{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"spideroak.com","crawled_at":"2026-03-21T08:05:11.896659Z","gptbot_allowed":false,"claudebot_allowed":false,"ccbot_allowed":false,"google_extended_allowed":false,"googlebot_allowed":false,"raw_text_length":7920,"rendered_text_length":7920,"ghost_ratio":0,"rendering_type":"SSR","word_count":384,"li_count":70,"tr_count":0,"th_count":0,"structure_score":18.229999542236328,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"nginx/1.26.0 (Ubuntu)","cdn":"","http_status":200,"load_time_ms":1030,"total_html_bytes":181626,"useful_text_bytes":7920,"token_bloat_ratio":22.899999618530273,"images_total":30,"images_with_alt":26,"multimodal_pct":87,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":21365,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Home | SpiderOak","meta_description":"Powerful tools to embed access control, data protection, and secure messaging into critical systems.","logo_url":"https://spideroak.com/wp-content/uploads/2024/03/favicon-150x150.png","crawl_blocked":false,"ai_readiness_score":15,"sub_bot_access":0,"sub_rendering":100,"sub_structure":78,"sub_schema":42,"sub_tech_stack":85,"extractability_score":63,"crawl_cost_score":40,"crawl_cost_label":"Medium","blocklist_risk":5,"blocklist_risk_label":"Critical","gatekeeper_active":true,"acri_score":48,"acri_extractability":56,"acri_semantic_structure":51,"acri_content_integrity":28,"acri_retrieval_robustness":57,"acri_grade":"D","h2_texts":"Zero-trust security at the edge. | For robotics. | For automation. | For IoT. | For defense. | For space. | For transportation. | For industrial. | Guarantee every message is authenticated, authorized, and protected. | Data Protection","tranco_rank":54879,"category":"developer","title_length":16,"meta_desc_length":100,"has_canonical":true,"canonical_url":"https://spideroak.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":16,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Home | SpiderOak","og_description":"Powerful tools to embed access control, data protection, and secure messaging into critical systems.","twitter_card":"summary_large_image","ttfb_ms":1030,"dom_node_count":664,"html_payload_kb":177.4,"has_hsts":true,"has_csp":false,"cache_control":"max-age=15552000, must-revalidate","sitemap_declared":false,"internal_links":60,"external_links":6,"tracker_scripts":0,"tracker_token_pct":0,"global_score":24,"seo_pillar":0,"geo_pillar":61,"perf_pillar":56,"arch_pillar":77,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-03T03:44:10.338893Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"SpiderOak provides zero-trust security solutions for technology providers, ensuring secure interactions across diverse environments, including space.","target_audience":"Technology providers, cybersecurity professionals, government agencies, space exploration organizations","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Zero-trust security architecture with on-orbit deployment and integration capabilities.","content_depth_score":6,"key_pain_points":["Limited information on pricing","Lack of specific feature details"]}},"percentile":33,"similar_domains":[{"domain":"bratislava.zoznam.sk","acri_score":73,"ai_readiness_score":87,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":9.199999809265137,"schema_count":1,"distance":7.859999942779541,"page_title":"Bratislava | Regióny.sk","h1_text":"Bratislava"},{"domain":"nakivo.com","acri_score":73,"ai_readiness_score":89,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":7.099999904632568,"schema_count":1,"distance":8.48999991416931,"page_title":"#1 Backup and Recovery Solution | NAKIVO","h1_text":"NAKIVO V11.2 Now Available new"},{"domain":"hitosara.com","acri_score":73,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":8.300000190734863,"schema_count":2,"distance":8.629999828338622,"page_title":"ヒトサラ - 料理人の顔が見えるグルメメディア｜レストラン情報","h1_text":"料理人の顔が見えるグルメメディア - ヒトサラ"},{"domain":"betru.ru","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":5.300000190734863,"schema_count":1,"distance":8.75,"page_title":"Ставки на спорт: все легальные букмекерские конторы России 2026 | BETRU","h1_text":"Топ букмекерских контор"},{"domain":"docs.ztu.edu.ua","acri_score":73,"ai_readiness_score":83,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":4,"schema_count":0,"distance":9.25,"page_title":"Документи Житомирської політехніки","h1_text":"loading..."}]}
