Intruder.io - SEO Checker

Overview of the SEO Check
Meta information
100% 
Page quality
80% 
Page structure
83% 
Link structure
62% 
Server
86% 
External factors
100% 
SEO Score
Response time
1.40 s
File size
118.80 kB
Words
1270
Media files
54
Number of links
91 internal / 38 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Intruder | Vulnerability Management Made Easy
The length of the page title is perfect. (425 pixels out of 580 max pixel length)
There are no duplicate words in the title
Meta description
(Critically important)
Secure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.
The length of the meta description is perfect. (965 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://www.intruder.io/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: en
Language defined in HTML: en
Server location: United States of America
The following language is defined by HTML: en
Alternate/Hreflang Links
(Somewhat important)
There are no alternate links specified on this page.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The character encoding is not specified in the HTTP header.
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
The favicon is linked correctly.

Meta tags

NameValue
descriptionSecure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.
viewportwidth=device-width, initial-scale=1
google-site-verificationPnrMQNK9zgg3f8BotA_QDPp_wWd2SjjVcHR3wbGhKWg
langen
twitter:cardsummary_large_image
twitter:titleIntruder | Vulnerability Management Made Easy
twitter:descriptionSecure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.
twitter:imagehttps://assets-global.website-files.com/5e285218b461add26cd262ee/60deff7530af53fdb050b82a_Banner-dark-1.9-centred-logo%20(1).png
og:titleIntruder | Vulnerability Management Made Easy
og:descriptionSecure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.
og:imagehttps://assets-global.website-files.com/5e285218b461add26cd262ee/60deff7530af53fdb050b82a_Banner-dark-1.9-centred-logo%20(1).png
og:typewebsite
charsetutf-8

Test up to 1.000 webpages of intruder.io with our free plan!

Try For Free
No trial. It's just free!

