{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"riskanalytics.com","crawled_at":"2026-03-20T08:34:09.024612Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":41056,"rendered_text_length":41056,"ghost_ratio":0,"rendering_type":"SSR","word_count":1447,"li_count":199,"tr_count":0,"th_count":0,"structure_score":13.75,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"Apache","cdn":"","http_status":200,"load_time_ms":1137,"total_html_bytes":629575,"useful_text_bytes":41056,"token_bloat_ratio":15.300000190734863,"images_total":12,"images_with_alt":2,"multimodal_pct":17,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":292729,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Home - RiskAnalytics","logo_url":"https://riskanalytics.com/wp-content/uploads/2020/07/cropped-orangeslash_small-32x32.png","crawl_blocked":false,"ai_readiness_score":77,"sub_bot_access":100,"sub_rendering":100,"sub_structure":68,"sub_schema":2,"sub_tech_stack":85,"extractability_score":52,"crawl_cost_score":95,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":62,"acri_extractability":68,"acri_semantic_structure":65,"acri_content_integrity":62,"acri_retrieval_robustness":51,"acri_grade":"C","h1_text":"Not all threat intel is created equal.","h2_texts":"Today’s cybercriminals are smarter and faster than ever. Detecting and responding to threats already inside your network is a losing strategy. By then it’s simply too late. | No one is safe from cyberthreats, but our team of experts provides a new, crucial layer of cybersecurity to neutralize threats and fortify your defenses. | \"We had a lot of layers of security here. Out of all the products, RiskAnalytics works.\" | We track, source and correlate malicious traffic from distributed global sensors. This data is processed through our patented threat correlation engine, creating a dynamic list of domains and IPs that are actively involved in cyber-crime. This intelligence, called ShadowNet, is created in real-time, constantly fresh and always evolving. Now weaponized for threat mitigation, it can be directly fed into your security infrastructure. | Built for Speed, Precision and Effect | SUPPORTING THE CYBERSECURITY COMMUNITY | TRY SHADOWNET RISK-FREE","tranco_rank":209066,"title_length":20,"meta_desc_length":0,"has_canonical":true,"canonical_url":"https://riskanalytics.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":7,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Home - RiskAnalytics","twitter_card":"summary_large_image","ttfb_ms":1137,"dom_node_count":2266,"html_payload_kb":614.8,"has_hsts":false,"has_csp":false,"cache_control":"max-age=1568, public","sitemap_declared":false,"internal_links":14,"external_links":4,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":59,"seo_pillar":58,"geo_pillar":74,"perf_pillar":34,"arch_pillar":52,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-10T13:37:31.860434Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"RiskAnalytics provides a cybersecurity layer to neutralize threats and fortify defenses.","target_audience":"Cybersecurity professionals, IT managers, security teams","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Expert team providing a crucial layer of cybersecurity.","content_depth_score":3}},"percentile":86,"similar_domains":[{"domain":"citycruises.com","acri_score":72,"ai_readiness_score":87,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":14.100000381469727,"schema_count":1,"distance":13.859999942779542,"page_title":"City Cruises - Sightseeing, Dining, Boat Tours \u0026 More","h1_text":"City Cruises"},{"domain":"le-mans.cesi.fr","acri_score":72,"ai_readiness_score":80,"tech_stack":"wordpress","category":"social","token_bloat_ratio":7.300000190734863,"schema_count":1,"distance":15.9,"page_title":"CESI Le Mans : École d'ingénieurs, Bachelor et Mastère","h1_text":"PORTES TOUJOURS OUVERTES"},{"domain":"taos.org","acri_score":72,"ai_readiness_score":85,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":6.900000095367432,"schema_count":1,"distance":16.02000002861023,"page_title":"Taos, New Mexico - Visit Taos and Discover New Mexico","h1_text":"Extras"},{"domain":"physoc.org","acri_score":72,"ai_readiness_score":80,"tech_stack":"wordpress","category":"education","token_bloat_ratio":4.400000095367432,"schema_count":1,"distance":16.77000002861023,"page_title":"Homepage - The Physiological Society","h1_text":"Shape the next 150 years"},{"domain":"aktivioslo.no","acri_score":72,"ai_readiness_score":80,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.099999904632568,"schema_count":1,"distance":16.860000085830688,"page_title":"Aktiv i Oslo - aktiviteter for barn, unge og voksne i Oslo","h1_text":"Oppdag Oslo"}]}
