{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"kifarunix.com","crawled_at":"2026-03-20T17:10:36.661463Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":15841,"rendered_text_length":15841,"ghost_ratio":0,"rendering_type":"SSR","word_count":2025,"li_count":11,"tr_count":0,"th_count":0,"structure_score":0.5400000214576721,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":1224,"total_html_bytes":244700,"useful_text_bytes":15841,"token_bloat_ratio":15.399999618530273,"images_total":54,"images_with_alt":53,"multimodal_pct":98,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":23572,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":true,"has_website_schema":true,"page_title":"Home - kifarunix.com","meta_description":"More","logo_url":"https://kifarunix.com/wp-content/uploads/2019/09/kifarunix-fav.png","crawl_blocked":false,"ai_readiness_score":66,"sub_bot_access":100,"sub_rendering":100,"sub_structure":13,"sub_schema":2,"sub_tech_stack":85,"extractability_score":36,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":46,"acri_extractability":80,"acri_semantic_structure":33,"acri_content_integrity":62,"acri_retrieval_robustness":19,"acri_grade":"D","h2_texts":"Containers | Security | Install and setup GVM 20.08 on Debian 10 | Process ModSecurity Logs using Wazuh | Installing Metasploit on Ubuntu 18.04 LTS | Install and Setup VeraCrypt on Rocky Linux | What Should Companies Do To Increase IT Safety | Quick Guide: Configure Apache Kafka SSL/TLS Encryption for Enhanced Security | Monitoring | How to Setup Multinode Elasticsearch 9 Cluster","tranco_rank":856866,"category":"developer","title_length":20,"meta_desc_length":4,"has_canonical":true,"canonical_url":"https://kifarunix.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":15,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Home - kifarunix.com","og_description":"More","og_image":"https://kifarunix.com/wp-content/uploads/2020/10/kifarunix-fav.png","twitter_card":"summary_large_image","ttfb_ms":1224,"dom_node_count":1402,"html_payload_kb":239,"has_hsts":true,"has_csp":false,"cache_control":", private, s-maxage=0, proxy-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://kifarunix.com/sitemap_index.xml","internal_links":145,"external_links":2,"tracker_scripts":6,"tracker_domains":"googletagmanager.com | googlesyndication.com","tracker_token_pct":0,"global_score":60,"seo_pillar":39,"geo_pillar":67,"perf_pillar":47,"arch_pillar":93,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":57,"similar_domains":[{"domain":"cylance.com","acri_score":71,"ai_readiness_score":87,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":18,"schema_count":1,"distance":4.530000114440918,"page_title":"Ending Cyber Risk with Aurora Endpoint Security - Arctic Wolf","h1_text":"Ending Cyber Risk with Aurora Endpoint Security"},{"domain":"ogopendata.com","acri_score":71,"ai_readiness_score":85,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":11.399999618530273,"schema_count":1,"distance":4.95,"page_title":"Open Data Software and Solutions | OpenGov","h1_text":"Open Data"},{"domain":"powrotroberta.pl","acri_score":71,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":11.399999618530273,"schema_count":1,"distance":4.95,"page_title":"Powrót Roberta Kubicy do F1 - wyniki ze startów, wywiady, relacje","h1_text":""},{"domain":"go.tackle.io","acri_score":71,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":11.199999809265137,"schema_count":2,"distance":5.509999942779541,"page_title":"Tackle: Your Platform for Cloud GTM | Tackle.io","h1_text":"Cloud GTM Success Starts Here"},{"domain":"constellation-guide.com","acri_score":71,"ai_readiness_score":83,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":23,"schema_count":1,"distance":6.030000114440918,"page_title":"Constellation Guide – Constellations: A Guide to the Night Sky","h1_text":"Constellation Guide"}]}
