{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"restoreprivacy.com","crawled_at":"2026-03-16T21:10:31.840348Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":14811,"rendered_text_length":14811,"ghost_ratio":0,"rendering_type":"SSR","word_count":1818,"li_count":320,"tr_count":0,"th_count":0,"structure_score":17.600000381469727,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"Pressidium","cdn":"","http_status":200,"load_time_ms":8603,"total_html_bytes":232953,"useful_text_bytes":14811,"token_bloat_ratio":15.699999809265137,"images_total":57,"images_with_alt":51,"multimodal_pct":89,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":9611,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":true,"has_website_schema":true,"page_title":"CyberInsider | Reliable cybersecurity news and resources","logo_url":"https://cyberinsider.com/wp-content/uploads/2024/04/cropped-Cyber-Insider-Logo-32x32.png","crawl_blocked":false,"ai_readiness_score":85,"sub_bot_access":100,"sub_rendering":100,"sub_structure":77,"sub_schema":42,"sub_tech_stack":85,"extractability_score":65,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":72,"acri_extractability":76,"acri_semantic_structure":75,"acri_content_integrity":68,"acri_retrieval_robustness":66,"acri_grade":"B","h2_texts":"General | Latest News | About | LATEST NEWS | Reliable cybersecurity news and in-depth resources, written by industry experts. | security | Data breach | ransomware | privacy | legal","tranco_rank":170211,"category":"healthcare","title_length":56,"meta_desc_length":0,"has_canonical":true,"canonical_url":"https://cyberinsider.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":25,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"CyberInsider | Reliable cybersecurity news and resources","og_description":"LATEST NEWS Reliable cybersecurity news and in-depth resources, written by industry experts. Explore news topics Cyberinsider resources","og_image":"https://cyberinsider.com/wp-content/uploads/2024/03/CI-wide.jpg","twitter_card":"summary_large_image","ttfb_ms":8603,"dom_node_count":1712,"html_payload_kb":227.5,"has_hsts":false,"has_csp":false,"cache_control":"must-revalidate, max-age=0","sitemap_declared":true,"sitemap_url":"https://restoreprivacy.com/sitemap_index.xml","internal_links":0,"external_links":458,"tracker_scripts":0,"tracker_token_pct":0,"global_score":59,"seo_pillar":50,"geo_pillar":79,"perf_pillar":27,"arch_pillar":66,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":210838,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":5,"llm_analyzed":true,"llm_analyzed_at":"2026-03-08T23:30:18.579426Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CyberInsider provides independent cybersecurity and technology news, guides, and product reviews to help readers regain control of their digital lives","target_audience":"Privacy advocates, cybersecurity professionals, tech-savvy consumers, and individuals seeking to improve their digital security and data privacy.","pricing_model":"Affiliate links; donations accepted.","integration_partners":[],"compliance_standards":[],"competitive_moat":"Independent, unbiased product reviews and guides, combined with a commitment to transparency and ethical practices, differentiating it from sponsored content and affiliate-driven websites.","content_depth_score":8,"programmatic_seo_signals":["Contact page","Affiliate disclaimer on every page"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features"]}},"percentile":98,"similar_domains":[{"domain":"volunteerforever.com","acri_score":80,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":4.800000190734863,"schema_count":1,"distance":4.469999885559082,"page_title":"Best Meaningful Travel Programs Abroad | Volunteer Forever","h1_text":"Read  expert recommendations to plan your perfect meaningful trip abroad"},{"domain":"trinityhealth.org","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":6,"schema_count":2,"distance":4.909999942779541,"page_title":"Home - Trinity Health","h1_text":"How can we help you?"},{"domain":"blogs.juniper.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":5.219999957084656,"page_title":"HPE Juniper Networking Blogs | Insights and expertise","h1_text":"Juniper Blogs"},{"domain":"reliantmedicalgroup.org","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":2.5,"schema_count":1,"distance":5.459999942779541,"page_title":"Reliant Medical Group - Central Massachusetts Healthcare","h1_text":""},{"domain":"newly-registered-domains.whoisxmlapi.com","acri_score":81,"ai_readiness_score":84,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":1.899999976158142,"schema_count":1,"distance":5.4899999499320975,"page_title":"Newly Registered Domains | WhoisXML API","h1_text":"Newly Registered Domains: Find hidden business opportunities and potential threats"}]}
