{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"empiricalsecurity.com","crawled_at":"2026-03-15T10:17:53.406743Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":6982,"rendered_text_length":7758,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":586,"li_count":23,"tr_count":0,"th_count":0,"structure_score":3.9200000762939453,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"hubspot","server_header":"Vercel","cdn":"vercel","http_status":200,"load_time_ms":581,"total_html_bytes":27142,"useful_text_bytes":6982,"token_bloat_ratio":3.9000000953674316,"images_total":9,"images_with_alt":9,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":426,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Empirical Security","logo_url":"https://www.empiricalsecurity.com/new-favicon.ico","crawl_blocked":false,"ai_readiness_score":68,"sub_bot_access":100,"sub_rendering":97,"sub_structure":36,"sub_schema":0,"sub_tech_stack":70,"extractability_score":55,"crawl_cost_score":10,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":46,"acri_extractability":82,"acri_semantic_structure":41,"acri_content_integrity":44,"acri_retrieval_robustness":21,"acri_grade":"D","h1_text":"Going to RSA? Meet with Empirical — Book Time\n            \n            Every Enterprise Is Unique. Your Risk Decisions Should Reflect That.","h2_texts":"Products | EPSS Model | Global Models | Local Models | Solutions | Methodology | Articles | Whitepapers | Videos | About Us","tranco_rank":491115,"category":"infrastructure","title_length":18,"meta_desc_length":0,"has_canonical":false,"canonical_mismatch":false,"has_meta_viewport":true,"h1_count":10,"h2_count":20,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Empirical Security","og_description":"Empirical Security builds precision AI tuned to your cybersecurity environment.","og_image":"https://images.squarespace-cdn.com/content/6835e6cf18b10c4263e17646/72f0c4e9-6e45-47bb-8317-e9fbfa876ffb/preview.png","twitter_card":"summary_large_image","ttfb_ms":581,"dom_node_count":788,"html_payload_kb":26.5,"has_hsts":true,"has_csp":false,"cache_control":"public, max-age=0, must-revalidate","sitemap_declared":false,"internal_links":59,"external_links":3,"tracker_scripts":1,"tracker_domains":"js.hs-scripts.com","tracker_token_pct":0,"global_score":64,"seo_pillar":25,"geo_pillar":75,"perf_pillar":80,"arch_pillar":80,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-23T10:44:55.936387Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Empirical Security is building a new kind of security platform driven by modern AI, grounded in real-world telemetry, and designed","target_audience":"Security professionals, CISOs, vulnerability management teams, data scientists, threat researchers, and cybersecurity engineers.","pricing_model":"Request Demo (pricing not explicitly stated)","integration_partners":["Cisco"],"compliance_standards":[],"competitive_moat":"AI-powered vulnerability prioritization and decision-making, leveraging expertise from Kenna Security and Cisco.","content_depth_score":8,"programmatic_seo_signals":["Request Demo page","Comparison pages (implied - ‘See how your model would differ’)","Integration directory pages (Kenna Security, Cisco)"],"key_pain_points":["Alert fatigue","Lack of prioritization","Need for data-driven vulnerability management"]}},"percentile":62,"similar_domains":[{"domain":"ntour.jp","acri_score":71,"ai_readiness_score":84,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4,"schema_count":0,"distance":11.77999997138977,"page_title":"旅行予約サイト　e-たび日和｜Nツアー　株式会社農協観光","h1_text":""},{"domain":"moonlight-gear.com","acri_score":71,"ai_readiness_score":82,"tech_stack":"shopify","category":"infrastructure","token_bloat_ratio":3.5,"schema_count":0,"distance":11.87000002861023,"page_title":"MoonlightGear","h1_text":""},{"domain":"girlswithgems.com","acri_score":71,"ai_readiness_score":81,"tech_stack":"shopify","category":"infrastructure","token_bloat_ratio":4.900000095367432,"schema_count":0,"distance":12.05,"page_title":"Australian Fashion Boutique | Shop \u0026 Buy Online | Girls with Gems","h1_text":""},{"domain":"g.pl","acri_score":71,"ai_readiness_score":73,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":5.099999904632568,"schema_count":0,"distance":12.109999942779542,"page_title":"G.pl - Pieniądze, Lifestyle, Nauka - porady i ciekawostki w jednym miejscu","h1_text":"Na topie"},{"domain":"special.qoo10.jp","acri_score":71,"ai_readiness_score":68,"tech_stack":"express","category":"infrastructure","token_bloat_ratio":2.5,"schema_count":0,"distance":12.170000028610229,"page_title":"Qoo10 - ネット通販｜eBay Japan","h1_text":"MOVE"}]}
