{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"netop.com","crawled_at":"2026-03-21T14:43:00.194634Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":16875,"rendered_text_length":16875,"ghost_ratio":0,"rendering_type":"SSR","word_count":953,"li_count":80,"tr_count":0,"th_count":0,"structure_score":8.390000343322754,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":768,"total_html_bytes":263048,"useful_text_bytes":16875,"token_bloat_ratio":15.600000381469727,"images_total":13,"images_with_alt":4,"multimodal_pct":31,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":38132,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":true,"has_website_schema":true,"page_title":"Homepage - Netop","meta_description":"Engineered for environments where downtime is not an option.","logo_url":"https://netop.com/wp-content/uploads/2026/01/cropped-Fav-Icon-Solid-Transparent-BG-32x32.png","crawl_blocked":false,"ai_readiness_score":80,"sub_bot_access":100,"sub_rendering":100,"sub_structure":53,"sub_schema":42,"sub_tech_stack":85,"extractability_score":58,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":61,"acri_extractability":73,"acri_semantic_structure":59,"acri_content_integrity":62,"acri_retrieval_robustness":47,"acri_grade":"C","h2_texts":"Secure Remote Access for the World’s Critical\nSystems | Critical infrastructure can’t depend on consumer tools | Legacy systems that can’t simply be replaced but must be secured | Air-gapped networks that demand complete sovereignty | Compliance frameworks where every login matters | Zero Trust environments where shortcuts aren’t acceptable | This is where conventional tools break.\nAnd this is where Netop is different. | Built for and proven in critical industries for over 40 years | Security-First Design | Environment-Agnostic Deployment","tranco_rank":150044,"category":"government","title_length":16,"meta_desc_length":60,"has_canonical":true,"canonical_url":"https://netop.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":22,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Homepage - Netop","og_description":"Engineered for environments where downtime is not an option.","twitter_card":"summary_large_image","ttfb_ms":768,"dom_node_count":1093,"html_payload_kb":256.9,"has_hsts":false,"has_csp":false,"sitemap_declared":true,"sitemap_url":"https://netop.com/sitemap_index.xml","internal_links":76,"external_links":3,"tracker_scripts":0,"tracker_token_pct":0,"global_score":66,"seo_pillar":54,"geo_pillar":74,"perf_pillar":59,"arch_pillar":71,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":151269,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":6,"llm_analyzed":true,"llm_analyzed_at":"2026-03-08T02:29:19.342717Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Netop provides remote access and management solutions for critical environments, focusing on digital sovereignty and regulatory compliance.","target_audience":"IT managers, security professionals, remote operations teams, and compliance officers in industries like defense, energy, finance, and government.","pricing_model":"Free trial, with tiered pricing based on features and deployment scale.","integration_partners":[],"compliance_standards":["NIS2","GDPR"],"competitive_moat":"Expertise in securing ATM networks and remote management for highly regulated industries.","content_depth_score":6,"programmatic_seo_signals":["Blog posts on compliance and remote access","Case studies highlighting industry deployments"],"key_pain_points":["Lack of specific information on pricing tiers","Limited details on integration capabilities beyond general ‘remote access’."]}},"percentile":94,"similar_domains":[{"domain":"ardot.gov","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":13.5,"schema_count":1,"distance":3.180000114440918,"page_title":"Arkansas Department of Transportation","h1_text":"ARDOT Launches New Adopt-A-Highway Interactive Map"},{"domain":"wwwilliams.com","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":10.899999618530273,"schema_count":1,"distance":3.9600002288818357,"page_title":"W.W. Williams | Equipment, Diesel \u0026 Truck Repair, Service \u0026 More","h1_text":"Expanding Our California Footprint"},{"domain":"tullylegal.com","acri_score":79,"ai_readiness_score":91,"tech_stack":"wordpress","category":"government","token_bloat_ratio":14.800000190734863,"schema_count":4,"distance":4.440000057220459,"page_title":"Commercial and Personal Lawyers | Tully Rinckey PLLC","h1_text":"Experienced Lawyers Headquartered in New York, Serving the Nation"},{"domain":"muskegon-mi.gov","acri_score":78,"ai_readiness_score":88,"tech_stack":"wordpress","category":"government","token_bloat_ratio":5.199999809265137,"schema_count":1,"distance":5.670000171661377,"page_title":"The City of Muskegon","h1_text":"City of Muskegon"},{"domain":"bouldercounty.gov","acri_score":80,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":11.699999809265137,"schema_count":5,"distance":6.020000171661377,"page_title":"Home - Boulder County","h1_text":"Boulder County"}]}
