{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"rootshell.be","crawled_at":"2026-03-21T12:06:51.035582Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":13847,"rendered_text_length":13847,"ghost_ratio":0,"rendering_type":"SSR","word_count":1610,"li_count":23,"tr_count":0,"th_count":0,"structure_score":1.4299999475479126,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"Apache/2.4.58 (Ubuntu)","cdn":"","http_status":200,"load_time_ms":1523,"total_html_bytes":97198,"useful_text_bytes":13847,"token_bloat_ratio":7,"images_total":13,"images_with_alt":3,"multimodal_pct":23,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":11633,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"/dev/random - \"If the enemy leaves a door open, you must rush in.\" - Sun Tzu","meta_description":"\"If the enemy leaves a door open, you must rush in.\" - Sun Tzu","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":100,"sub_structure":22,"sub_schema":42,"sub_tech_stack":85,"extractability_score":56,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":53,"acri_extractability":78,"acri_semantic_structure":40,"acri_content_integrity":71,"acri_retrieval_robustness":28,"acri_grade":"D","h1_text":"/dev/random","h2_texts":"Hack.lu 2023 Wrap-Up | [SANS ISC] macOS: Who’s Behind This Network Connection? | [SANS ISC] Python Malware Using Postgresql for C2 Communications | [SANS ISC] More Exotic Excel Files Dropping AgentTesla | [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm? | [SANS ISC] Quick Malware Triage With Inotify Tools | [SANS ISC] From a Zalando Phishing to a RAT | [SANS ISC] Show me All Your Windows! | [SANS ISC] Are Leaked Credentials Dumps Used by Attackers? | [SANS ISC] Do Attackers Pay More Attention to IPv6?","tranco_rank":708759,"category":"social","title_length":76,"meta_desc_length":62,"has_canonical":true,"canonical_url":"https://blog.rootshell.be/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":10,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"/dev/random","og_description":"\"If the enemy leaves a door open, you must rush in.\" - Sun Tzu","twitter_card":"summary_large_image","ttfb_ms":1523,"dom_node_count":718,"html_payload_kb":94.9,"has_hsts":true,"has_csp":false,"sitemap_declared":false,"internal_links":98,"external_links":18,"tracker_scripts":0,"tracker_token_pct":0,"global_score":72,"seo_pillar":72,"geo_pillar":78,"perf_pillar":62,"arch_pillar":67,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-04-01T23:48:44.894158Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"This website provides information and analysis on cybersecurity topics, including defensive and offensive security strategies, malware analysis, and encryption techniques,","target_audience":"Cybersecurity professionals, security researchers, IT administrators, and individuals seeking to enhance their knowledge of information security.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Deep expertise in cybersecurity and a consistent track record of providing insightful analysis and practical advice.","content_depth_score":5,"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features"]}},"percentile":78,"similar_domains":[{"domain":"thathashtagshow.com","acri_score":78,"ai_readiness_score":84,"tech_stack":"wordpress","category":"social","token_bloat_ratio":7.5,"schema_count":1,"distance":3.9,"page_title":"That Hashtag Show - Everything Trending In Geek Pop Culture!","h1_text":"All"},{"domain":"eike-klima-energie.eu","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"social","token_bloat_ratio":7.800000190734863,"schema_count":1,"distance":3.990000057220459,"page_title":"EIKE - Europäisches Institut für Klima \u0026 Energie - Nicht das Klima ist bedroht, sondern unsere Freiheit!","h1_text":"Alle"},{"domain":"danmonshop.se","acri_score":78,"ai_readiness_score":89,"tech_stack":"wordpress","category":"social","token_bloat_ratio":9.300000190734863,"schema_count":1,"distance":4.440000057220459,"page_title":"Danmon Webshop Sverige","h1_text":""},{"domain":"ghnews1.com","acri_score":78,"ai_readiness_score":82,"tech_stack":"wordpress","category":"social","token_bloat_ratio":4.599999904632568,"schema_count":1,"distance":4.4700000286102295,"page_title":"GHNews1 – Your Trusted Source for Breaking News \u0026 Insight","h1_text":"ghnews1"},{"domain":"ankaraescortbayantr.com","acri_score":78,"ai_readiness_score":84,"tech_stack":"wordpress","category":"social","token_bloat_ratio":4.5,"schema_count":1,"distance":4.5,"page_title":"Ankara Escort | Gerçek Eve Gelen \u0026 Otele Gelen Escort Bayanlar","h1_text":"Ankara Escort | Gerçek Eve Gelen \u0026 Otele Gelen Escort Bayanlar"}]}
