{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"pixm.net","crawled_at":"2026-03-13T06:19:52.910605Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":6042,"rendered_text_length":6042,"ghost_ratio":0,"rendering_type":"SSR","word_count":353,"li_count":17,"tr_count":0,"th_count":0,"structure_score":4.820000171661377,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":987,"total_html_bytes":225589,"useful_text_bytes":6042,"token_bloat_ratio":37.29999923706055,"images_total":17,"images_with_alt":6,"multimodal_pct":35,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":20881,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Pixm Anti-Phishing","meta_description":"Free Web tutorials","logo_url":"https://pixmsecurity.com/wp-content/uploads/2019/01/cropped-Pixm-Favicon-32x32.png","crawl_blocked":false,"ai_readiness_score":78,"sub_bot_access":100,"sub_rendering":100,"sub_structure":40,"sub_schema":42,"sub_tech_stack":85,"extractability_score":50,"crawl_cost_score":65,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":48,"acri_extractability":68,"acri_semantic_structure":52,"acri_content_integrity":27,"acri_retrieval_robustness":40,"acri_grade":"D","h1_text":"Protect Credentials Where it Matters:the Browser","h2_texts":"Request Your Demo | Phishing has Moved Beyond the Inbox. Has your Protection? | Testimonials | Pixm’s computer vision technology will revolutionize anti-phishing and provide targeted users with a new level of protection | Network Security goes out the window in a time when your employees are working from home. | Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks. | Ready To End Your Phishing Problem?","tranco_rank":105026,"category":"infrastructure","title_length":18,"meta_desc_length":18,"has_canonical":true,"canonical_url":"https://pixmsecurity.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":7,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Pixm Anti-Phishing","og_description":"Effective phishing prevention, right in your browser.","og_image":"http://pixmsecurity.com/wp-content/uploads/2022/09/personal_weve-got-you-covered-section1.png","twitter_card":"summary_large_image","ttfb_ms":987,"dom_node_count":458,"html_payload_kb":220.3,"has_hsts":true,"has_csp":true,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"http://pixmsecurity.com/sitemap_index.xml","internal_links":4,"external_links":21,"tracker_scripts":2,"tracker_domains":"googletagmanager.com | js.hs-scripts.com","tracker_token_pct":0,"global_score":66,"seo_pillar":65,"geo_pillar":61,"perf_pillar":68,"arch_pillar":76,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-05T23:04:02.811871Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Pixm uses computer vision to protect organizations from web-based phishing attacks.","target_audience":"IT security professionals, cybersecurity teams, organizations concerned about phishing","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Unique computer vision technology for proactive phishing protection.","content_depth_score":4,"key_pain_points":["Thin landing pages for features"]}},"percentile":88,"similar_domains":[{"domain":"f-sunpalace.com","acri_score":73,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3,"schema_count":1,"distance":8.75,"page_title":"【公式サイト】福岡 博多 ホテル | 福岡サンパレス ホテル\u0026ホール","h1_text":""},{"domain":"mans-other-face.musicc.ir","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":8.800000190734863,"schema_count":1,"distance":8.75,"page_title":"اهنگ جدید صورتای دیگه اثر منس + کیفیت 320 - سایت موزیک","h1_text":"اهنگ جدید صورتای دیگه اثر منس + کیفیت ۳۲۰"},{"domain":"teachmeanatomy.info","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.300000190734863,"schema_count":1,"distance":8.75,"page_title":"TeachMeAnatomy - Learn Anatomy Online - Question Bank","h1_text":"The No.1 Anatomy Learning Platform: Trusted by Over 12 Million Students and Professionals"},{"domain":"bikeeastbay.org","acri_score":73,"ai_readiness_score":89,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":18.200000762939453,"schema_count":1,"distance":8.75,"page_title":"Homepage - Bike East Bay","h1_text":"Join our monthly giving circle"},{"domain":"ymcacf.org","acri_score":73,"ai_readiness_score":86,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":9.100000381469727,"schema_count":1,"distance":8.75,"page_title":"YMCA of Central Florida: Explore Our Programs Now","h1_text":"Welcome to the YMCA\n                                of Central Florida"}]}
