{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"hackingarticles.in","crawled_at":"2026-03-16T23:35:53.381877Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":8542,"rendered_text_length":8542,"ghost_ratio":0,"rendering_type":"SSR","word_count":502,"li_count":6,"tr_count":0,"th_count":0,"structure_score":1.2000000476837158,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"Apache","cdn":"","http_status":200,"load_time_ms":1147,"total_html_bytes":56361,"useful_text_bytes":8542,"token_bloat_ratio":6.599999904632568,"images_total":1,"images_with_alt":0,"multimodal_pct":0,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":6799,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Hacking Articles - Raj Chandel's Blog","meta_description":"Raj Chandel's Blog","logo_url":"https://www.hackingarticles.in/wp-content/uploads/2026/03/cropped-HA-Logo-32x32.jpg","crawl_blocked":false,"ai_readiness_score":68,"sub_bot_access":100,"sub_rendering":100,"sub_structure":20,"sub_schema":2,"sub_tech_stack":85,"extractability_score":47,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":45,"acri_extractability":76,"acri_semantic_structure":37,"acri_content_integrity":43,"acri_retrieval_robustness":23,"acri_grade":"D","h1_text":"Hacking Articles","h2_texts":"PostgreSQL Penetration Testing | DotNetToJScript: Execute C# from Jscript | Privacy Protection Checklist | AWS: IAM UpdateLoginProfile Abuse | Privacy Protection: Cover Your Tracks | Privacy Protection Mobile – Graphene OS Setup | Privacy Protection Mobile – Graphene OS Installation (Part 1) | Netexec for Pentester: File Transfer | Privacy Protection: Metadata Cleaner | Posts pagination","tranco_rank":469392,"category":"infrastructure","title_length":37,"meta_desc_length":18,"has_canonical":true,"canonical_url":"https://hackingarticles.in/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":11,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Hacking Articles","og_description":"Raj Chandel's Blog","twitter_card":"summary_large_image","ttfb_ms":1147,"dom_node_count":378,"html_payload_kb":55,"has_hsts":false,"has_csp":false,"sitemap_declared":true,"sitemap_url":"https://www.hackingarticles.in/sitemap_index.xml","internal_links":46,"external_links":2,"tracker_scripts":0,"tracker_token_pct":0,"global_score":68,"seo_pillar":64,"geo_pillar":74,"perf_pillar":62,"arch_pillar":66,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-22T10:37:40.897834Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"This blog provides articles and tutorials on cybersecurity hacking techniques and privacy protection.","target_audience":"Cybersecurity professionals, penetration testers, privacy advocates, and security enthusiasts.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Expertise in cybersecurity and privacy topics, providing practical guidance and tutorials.","content_depth_score":4}},"percentile":62,"similar_domains":[{"domain":"shakira-waka-waka.musicc.ir","acri_score":70,"ai_readiness_score":82,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":6.599999904632568,"schema_count":1,"distance":3.75,"page_title":"دانلود اهنگ خارجی معروف سامینا مینا واکا واکا از شکیرا Shakira + متن اهنگ - سایت موزیک","h1_text":"دانلود اهنگ خارجی معروف سامینا مینا واکا واکا از شکیرا Shakira + متن اهنگ"},{"domain":"tqf.co.jp","acri_score":70,"ai_readiness_score":89,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":5.800000190734863,"schema_count":1,"distance":3.9899999141693114,"page_title":"東京九州フェリー","h1_text":"Instagram"},{"domain":"shop.hollandcomputers.com","acri_score":70,"ai_readiness_score":81,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":8.699999809265137,"schema_count":1,"distance":4.37999997138977,"page_title":"Holland Computers, Inc. – Online Store","h1_text":""},{"domain":"mondoaffariweb.it","acri_score":70,"ai_readiness_score":79,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.199999809265137,"schema_count":1,"distance":4.4700000286102295,"page_title":"Mondo Affari - Concediti il lusso di risparmiare","h1_text":"Mondo Affari"},{"domain":"innnews.co.th","acri_score":70,"ai_readiness_score":87,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":5.199999809265137,"schema_count":2,"distance":4.67000002861023,"page_title":"สำนักข่าว ไอ.เอ็น.เอ็น | INN News ข่าวล่าสุด บทความดีๆ ตอบโจทย์ทุกไลฟ์สไตล์ | Independent News Network Thailand","h1_text":""}]}
