{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"volexity.com","crawled_at":"2026-03-21T13:36:18.41625Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":6773,"rendered_text_length":6773,"ghost_ratio":0,"rendering_type":"SSR","word_count":582,"li_count":28,"tr_count":0,"th_count":0,"structure_score":4.809999942779541,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":844,"total_html_bytes":56754,"useful_text_bytes":6773,"token_bloat_ratio":8.399999618530273,"images_total":5,"images_with_alt":3,"multimodal_pct":60,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":6185,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Home | Memory Forensics, Memory Analysis, Cybersecurity Services \u0026 Incident Response | Volexity","meta_description":"Volexity, the pioneer of memory forensics, delivers next-generation cybersecurity solutions - Volexity Volcano \u0026 Volexity Surge - and expert cyber threat intelligence \u0026 incident response services","logo_url":"https://www.volexity.com/wp-content/uploads/2025/06/favicon-512x512-1-150x150.png","crawl_blocked":false,"ai_readiness_score":78,"sub_bot_access":100,"sub_rendering":100,"sub_structure":40,"sub_schema":42,"sub_tech_stack":85,"extractability_score":59,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":56,"acri_extractability":80,"acri_semantic_structure":52,"acri_content_integrity":48,"acri_retrieval_robustness":40,"acri_grade":"C","h1_text":"No ‘Ware to Hide","h2_texts":"Surge | Volcano | Threat Intelligence | Featured News | Trustworthy incident response begins with dependable, verifiable data collection. | Testimonials | About | Solutions | Contact | Connect","tranco_rank":252059,"title_length":95,"meta_desc_length":195,"has_canonical":true,"canonical_url":"https://www.volexity.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":2,"h2_count":11,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Homepage","og_description":"Volexity, the pioneer of memory forensics, delivers next-generation cybersecurity solutions - Volexity Volcano \u0026 Volexity Surge - and expert cyber threat intelligence \u0026 incident response services","og_image":"https://www.volexity.com/wp-content/uploads/2025/06/Volexity-Logo-Stacked.png","twitter_card":"summary_large_image","ttfb_ms":844,"dom_node_count":373,"html_payload_kb":55.4,"has_hsts":true,"has_csp":false,"cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.volexity.com/sitemap_index.xml","internal_links":40,"external_links":5,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":75,"seo_pillar":60,"geo_pillar":80,"perf_pillar":74,"arch_pillar":86,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":278677,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":5,"llm_analyzed":true,"llm_analyzed_at":"2026-03-12T07:52:58.659737Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Volexity provides tools and services for memory forensics, cybersecurity, and digital investigations, enabling organizations to analyze system memory for threat detection and incident response.","target_audience":"Cybersecurity analysts, incident responders, digital forensic investigators, security consultants, government agencies, and organizations requiring advanced memory analysis capabilities.","pricing_model":"Custom pricing based on engagement and service needs; likely subscription or project-based.","integration_partners":[],"compliance_standards":[],"competitive_moat":"The Volatility Framework – a mature, widely adopted, and actively maintained open-source memory forensics platform with a large community.","content_depth_score":8,"programmatic_seo_signals":["Publication links","White paper links"],"key_pain_points":["Overwhelming volume of false positives","Limitations of traditional cybersecurity products","Need for advanced memory analysis techniques"]}},"percentile":88,"similar_domains":[{"domain":"themaneater.com","acri_score":66,"ai_readiness_score":80,"tech_stack":"wordpress","category":"education","token_bloat_ratio":8.5,"schema_count":1,"distance":13.530000114440918,"page_title":"The Maneater - The Student Newspaper of Mizzou since 1955","h1_text":"The Maneater"},{"domain":"tarom.ro","acri_score":66,"ai_readiness_score":78,"tech_stack":"wordpress","category":"social","token_bloat_ratio":9,"schema_count":1,"distance":13.680000114440919,"page_title":"TAROM","h1_text":"ZBURĂM PENTRU ROMÂNIA!"},{"domain":"narixasoft.es","acri_score":66,"ai_readiness_score":81,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":9.100000381469727,"schema_count":1,"distance":13.710000228881835,"page_title":"▷ Desarrollo de Apps y Páginas Web Profesional ✔️ NarixaSoft.es","h1_text":""},{"domain":"wavecell.com","acri_score":66,"ai_readiness_score":78,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":6,"schema_count":1,"distance":14.219999885559082,"page_title":"8x8 CPaaS - Communications Platform as a Service","h1_text":"8x8 Wins Best CPaaS Platform at the CX Awards 2025"},{"domain":"cryptoslate.com","acri_score":66,"ai_readiness_score":79,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":3.9000000953674316,"schema_count":1,"distance":14.849999856948852,"page_title":"Crypto News, Coin Prices \u0026 Market Trends | CryptoSlate","h1_text":"CryptoSlate"}]}