Page quality

Content
(Critically important)
Words from the H1 heading are not used in the page content.
This page contains 1270 words. That's ok.
33.7% of the text are stop words.
Keywords used in the page title are also used in the page content. That's good!
23 paragraphs were found on this page.
No placeholders texts or images were found.
There are no duplicates on the site.
The average number of words per sentence of 16.39 words is good.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
A viewport "width=device-width, initial-scale=1" is provided.
At least one Apple touch icon is specified.
Bold and strong tags
(Somewhat important)
The usage of strong and bold tags is perfect. We recommend the use of up to 25 tags for this page.
Image SEO
(Somewhat important)
4 images have no alt attribute. The content of alt attributes is used by search engines.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
...0b323d/64931cbdee18510b47f41730_Logo.svgIntruder logo
...0b323d/64931cbdee18510b47f41730_Logo.svgIntruder logo
...649161f655ece2717e597fb0_Drata logo.webpdrata logo
...22269b270ff2865e_posthog-logo-white.webpNo alt attribute provided
...49161f655ece2717e597fb6_Pangea logo.webppangea logo
...9161f655ece2717e597fac_Kit_of_Parts.webptrust logo
...61f655ece2717e597fd5_little-ghosts-2.svglittle ghosts like in old video game
...d/649161f655ece2717e597fd0_stopwatch.svgstopwatch icon
...1f655ece2717e597fc8_graph-down-arrow.svggraph going down icon
...d/649161f655ece2717e597fca_high-five.svghigh five icon
...ffb_intruder-dashboard-hd-optimized.webpintruder dashboard screenshot
...0b323d/649161f655ece2717e597fd6_Bolt.svgbolt icon
...23d/649161f655ece2717e597fd7_Savings.svgcoin stack icon
...23d/649161f655ece2717e597fd7_Savings.svgcoin stack icon
...49161f655ece2717e597fd8_compliance-2.pngcompliance with drata
...b323d/649161f655ece2717e597fcf_socks.svgsocks icon
...23d/649161f655ece2717e597fc7_alright.svgalright icon
...323d/649161f655ece2717e597fce_rocket.svgrocket icon
...17e597fdd_vulnerability-management-2.pngcircuit scheme
...23d/649161f655ece2717e597fc9_cursors.svgcursors icon
...23d/649161f655ece2717e597fd3_website.svgwebsite icon
...b323d/649161f655ece2717e597fd4_radar.svgradar icon
...3d/649161f655ece2717e597fc6_computer.svgcomputer icon
...323d/649161f655ece2717e597fd1_trophy.svgtrophy icon
...b323d/649161f655ece2717e597fcc_power.svgpower button icon
...23d/649161f655ece2717e597fcb_heart-2.svgheart icon
.../649161f655ece2717e597fe2_scan-now-2.pngscan now creative
...323d/649161f655ece2717e597fd2_target.svgtarget icon
...b323d/649161f655ece2717e597fd4_radar.svgradar icon
...0b323d/649161f655ece2717e597fcd_coin.svgcoin icon
...f655ece2717e597fe7_app-integration-2.pngvarious app icons
...b323d/649161f655ece2717e597fba_Brand.svgbrand logo
...23d/649161f655ece2717e597fbc_Brand-1.svgbrand logo
...323d/65d4ac5c7ed19c52f8e0785a_Nuclei.pngNuclei logo
...23d/649161f655ece2717e597fbb_Brand-2.svgbrand logo
...23d/649161f655ece2717e597fbd_Brand-3.svgbrand logo
...23d/649161f655ece2717e597fbe_Brand-4.svgbrand logo
...33c0ae5313a8e9ef2b5696_Blog header 2.jpgFocus on what matters most: Exposure management and your attack surfaceFocus on what matters most: Exposure management and your attack surface
...1f655ece2717e597fbf_G2-testimonials.webpG2 testimonial quality badge
...161f655ece2717e597ff6_ben-camilleri.jpegBen Camilleri
...649161f655ece2717e597ff0_fred-kramer.pngFred Kramer
...49161f655ece2717e597ff9_ethan-brush.webpEthan Brush
...86e284c5ffb016dd2b3594_roy-mckenzie.webpNo alt attribute provided
...61f655ece2717e597ff2_oliver-stanley.jpegOliver Stanley
...323d/624335bba805301bced24a9f_Pixels.svgNo alt attribute provided
...7090316203124aee66_placeholder-image.svgNo alt attribute provided
...655ece2717e597ff4_christophe-spencer.pngChristophe Spencer
.../649161f655ece2717e598003_Union-left.svgarrow left
...649161f655ece2717e598002_Union-right.svgarrow right
.../649161f655ece2717e598003_Union-left.svgarrow left
...649161f655ece2717e598002_Union-right.svgarrow right
...649161f655ece2717e597fec_cta-image-2.png7 days free trial
...0b323d/64931cbdee18510b47f41730_Logo.svgIntruder logo
...ruder-assets/20230609/intruder-badge.svgProtected by Intruder badge

Page structure

H1 heading
(Critically important)
More than a scanner. Vulnerability management made easy.
The H1 heading is perfect.
Headings
(Important)
Some headings occur twice on the page.
There are 31 headings on the page. The amount of headings should be in a more proper relation to the amount of text.

