{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"prodaft.com","crawled_at":"2026-03-21T09:35:13.543527Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":37064,"rendered_text_length":39015,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":5321,"li_count":16,"tr_count":0,"th_count":0,"structure_score":0.30000001192092896,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"nextjs","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":192,"total_html_bytes":897710,"useful_text_bytes":37064,"token_bloat_ratio":24.200000762939453,"images_total":7,"images_with_alt":7,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":365351,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"PRODAFT – Cyber Threat Intelligence and Risk Intelligence","meta_description":"Explore advanced cybersecurity solutions, providing proactive defense against emerging threats. Learn more about our tailored intelligence, and cybercrime investigation solutions.","logo_url":"https://prodaft.com/favicon.ico","crawl_blocked":false,"ai_readiness_score":64,"sub_bot_access":100,"sub_rendering":99,"sub_structure":10,"sub_schema":2,"sub_tech_stack":70,"extractability_score":32,"crawl_cost_score":95,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":36,"acri_extractability":74,"acri_semantic_structure":27,"acri_content_integrity":53,"acri_retrieval_robustness":10,"acri_grade":"F","h1_text":"Every day we intercept thousands of cyber threats \u0026 prevent next-generation attacks","h2_texts":"Understanding Keystroke Logging and Keyloggers | Keyloggers | Examples of Keyloggers | Detecting and Mitigating Keyloggers | Safeguarding Industries and Beyond | Conclusion | Cybersecurity Challenges of Social Media | Conclusion | Get to Know SystemBC | 3 Reasons Behind the Success of SystemBC","tranco_rank":516764,"category":"government","title_length":59,"meta_desc_length":179,"has_canonical":false,"canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":16,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"PRODAFT – Cyber Threat Intelligence and Risk Intelligence","og_description":"Explore advanced cybersecurity solutions, providing proactive defense against emerging threats. Learn more about our tailored intelligence, and cybercrime investigation solutions.","og_image":"https://www.prodaft.com/raven-1200x630.png","twitter_card":"summary_large_image","ttfb_ms":192,"dom_node_count":1588,"html_payload_kb":876.7,"has_hsts":false,"has_csp":false,"sitemap_declared":false,"internal_links":30,"external_links":4,"tracker_scripts":0,"tracker_token_pct":0,"global_score":55,"seo_pillar":46,"geo_pillar":50,"perf_pillar":67,"arch_pillar":70,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":53,"similar_domains":[{"domain":"digitalskola.com","acri_score":61,"ai_readiness_score":80,"tech_stack":"nextjs","category":"government","token_bloat_ratio":129.60000610351562,"schema_count":3,"distance":9.75,"page_title":"Digital Skola | Bersertifikat Nasional, Diakui di Dunia Profesional","h1_text":"Dari Upgrade Skill Hingga Bersertifikat Internasional, Semua Bisa di Digital Skola."},{"domain":"filevine.com","acri_score":61,"ai_readiness_score":77,"tech_stack":"hubspot","category":"government","token_bloat_ratio":25.799999237060547,"schema_count":1,"distance":12.229999542236328,"page_title":"AI Legal Assistant | Filevine","h1_text":"Legal intelligence, grounded in truth."},{"domain":"generalcode.com","acri_score":61,"ai_readiness_score":83,"tech_stack":"wordpress","category":"government","token_bloat_ratio":26,"schema_count":1,"distance":12.289999771118165,"page_title":"General Code | Forward-thinking municipal code solutions","h1_text":"Empowering Communities with Forward-Thinking Municipal Code Solutions"},{"domain":"lumivero.com","acri_score":61,"ai_readiness_score":80,"tech_stack":"wordpress","category":"government","token_bloat_ratio":22.799999237060547,"schema_count":2,"distance":12.670000457763672,"page_title":"Lumivero - Software Solutions for Data Analysis \u0026 Management","h1_text":"Turn data complexity into clarity"},{"domain":"bloominglobal.com","acri_score":61,"ai_readiness_score":70,"tech_stack":"express","category":"government","token_bloat_ratio":17.100000381469727,"schema_count":1,"distance":13.880000114440918,"page_title":"Search Global Import Export of 200+ Countries \u0026 Regions - Blooming Trade Data","h1_text":"Search Export Import Data of 200"}]}
