyberattaque visant le ministère de l’Intérieur : une interpellation pour atteinte aux systèmes de l’État | VEGA, symbole de la montée en puissance des fondateurs ultra-expérimentés en cybersécurité | Cyberattaque au ministère de l’Intérieur : ce que l’on sait, ce qui reste incertain (mise à jour le 18 décembre à 6 h 30) | Salons, conférences, déplacements : comment limiter les risques de piratage | “I Paid Twice” : une fraude structurée exploitant les processus de remboursement des hôtels | Pourquoi les entreprises recourent aux jumeaux numériques pour renforcer leur cybersécurité","category":"infrastructure","title_length":18,"meta_desc_length":0,"has_canonical":true,"canonical_url":"https://cyber.decode.media/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":14,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"fr-FR","og_title":"CYBER.DECODE.MEDIA","ttfb_ms":840,"dom_node_count":467,"html_payload_kb":65.5,"has_hsts":false,"has_csp":false,"sitemap_declared":true,"sitemap_url":"https://cyber.decode.media/wp-sitemap.xml","internal_links":45,"external_links":21,"tracker_scripts":0,"tracker_token_pct":0,"global_score":66,"seo_pillar":41,"geo_pillar":76,"perf_pillar":74,"arch_pillar":71,"data_tier":0,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":73,"similar_domains":[{"domain":"mans-other-face.musicc.ir","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":8.800000190734863,"schema_count":1,"distance":4.459999942779541,"page_title":"اهنگ جدید صورتای دیگه اثر منس + کیفیت 320 - سایت موزیک","h1_text":"اهنگ جدید صورتای دیگه اثر منس + کیفیت ۳۲۰"},{"domain":"ymcacf.org","acri_score":73,"ai_readiness_score":86,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":9.100000381469727,"schema_count":1,"distance":4.55,"page_title":"YMCA of Central Florida: Explore Our Programs Now","h1_text":"Welcome to the YMCA\n                                of Central Florida"},{"domain":"kdpmc.ru","acri_score":73,"ai_readiness_score":87,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":6.5,"schema_count":1,"distance":4.730000114440918,"page_title":"Детский медицинский центр в Москве — услуги и цены в платной детской клинике ФГБУ Детский медицинский центр","h1_text":"Детский медицинский центр"},{"domain":"qns.com","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":9.600000381469727,"schema_count":2,"distance":5.2,"page_title":"QNS: Queens News, Sports, Entertainment \u0026 Community","h1_text":""},{"domain":"teachmeanatomy.info","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.300000190734863,"schema_count":1,"distance":5.390000057220459,"page_title":"TeachMeAnatomy - Learn Anatomy Online - Question Bank","h1_text":"The No.1 Anatomy Learning Platform: Trusted by Over 12 Million Students and Professionals"}]}
