{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cybergon.com","crawled_at":"2026-03-13T19:35:33.236778Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":506272,"rendered_text_length":562524,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":769,"li_count":20,"tr_count":0,"th_count":0,"structure_score":2.5999999046325684,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"hubspot","server_header":"AmazonS3","cdn":"","http_status":200,"load_time_ms":240,"total_html_bytes":2442964,"useful_text_bytes":506272,"token_bloat_ratio":4.800000190734863,"images_total":23,"images_with_alt":15,"multimodal_pct":65,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":13371,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Advancing the state of Cyber Security | Cybergon","meta_description":"Cybergon è la business unit di Elmec Informatica dedicata alla Cyber Security specializzata nell'identificare le minacce e le compromissioni e rispondere agli attacchi in modalità 24x7 ","logo_url":"img/favicon.ico","crawl_blocked":false,"ai_readiness_score":67,"sub_bot_access":100,"sub_rendering":97,"sub_structure":29,"sub_schema":0,"sub_tech_stack":70,"extractability_score":53,"crawl_cost_score":70,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":44,"acri_extractability":80,"acri_semantic_structure":37,"acri_content_integrity":52,"acri_retrieval_robustness":17,"acri_grade":"D","h1_text":"QUANTO E’\n                                        CYBERSICURA\n                                        LA TUA AZIENDA?","h2_texts":"QUANTO E’ CYBERSICURA LA TUA AZIENDA? | QUANTO E’ CYBERSICURA LA TUA AZIENDA? | QUANTO E’ CYBERSICURA LA TUA AZIENDA? | QUANTO E’ CYBERSICURA LA TUA AZIENDA? | QUANTO E' CYBERSICURA LA TUA AZIENDA? | AWARENESS | DETECTION | RESPONSE | I numeri parlano | BACKUP \u0026 DISASTER RECOVERY","tranco_rank":290106,"category":"infrastructure","title_length":48,"meta_desc_length":187,"has_canonical":false,"canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":17,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"it","ttfb_ms":240,"dom_node_count":10008,"html_payload_kb":2385.7,"has_hsts":false,"has_csp":false,"sitemap_declared":false,"internal_links":20,"external_links":20,"tracker_scripts":0,"tracker_token_pct":0,"global_score":58,"seo_pillar":46,"geo_pillar":73,"perf_pillar":46,"arch_pillar":54,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":374107,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":7,"llm_analyzed":true,"llm_analyzed_at":"2026-03-13T22:07:23.796271Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CybergON provides cybersecurity analysis and vulnerability research services, focusing on identifying and documenting security flaws in software systems, particularly within","target_audience":"Security analysts, penetration testers, cybersecurity consultants, system administrators, and organizations seeking to understand and mitigate security risks in their systems and applications.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Deep expertise in vulnerability analysis and penetration testing, combined with a focus on open-source security (e.g., XZ Utils), providing a comprehensive understanding of security threats and mitigation strategies.","content_depth_score":6,"programmatic_seo_signals":["#cybergon","#cybersecurity","#vulnerabilità","#CVE","#digitalmarketsact","#unioneeuropea","#backdoor","#xzutils","#opensource","#qakbot","#malware","#botnet","#cactus","#ransomware","#intelligenzaartificiale","#chatgpt"],"key_pain_points":["Lack of structured vulnerability reporting","Need for in-depth analysis of security flaws","Requirement for clear guidance on remediation and mitigation"]}},"percentile":59,"similar_domains":[{"domain":"hongkongpools.black","acri_score":69,"ai_readiness_score":80,"tech_stack":"blogger","category":"infrastructure","token_bloat_ratio":4.400000095367432,"schema_count":0,"distance":11.87000002861023,"page_title":"Hongkong Pools | Live Hongkong pools Asli","h1_text":"All Days"},{"domain":"bordbia.ie","acri_score":69,"ai_readiness_score":77,"tech_stack":"express","category":"infrastructure","token_bloat_ratio":4.199999809265137,"schema_count":0,"distance":11.930000114440919,"page_title":"Bord Bia - The Irish Food Board","h1_text":"Make Your\n                Mark"},{"domain":"sascha.ru","acri_score":69,"ai_readiness_score":78,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":6.099999904632568,"schema_count":0,"distance":12.139999914169312,"page_title":"Оптово-розничная компания \"Саша\" г.Тюмень","h1_text":""},{"domain":"vegansociety.com","acri_score":69,"ai_readiness_score":80,"tech_stack":"drupal","category":"infrastructure","token_bloat_ratio":6.300000190734863,"schema_count":0,"distance":12.2,"page_title":"The Vegan Society |","h1_text":""},{"domain":"technorosst.com","acri_score":69,"ai_readiness_score":76,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":3.0999999046325684,"schema_count":0,"distance":12.260000085830688,"page_title":"Оборудование для автосервиса и СТО - купить в интернет-магазине в Казани","h1_text":"Интернет-магазин автосервисного и шиномонтажного оборудования ТехнороссТ в Казани"}]}