Heading structure

Heading levelContent
H1 More than a scanner. Vulnerability management made easy.
H2 Know what’s exposed. Fix what matters.
H2 Secure your attack surface without the complexity
H2 Meet requirements. Prove it, effortlessly.
H2 Streamline finds and fixes. Simplify the chaos.
H2 Visibility that drives attack surface reduction
H2 Seamlessly integrate Intruder with your favorite tools
H2 Working with the best
H2 What’s new from Intruder?
H2 Focus on what matters most: Exposure management and your attack surface
H2 Our customers think we're excellent
H2 Sign up for your free 14-day trial
H3 24/7
H3 40% savings
H3 40% savings Duplicate text
H3 Automated cloud security
H3 Web application and API scanning
H3 Continuous penetration testing
H3 Network monitoring
H4 Setup and scan in minutes
H4 Reduce your attack surface
H4 The best support, seriously
H4 We're SOC 2 Type 2 certified
H4 Drata integration for seamless compliance
H4 Our customers exceed compliance standards
H4 Trusted by thousands of businesses worldwide
H4 Powered by leading scanning engines
H4 Get set up and start scanning in under 10 mins
H4 Find hidden services on non-standard ports
H4 24/7 network visibility with continuous scanning
H4 Only pay for active targets with Smart Recon
Some anchor texts are used more than once.
There are 1 links with a trivial anchor text.
The number of internal links is ok.
None of the anchor texts is too long.
All internal links are not using dynamic parameters.
There are too many external links (38) on this page.
LinkAttributesAnchor text
https://www.intruder.io/IMG-ALT Intruder logo
/continuous-vulnerability-mana...Continuous vulnerability management
/attack-surface-monitoringAttack surface monitoring
/effortless-reporting-complianceREPORTING & COMPLIANCE
/external-vulnerability-scannerExternal vulnerability scanning
/internal-vulnerability-scannerInternal vulnerability scanning
/cloud-vulnerability-scanning-...Cloud vulnerability scanning
/web-application-vulnerability...Web Application vulnerability scanning
/vulnerability-scanner/api-sca...API vulnerability scanning
/continuous-penetration-testingContinuous penetration testing
/intelligent-issue-prioritisationREPORTING
https://www.intruder.io/pricingPricing
https://developers.intruder.io...External Subdomain DEVELOPER HUB
/integration-partnersIntegration partners
https://help.intruder.io/en/?_...External Subdomain HELP CENTRE
https://www.intruder.io/blogBLOG
https://www.intruder.io/guidesGUIDES
/success-storiesSUCCESS STORIES
https://www.intruder.io/researchRESEARCH
https://www.intruder.io/webinarsWEBINARS
https://www.intruder.io/about-usABOUT US
https://www.intruder.io/contactCONTACT
https://trust.intruder.io/External Subdomain trust center
/refer-a-friendREFER A FRIEND
/partners/become-a-partnerBECOME A PARTNER
https://careers.intruder.io/?_...External Subdomain CAREERS
https://accounts.intruder.io/l...External Subdomain Login
https://portal.intruder.io/fre...External Subdomain Try for free
https://www.intruder.io/Text duplicate IMG-ALT Intruder logo
/continuous-vulnerability-mana...Text duplicate Continuous vulnerability management
/attack-surface-monitoringText duplicate Attack surface monitoring
/effortless-reporting-complianceText duplicate REPORTING & COMPLIANCE
/external-vulnerability-scannerText duplicate External vulnerability scanning
/internal-vulnerability-scannerText duplicate Internal vulnerability scanning
/cloud-vulnerability-scanning-...Text duplicate Cloud vulnerability scanning
/web-application-vulnerability...Text duplicate Web Application vulnerability scanning
/vulnerability-scanner/api-sca...Text duplicate API vulnerability scanning
/continuous-penetration-testingText duplicate Continuous penetration testing
/intelligent-issue-prioritisationText duplicate REPORTING
https://www.intruder.io/pricingText duplicate Pricing
https://developers.intruder.io...External Subdomain Text duplicate DEVELOPER HUB
/integration-partnersText duplicate Integration partners
https://help.intruder.io/en/?_...External Subdomain Text duplicate HELP CENTRE
https://www.intruder.io/blogText duplicate BLOG
https://www.intruder.io/guidesText duplicate GUIDES
/success-storiesText duplicate SUCCESS STORIES
https://www.intruder.io/researchText duplicate RESEARCH
https://www.intruder.io/webinarsText duplicate WEBINARS
https://www.intruder.io/about-usText duplicate ABOUT US
https://www.intruder.io/contactText duplicate CONTACT
https://trust.intruder.io/External Subdomain Text duplicate trust center
/refer-a-friendText duplicate REFER A FRIEND
/partners/become-a-partnerText duplicate BECOME A PARTNER
https://careers.intruder.io/?_...External Subdomain Text duplicate CAREERS
https://accounts.intruder.io/l...External Subdomain Text duplicate Login
https://portal.intruder.io/fre...External Subdomain Text duplicate Try for free
https://portal.intruder.io/fre...External Subdomain Text duplicate Try for free
/effortless-reporting-complianceGet compliant
/blog/the-importance-of-vulner...Subdomain We're SOC 2 Type 2 certified
IMG-ALT socks icon
/partners/drata-integrationDrata integration for seamless compliance
IMG-ALT alright icon
https://www.g2.com/products/in...New window External Subdomain Our customers exceed compliance standards
IMG-ALT rocket icon
https://portal.intruder.io/fre...External Subdomain Text duplicate Try for free
https://www.intruder.io/pricingView pricing
