{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"redhotcyber.com","crawled_at":"2026-03-18T06:01:34.790999Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":27161,"rendered_text_length":27161,"ghost_ratio":0,"rendering_type":"SSR","word_count":1856,"li_count":64,"tr_count":0,"th_count":0,"structure_score":3.450000047683716,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":533,"total_html_bytes":226933,"useful_text_bytes":27161,"token_bloat_ratio":8.399999618530273,"images_total":68,"images_with_alt":55,"multimodal_pct":81,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":53743,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Notizie su Cybercrime e Sicurezza Informatica | Red Hot Cyber","meta_description":"Le ultime notizie su cybercrime e sicurezza informatica: attacchi hacker, vulnerabilità CVE, malware e minacce digitali. Red Hot Cyber.","logo_url":"https://www.redhotcyber.com/wp-content/uploads/2025/12/cropped-RHC-3d-transp-32x32.png","crawl_blocked":false,"ai_readiness_score":77,"sub_bot_access":100,"sub_rendering":100,"sub_structure":34,"sub_schema":42,"sub_tech_stack":85,"extractability_score":58,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":58,"acri_extractability":82,"acri_semantic_structure":47,"acri_content_integrity":69,"acri_retrieval_robustness":35,"acri_grade":"C","h1_text":"Sicurezza Informatica, Notizie su Cybercrime e Analisi Vulnerabilità","h2_texts":"Articoli più letti dei nostri esperti | Ultime news | Ricorrenze storiche dal mondo dell'informatica","tranco_rank":308033,"category":"infrastructure","title_length":61,"meta_desc_length":136,"has_canonical":true,"canonical_url":"https://www.redhotcyber.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":3,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"it-IT","og_title":"Red Hot Cyber - il blog di sicurezza informatica","og_description":"Notizie aggiornate su cybercrime e sicurezza informatica, con alert CVE, malware e analisi delle minacce. Red Hot Cyber.","og_image":"https://www.redhotcyber.com/wp-content/uploads/2022/02/Logo-in-Cerchio-v0.5-Transparent-960x960-1.png","twitter_card":"summary_large_image","ttfb_ms":533,"dom_node_count":1066,"html_payload_kb":221.6,"has_hsts":false,"has_csp":false,"cache_control":"max-age=432000","cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.redhotcyber.com/news-sitemap.xml","internal_links":195,"external_links":8,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":75,"seo_pillar":75,"geo_pillar":81,"perf_pillar":59,"arch_pillar":80,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":75841,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-14T17:16:40.564118Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Red Hot Cyber provides a platform for cybersecurity engagement, including interviews and educational resources.","target_audience":"Cybersecurity professionals, researchers, journalists, and students.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Exclusive access to threat actor interviews and ransomware group insights.","content_depth_score":3}},"percentile":86,"similar_domains":[{"domain":"autostraddle.com","acri_score":83,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.900000095367432,"schema_count":2,"distance":5.299999856948853,"page_title":"Autostraddle | News, Entertainment, Opinion, Community and Girl-on-Girl Culture","h1_text":""},{"domain":"grasonderjevoeten.nl","acri_score":83,"ai_readiness_score":89,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3,"schema_count":1,"distance":5.369999885559082,"page_title":"Speelgoed | Knuffels | Baby en Kinderkamer Inrichting | Verzorging","h1_text":""},{"domain":"grosvenorsquarehoa.com","acri_score":83,"ai_readiness_score":87,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":5.4599998712539675,"page_title":"UNOGG ~ Situs Link Casino dan Slot Online Terbaru Taruhan Terpercaya 2025","h1_text":"UNOGG ~ Situs Link Casino dan Slot Online Terbaru Taruhan Terpercaya 2025"},{"domain":"kiralik-vincler.com","acri_score":83,"ai_readiness_score":88,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.7000000476837158,"schema_count":3,"distance":6.759999871253967,"page_title":"BENTO123 | Portal Link Slot Resmi Anti Blokir \u0026 Peluang Menang Besar","h1_text":"BENTO123 | Portal Link Slot Resmi Anti Blokir \u0026 Peluang Menang Besar"},{"domain":"menangpolo188.us","acri_score":83,"ai_readiness_score":88,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.7000000476837158,"schema_count":3,"distance":6.759999871253967,"page_title":"POLO188 – Platform Game Online Seru Tempat Berkumpulnya Pecinta Hiburan Digital","h1_text":"POLO188 – Platform Game Online Seru Tempat Berkumpulnya Pecinta Hiburan Digital"}]}
