{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"iotsecurityfoundation.org","crawled_at":"2026-03-21T08:01:15.95808Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":11776,"rendered_text_length":11776,"ghost_ratio":0,"rendering_type":"SSR","word_count":1326,"li_count":84,"tr_count":0,"th_count":0,"structure_score":6.329999923706055,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":734,"total_html_bytes":148234,"useful_text_bytes":11776,"token_bloat_ratio":12.600000381469727,"images_total":7,"images_with_alt":0,"multimodal_pct":0,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":17569,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Home - IoT Security Foundation","logo_url":"https://iotsecurityfoundation.org/wp-content/uploads/2018/03/iotsf-favicon-16x16.jpg","crawl_blocked":false,"ai_readiness_score":79,"sub_bot_access":100,"sub_rendering":100,"sub_structure":46,"sub_schema":42,"sub_tech_stack":85,"extractability_score":57,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":58,"acri_extractability":68,"acri_semantic_structure":55,"acri_content_integrity":66,"acri_retrieval_robustness":43,"acri_grade":"C","h1_text":"Watch every expert session from our 2025 conference","h2_texts":"The Importance of Connected Systems – IoT and AI | Digital Systems Must Be Secured | Best Practice and Next Practice","tranco_rank":582016,"title_length":30,"meta_desc_length":0,"has_canonical":true,"canonical_url":"https://iotsecurityfoundation.org/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":12,"h2_count":3,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-GB","og_title":"Home - IoT Security Foundation","og_image":"https://iotsecurityfoundation.org/wp-content/uploads/2018/03/iotwitter.jpg","twitter_card":"summary_large_image","ttfb_ms":734,"dom_node_count":877,"html_payload_kb":144.8,"has_hsts":true,"has_csp":false,"cache_control":"no-store, no-cache, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://iotsecurityfoundation.org/sitemap_index.xml","internal_links":85,"external_links":18,"tracker_scripts":3,"tracker_domains":"googletagmanager.com | google-analytics","tracker_token_pct":0,"global_score":69,"seo_pillar":60,"geo_pillar":73,"perf_pillar":65,"arch_pillar":76,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-27T07:01:43.025106Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"The IoT Security Foundation provides a comprehensive Assurance Framework and promotes security best practices to enhance the security of IoT","target_audience":"IoT service providers, system specifiers, purchasers, policymakers, and cybersecurity professionals involved in IoT security.","pricing_model":"Membership-based, with various levels offering different benefits and access to resources.","integration_partners":[],"compliance_standards":[],"competitive_moat":"Vendor-neutral, international initiative with a comprehensive Assurance Framework and a collaborative network of experts.","content_depth_score":6,"key_pain_points":["Lack of standardized security practices for IoT devices","Rapidly evolving security threats in the IoT landscape","Complexity of IoT systems and their attack surface"]}},"percentile":91,"similar_domains":[{"domain":"pajucara.tnh1.com.br","acri_score":68,"ai_readiness_score":88,"tech_stack":"wordpress","category":"social","token_bloat_ratio":10.300000190734863,"schema_count":2,"distance":14.690000057220459,"page_title":"Home - Pajuçara Sistema de Comunicação","h1_text":""},{"domain":"innovaspain.com","acri_score":68,"ai_readiness_score":82,"tech_stack":"wordpress","category":"news","token_bloat_ratio":7.900000095367432,"schema_count":1,"distance":14.910000085830688,"page_title":"innovación en español | innovación en España","h1_text":"Innovación en español"},{"domain":"hip2save.com","acri_score":68,"ai_readiness_score":81,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":7,"schema_count":1,"distance":15.180000114440919,"page_title":"Hip2Save - The Best Deals, Coupons, Promo Codes, \u0026 Freebies","h1_text":""},{"domain":"empleospanama.gob.pa","acri_score":68,"ai_readiness_score":84,"tech_stack":"wordpress","category":"social","token_bloat_ratio":6.599999904632568,"schema_count":1,"distance":15.300000143051147,"page_title":"Inicio - Empleos Panamá","h1_text":""},{"domain":"shivalikcollege.edu.in","acri_score":68,"ai_readiness_score":82,"tech_stack":"wordpress","category":"education","token_bloat_ratio":4.300000190734863,"schema_count":1,"distance":15.99000005722046,"page_title":"Best College in Dehradun 2026 | Shivalik College","h1_text":""}]}