/success-storiesNew window Subdomain Trusted by thousands of businesses worldwide
IMG-ALT trophy icon
https://help.intruder.io/en/ar...New window External Subdomain Powered by leading scanning engines
IMG-ALT power button icon
/attack-surface-monitoringLearn more
/blog/the-importance-of-vulner...Subdomain Find hidden services on non-standard ports
IMG-ALT target icon
/continuous-vulnerability-mana...24/7 network visibility with continuous scanning
IMG-ALT radar icon
https://help.intruder.io/en/ar...New window External Subdomain Only pay for active targets with Smart Recon
IMG-ALT coin icon
https://help.intruder.io/en/co...New window External Subdomain See all
/blog/intruder-joins-google-cl...New window Subdomain IMG-ALT brand logo
https://help.intruder.io/en/ar...New window External Subdomain Text duplicate IMG-ALT brand logo
/blog/what-is-nuclei-vulnerabi...New window Subdomain IMG-ALT Nuclei logo
/partners/drata-integrationNew window Subdomain Text duplicate IMG-ALT brand logo
/product/owasp-top-10-vulnerab...New window Subdomain Text duplicate IMG-ALT brand logo
https://help.intruder.io/en/ar...New window External Subdomain Text duplicate IMG-ALT brand logo
/blog/focus-on-what-matters-mo...Trivial anchor text
Read more
https://www.intruder.io/blogView blogs
/blog/focus-on-what-matters-mo...IMG-ALT Focus on what matters most: Exposure management and your attack surface
https://www.g2.com/products/in...New window External Subdomain "Intruder helps to build more proactive, secure, and agile IT teams. It provides a huge benefit in proactive change detection, where it will advise when new ...
IMG-ALT Ben Camilleri
https://www.g2.com/products/in...New window External Subdomain Anchor "Intruder is easy to use and to setup. We had an external pen test done, and I could compare the result and it was more extensive than the result we had. Not...
IMG-ALT Fred Kramer
https://www.g2.com/products/in...New window External Subdomain "Intruder doesn't waste any time getting to the bottom of your issue, providing you with examples, and best steps for remediation. Super-fast response and qu...
IMG-ALT Ethan Brush
https://www.g2.com/products/in...New window External Subdomain "Convenient but thorough penetration and vulnerability testing wrapped in an affordable package! Remediation instructions are excellent and easy to follow. E...
https://www.g2.com/products/in...New window External Subdomain "Intruder is thorough, reliable and regular. It gives me peace of mind that we are being tested regularly to a high standard, which in turn gives my customer...
IMG-ALT Oliver Stanley
https://www.g2.com/products/in...New window External Subdomain "Intruder’s Customer Support and Product teams cannot be beaten. Customer support is always reachable in a short amount of time and professional. The Product...
https://www.g2.com/products/in...New window External Subdomain Anchor "As an MSP / MSSP focused on the SMB marketplace, finding easy-to-use, cost-effective, and robust tools is hard to come by. Intruder has allowed us to layer ...
https://www.g2.com/products/in...New window External Subdomain Anchor "As an organisation expands, ensuring the security of all digital assets from the moment of their deployment can be a daunting task for a CISO. Intruder has ...
IMG-ALT Christophe Spencer
https://portal.intruder.io/fre...External Subdomain Start today
https://www.intruder.io/Text duplicate IMG-ALT Intruder logo
/developersDevelopers
/small-and-medium-sized-enterp...Start-ups and scale-ups
/enterpriseEnterprise
/acunetix-alternativeIntruder vs Acunetix
/qualys-alternativeIntruder vs Qualys
/rapid7-alternativeIntruder vs Rapid7
/netsparker-alternativeIntruder vs Netsparker (Invicti)
/detectify-alternativeIntruder vs Detectify
/pentest-tools-com-alternativeIntruder vs Pentest-Tools.com
/automated-penetration-testingAutomated Penetration Testing
/cloud-vulnerability-scanning-...Cloud Vulnerability Scanner
/network-vulnerability-scannerNetwork Vulnerability Scanner
/external-vulnerability-scannerExternal Vulnerability Scanner
/internal-vulnerability-scannerInternal Vulnerability Scanner
/website-security-scannerWebsite Security Scanner
/compliance/soc-2-vulnerabilit...Subdomain SOC 2
/compliance/iso-27001-vulnerab...Subdomain ISO 27001
/compliance/pci-vulnerability-...Subdomain PCI DSS
https://developers.intruder.io...External Subdomain Developer Hub
https://help.intruder.io/en/?_...External Subdomain Help Centre
https://www.intruder.io/blogBlog
https://www.intruder.io/guidesGuides
https://www.intruder.io/glossaryGlossary
/success-storiesSuccess Stories
https://www.intruder.io/researchResearch
https://www.intruder.io/webinarsWebinars
https://www.intruder.io/about-usAbout Us
https://www.intruder.io/contactContact
/partners/become-a-partnerBecome a Partner
https://careers.intruder.io/?_...External Subdomain Careers (We're hiring!)
https://help.intruder.io/en/ar...External Subdomain IMG-ALT Protected by Intruder badge
https://twitter.com/intruder_ioNew window External No Text
https://www.facebook.com/intru...New window External Subdomain No Text
https://www.linkedin.com/compa...New window External Subdomain No Text
https://www.intruder.io/privacyPrivacy Policy
/legal/termsTerms of Service
https://status.intruder.io/?_g...External Subdomain Status
https://www.intruder.io/securitySecurity
https://trust.intruder.io/External Subdomain Trust center
https://www.intruder.io/sitemapSitemap

