{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"ethiack.com","crawled_at":"2026-03-21T07:41:37.914283Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":8727,"rendered_text_length":9186,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":1194,"li_count":77,"tr_count":0,"th_count":0,"structure_score":6.449999809265137,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"nuxt","server_header":"Vercel","cdn":"vercel","http_status":200,"load_time_ms":518,"total_html_bytes":296216,"useful_text_bytes":8727,"token_bloat_ratio":33.900001525878906,"images_total":46,"images_with_alt":46,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":969,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Ethiack — Autonomous Ethical Hacking for continuous security","meta_description":"Ethiack combines AI-powered pentesting with expert insight to continuously uncover, validate and prioritize real risks. Act fast and reduce exposure, 24/7.","logo_url":"https://ethiack.com/favicon-96x96.png","crawl_blocked":false,"ai_readiness_score":72,"sub_bot_access":100,"sub_rendering":99,"sub_structure":46,"sub_schema":0,"sub_tech_stack":80,"extractability_score":41,"crawl_cost_score":65,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":49,"acri_extractability":72,"acri_semantic_structure":47,"acri_content_integrity":50,"acri_retrieval_robustness":27,"acri_grade":"D","h1_text":"Autonomous\nEthical Hacking for \ncontinuous security","h2_texts":"Meet | The | Hackian | Agentic AI \npentesting | Stay secure \nwith Ethiack | Want to know more \nabout the pricing? | Get your \nquote here | Values \u0026 \nEssence | Ready to Transform \nYour Security? | Stop Hoping, \nStart Knowing","tranco_rank":228959,"category":"infrastructure","title_length":62,"meta_desc_length":155,"has_canonical":true,"canonical_url":"https://ethiack.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":13,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Ethiack — Autonomous Ethical Hacking for continuous security","og_description":"Ethiack combines AI-powered pentesting with expert insight to continuously uncover, validate and prioritize real risks. Act fast and reduce exposure, 24/7.","og_image":"https://cdn.sanity.io/images/ah5kp358/production/665efb8d1f232ccb9dfd699466a7198d02f10bb1-1200x630.jpg","twitter_card":"summary_large_image","ttfb_ms":518,"dom_node_count":982,"html_payload_kb":289.3,"has_hsts":true,"has_csp":false,"cache_control":"public, max-age=0, must-revalidate","sitemap_declared":true,"sitemap_url":"https://ethiack.com/sitemap.xml","internal_links":7,"external_links":6,"tracker_scripts":0,"tracker_token_pct":0,"global_score":62,"seo_pillar":50,"geo_pillar":61,"perf_pillar":59,"arch_pillar":86,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":291995,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":7,"llm_analyzed":true,"llm_analyzed_at":"2026-03-11T07:31:14.824771Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Ethiack provides autonomous ethical hacking solutions that combine AI-powered pentesting agents with human expertise to continuously assess and remediate vulnerabilities","target_audience":"Security professionals, CISOs, DevOps engineers, security architects, penetration testers, and companies seeking continuous security monitoring and vulnerability management.","pricing_model":"Quote-based, custom pricing based on client needs and scope of engagement.","integration_partners":["PortSwigger Labs"],"compliance_standards":["SOC 2","PCI DSS","DORA"],"competitive_moat":"The combination of AI-powered automation with human ethical hacking expertise provides a more comprehensive and proactive approach to vulnerability management than traditional methods, leading to faster discovery and remediation.","content_depth_score":9,"programmatic_seo_signals":["See Test .01","See Complete visibility","Ethiack . benchmark ( agents )","Ethiack . listen_to_humans ( )"],"key_pain_points":["Traditional scanners create too much noise and flag too many false positives.","Traditional Pentests are not frequent enough.","Lack of complete visibility of attack surface."]}},"percentile":73,"similar_domains":[{"domain":"aeroproduct.net","acri_score":74,"ai_readiness_score":82,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":3.299999952316284,"schema_count":0,"distance":16.75,"page_title":"HERO138: Link Situs Judi Slot Gacor 2026 Terpercaya Hari Ini","h1_text":""},{"domain":"lejerbo.dk","acri_score":74,"ai_readiness_score":78,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2,"schema_count":0,"distance":16.75,"page_title":"Søg boliger og skriv dig på venteliste i Lejerbo. Find informationer for beboere, bestyrelser og boligsøgende i Lejerbo.","h1_text":"Find bolig"},{"domain":"jobs.echinacities.com","acri_score":74,"ai_readiness_score":80,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.4000000953674316,"schema_count":0,"distance":16.75,"page_title":"China Jobs – Job Opportunities for Expats in China|招聘外国人|外籍招聘网|外国人才网|招聘外教|外国人招聘|外籍人才网 - eChinacities.com","h1_text":""},{"domain":"fingal.ie","acri_score":74,"ai_readiness_score":81,"tech_stack":"drupal","category":"infrastructure","token_bloat_ratio":2.4000000953674316,"schema_count":0,"distance":16.75,"page_title":"Fingal County Council - The Place to Live, Work, Visit and Do Business.","h1_text":"Homepage"},{"domain":"bruno-onlineshop.com","acri_score":74,"ai_readiness_score":82,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":2,"schema_count":0,"distance":16.75,"page_title":"【公式】ブルーノオンライン（BRUNO online）","h1_text":""}]}
