{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"synacktiv.com","crawled_at":"2026-03-18T00:05:15.149574Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":9155,"rendered_text_length":9155,"ghost_ratio":0,"rendering_type":"SSR","word_count":1025,"li_count":54,"tr_count":0,"th_count":0,"structure_score":5.269999980926514,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"drupal","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":593,"total_html_bytes":48169,"useful_text_bytes":9155,"token_bloat_ratio":5.300000190734863,"images_total":20,"images_with_alt":20,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":843,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Pentest, Reverse, Développement","meta_description":"Synacktiv - IT Security expertise - Penetration tests, Security audits, Code review, Training, Consulting, Vulnerability research","logo_url":"sites/default/files/favicon.ico","crawl_blocked":false,"ai_readiness_score":70,"sub_bot_access":100,"sub_rendering":100,"sub_structure":42,"sub_schema":0,"sub_tech_stack":70,"extractability_score":56,"crawl_cost_score":10,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":53,"acri_extractability":87,"acri_semantic_structure":44,"acri_content_integrity":63,"acri_retrieval_robustness":24,"acri_grade":"D","h1_text":"LES ENJEUX DE LA SÉCURITÉ\nINFORMATIQUE","h2_texts":"QUI PEUT AUJOURD'HUI SE TARGUER DE NE POSSÉDER AUCUN APPAREIL CONNECTÉ ? ORDINATEURS, SMARTPHONES, TABLETTES, TÉLÉVISEURS, DOMOTIQUE... NOUS VIVONS DANS UN MONDE ULTRA-CONNECTÉ ET CELA N'EST PAS PRÊT DE S'ARRÊTER. | Étude de cas | Les cas les plus fréquents | SYNACKTIV, L'ASSURANCE\nD'UNE EXPERTISE TECHNIQUE | Témoignages | Dernières publications | Nous contacter | PARIS | TOULOUSE | LYON","tranco_rank":320712,"title_length":32,"meta_desc_length":129,"has_canonical":true,"canonical_url":"https://synacktiv.com/index","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":13,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"fr","og_title":"Pentest, Reverse, Développement","og_description":"Synacktiv - IT Security expertise - Penetration tests, Security audits, Code review, Training, Consulting, Vulnerability research","og_image":"https://www.synacktiv.com/sites/default/files/2023-04/logo_metadata.png","twitter_card":"summary_large_image","ttfb_ms":593,"dom_node_count":612,"html_payload_kb":47,"has_hsts":false,"has_csp":true,"cache_control":"max-age=300","sitemap_declared":true,"sitemap_url":"https://www.synacktiv.com/sitemap.xml","internal_links":68,"external_links":6,"tracker_scripts":0,"tracker_token_pct":0,"global_score":73,"seo_pillar":50,"geo_pillar":78,"perf_pillar":80,"arch_pillar":90,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-15T06:43:32.060814Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Synacktiv provides cybersecurity services including penetration testing, incident response, and reverse engineering.","target_audience":"Cybersecurity professionals, incident response teams, and organizations seeking security assessments.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Comprehensive cybersecurity services and expertise across multiple locations.","content_depth_score":3}},"percentile":67,"similar_domains":[{"domain":"df.tuzvo.sk","acri_score":63,"ai_readiness_score":76,"tech_stack":"drupal","category":"infrastructure","token_bloat_ratio":4.199999809265137,"schema_count":0,"distance":13.830000114440917,"page_title":"Drevárska fakulta | Drevárska fakulta","h1_text":""},{"domain":"kasegeru.blog.jp","acri_score":63,"ai_readiness_score":74,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":4.699999809265137,"schema_count":0,"distance":21.68000011444092,"page_title":"稼げるまとめ速報","h1_text":"稼げるまとめ速報"},{"domain":"newdesiporn.com","acri_score":63,"ai_readiness_score":78,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":4,"schema_count":0,"distance":21.89000005722046,"page_title":"Watch Free Indian Porn Videos On Newdesiporn.com Tube: 1","h1_text":"Watch Free Indian Porn Videos On Newdesiporn.com Tube: 1"},{"domain":"trollishly.com","acri_score":63,"ai_readiness_score":75,"tech_stack":"express","category":"infrastructure","token_bloat_ratio":5.199999809265137,"schema_count":1,"distance":22.030000114440917,"page_title":"Trollishly: Buy TikTok Followers, Likes \u0026 Views | Safe \u0026 Secure","h1_text":"Buy TikTok Likes, Followers and Views with Fast \u0026 Secure Delivery"},{"domain":"madurai.nic.in","acri_score":63,"ai_readiness_score":76,"tech_stack":"wordpress","category":"government","token_bloat_ratio":3.4000000953674316,"schema_count":0,"distance":22.07000002861023,"page_title":"Madurai District, Government of Tamilnadu | Athens of the East | India","h1_text":"Madurai District"}]}