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://www.intruder.io/"
HTTP header
(Important)
No X-Powered HTTP header is sent.
This page uses GZip for compressed data transmission.
Performance
(Somewhat important)
The page response time is slow (1.40 seconds). The response time should be less than 0.4 seconds. Slow websites are bad for search engine bots and also result in bad user experience.
The file size of the HTML document is fine (119 kB).

HTTP Response Header

NameValue
dateMon, 20 May 2024 16:28:14 GMT
content-typetext/html
content-length22642
x-lambda-id720dc62b-c7d7-41b3-b7c7-6ef39cd29efc
content-encodinggzip
accept-rangesbytes
age0
x-served-bycache-dub4320-DUB
x-cacheMISS
x-cache-hits0
x-timerS1716222494.867916,VS0,VE986
varyx-wf-forwarded-proto, Accept-Encoding
x-cluster-nameeu-west-1-prod-hosting-red
statuscode200
http_versionHTTP/2

External factors

Blacklists
(Nice to have)
This website is not classified "for adult only".
This website has excellent links from other websites.
This page has backlinks from 1,064 referring domains.
This page has 13,848 backlinks.
This page has backlinks from 844 different ip addresses.
Facebook popularity
(Somewhat important)
The page has 0 shares and comments on Facebook.

Links from Wikipedia

No links from Wikipedia were found.

Search preview

www.intruder.io
Intruder | Vulnerability Management Made Easy
Secure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
vulnerability75%Check
vulnerability management75%Check
management72%Check
Vulnerability management made71%Check
Intruder70%Check
Vulnerability Management Made Easy69%Check
vulnerability scanning66%Check
Vulnerability Scanner62%Check
Made Easy62%Check
easy61%Check

Test up to 1.000 webpages of intruder.io with our free plan!

Try For Free
No trial. It's just free!

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions