{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cyberranges.com","crawled_at":"2026-03-21T12:11:10.118739Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":16517,"rendered_text_length":16517,"ghost_ratio":0,"rendering_type":"SSR","word_count":2122,"li_count":160,"tr_count":0,"th_count":0,"structure_score":7.539999961853027,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":1734,"total_html_bytes":413585,"useful_text_bytes":16517,"token_bloat_ratio":25,"images_total":66,"images_with_alt":61,"multimodal_pct":92,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":27793,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":true,"has_website_schema":true,"page_title":"CYBER RANGES: Cybersecurity Exercises for Training and Capability Development","meta_description":"CYBER RANGES: World-Class Cybersecurity Training Exercises and Capability Development using a Next-Generation Technology and Service Platform for the Design, Delivery and Management of Simulation-Based, Deep-Dive, Cybersecurity Experiences","logo_url":"https://res.cloudinary.com/cyberranmedia/images/w_150,h_150,c_fill,g_auto/f_auto,q_auto/v1628694931/wordpress_bulk/CyberRanges-Shield-Hallmark/CyberRanges-Shield-Hallmark.png?_i=AA","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":100,"sub_structure":50,"sub_schema":2,"sub_tech_stack":85,"extractability_score":45,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":59,"acri_extractability":75,"acri_semantic_structure":55,"acri_content_integrity":59,"acri_retrieval_robustness":41,"acri_grade":"C","h2_texts":"Validate Your Cybersecurity Posture and Resilience | Key Industry Facts on Cybersecurity | Key Industry Facts on Cybersecurity | Introducing TRYZUB-Trident | Developing Cybersecurity Muscle Memory and Organizational Resilience | Key Industry Facts on Cybersecurity | CYBER RANGES: Transform Your Cybersecurity Capabilities | “Understanding Cyber Ranges from Hype to Reality” | Why Simulated Experience Matters | CYBER RANGES: A Unique Solution For Your Specific Situation","tranco_rank":593655,"category":"developer","title_length":77,"meta_desc_length":239,"has_canonical":true,"canonical_url":"https://cyberranges.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":17,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"CYBER RANGES: Cybersecurity Exercises for Training and Capability Development","og_description":"CYBER RANGES: World-Class Cybersecurity Training Exercises and Capability Development using a Next-Generation Technology and Service Platform for the Design, Delivery and Management of Simulation-Based, Deep-Dive, Cybersecurity Experiences","og_image":"https://res.cloudinary.com/cyberranmedia/images/f_auto,q_auto/v1628743105/wordpress_bulk/CyberRanges-Logo-Shield-and-Text/CyberRanges-Logo-Shield-and-Text.png?_i=AA","twitter_card":"summary_large_image","ttfb_ms":1734,"dom_node_count":2037,"html_payload_kb":403.9,"has_hsts":false,"has_csp":false,"sitemap_declared":true,"sitemap_url":"https://cyberranges.com/sitemap_index.xml","internal_links":164,"external_links":23,"tracker_scripts":0,"tracker_token_pct":0,"global_score":54,"seo_pillar":30,"geo_pillar":66,"perf_pillar":39,"arch_pillar":82,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-27T19:42:08.945249Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CYBER RANGES provides experiential cyber security workforce development and capability validation.","target_audience":"Cyber Security professionals, National Computer Incident Response Teams (CIRTs), Government agencies, organizations seeking cybersecurity validation.","pricing_model":"Information not explicitly stated; likely subscription-based.","integration_partners":["MITRE ATT\u0026CK","ITU"],"compliance_standards":["ISO 27001"],"competitive_moat":"Leading Cyber Security Capability validation platform with advanced technology and global partnerships.","content_depth_score":6}},"percentile":78,"similar_domains":[{"domain":"jitterbit.com","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":8.45,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"jitterbit.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":8.45,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"gillmarine.com","acri_score":82,"ai_readiness_score":84,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.9000000953674316,"schema_count":1,"distance":8.45,"page_title":"Gill Marine Official US Store - Pioneers of Technical Marine Apparel - Gill Marine Official US Store","h1_text":""},{"domain":"xn--80aefbvrodbz.xn--p1ai","acri_score":83,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":7.699999809265137,"schema_count":1,"distance":8.6,"page_title":"Интернет-магазин саженцев в Москве - Мой Садовод","h1_text":""},{"domain":"fastpng.com","acri_score":84,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":2,"distance":9.25,"page_title":"100% Free PNG Images to use [1,000,000+ PNGs]- FastPNG","h1_text":""}]}
