Is 92wailian.com Safe? Security Analysis for 杭州金豆网络科技有限公司
Check if 92wailian.com is a scam or legitimate. Free security scan and reviews.

AI Summary
杭州金豆网络科技有限公司 operates a Chinese-language website focused on providing website construction, SEO, hosting, design, and maintenance services primarily targeting local Chinese businesses and individuals. The company appears to be a small technology service provider founded around 2021, consistent with the domain registration date. The website content is basic but relevant to its business domain, offering informational articles and service descriptions. The site uses a standard Bootstrap and jQuery frontend stack, with no detected CMS or advanced platform integrations. Performance and mobile optimization are basic but functional. From a security perspective, the website lacks critical security features such as HTTPS enforcement, security headers, and published privacy or cookie policies, which significantly lowers its security posture. No contact emails, phone numbers, or social media links are provided, limiting direct communication channels and reducing trust signals. The WHOIS data is transparent and consistent with the business claims, registered by a Chinese registrar and matching the website's language and market focus. Overall, the website is accessible without WAF or security challenges, but it exhibits several compliance and security gaps. The content is safe for general audiences with no adult or questionable material detected. Strategic improvements in security, privacy compliance, and contact transparency are recommended to enhance trust and professionalism.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
The company positions itself as a local Chinese technology service provider specializing in website construction and SEO services. Its business model revolves around offering digital presence solutions to small and medium enterprises or individuals. The website content and structure suggest a focus on educational and service promotion content rather than e-commerce or large-scale enterprise solutions. The lack of advanced marketing tools or analytics indicates a modest digital maturity level. The external links to major Chinese portals suggest an intent to connect users with reputable resources. The absence of contact details and certifications limits competitive advantage and trust-building opportunities. Growth potential exists if the company enhances its digital presence, security posture, and customer engagement channels.
Security Posture Analysis
Comprehensive Security Assessment
The website's security maturity is low, with no evidence of HTTPS enforcement or security headers, which are fundamental for protecting user data and ensuring secure communications. The absence of privacy and cookie policies indicates non-compliance with common data protection regulations such as GDPR, which could pose legal risks if the site targets or collects data from EU residents. No incident response or vulnerability disclosure information is available, suggesting limited preparedness for security incidents. The lack of secure forms or input validation further exposes potential attack vectors. Overall, the security posture requires significant improvements to meet industry best practices and regulatory requirements.
Strategic Recommendations
Priority Actions for Security Improvement
Implement HTTPS with a valid SSL/TLS certificate and enforce secure connections site-wide.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
杭州金豆网络科技有限公司
网站建设是指使用标识语言(markup language),通过一系列设计、建模、和执行的过程将电子格式的信息通过互联网传输,最终以图形用户界面(GUI)的形式被用户所浏览。简单来说,网页设计的目的就是产生网站。
basic
moderate
Technical Stack
moderate
basic
basic
basic
Security Assessment
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is in Chinese and targets local Chinese market.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Missing X-Frame-Options header
HIGHPrevents clickjacking attacks
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Privacy Policy found
HIGHGDPR requires a clear and accessible privacy policy
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
Critical sector without clear security compliance
HIGHDetected sectors: digital
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No DKIM record found
MEDIUMDKIM adds cryptographic signatures to emails
No BIMI Record
LOWBIMI displays brand logos in email clients
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
No email authentication configured
CRITICALDomain is vulnerable to email spoofing
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Weak Protocols Supported
HIGHServer supports weak protocols: TLSv1.1
OCSP Stapling Not Enabled
LOWOCSP stapling improves performance and privacy
Certificate Transparency Not Implemented
LOWCertificate is not logged in Certificate Transparency logs
SSL Certificate Expires Within 90 Days
MEDIUMSSL certificate expires in 84 days
Mixed Content Detected
MEDIUM3 resources loaded over insecure HTTP
Partial SSL/TLS Assessment
LOWCompleted 3 of 4 security checks due to time constraints
Protocol Support
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found
Domain Transfer Lock Not Enabled
MEDIUMDomain can be transferred without authorization
Domain Delete Lock Not Enabled
LOWDomain can be deleted without additional verification
No DMARC Record
MEDIUMDMARC policy not configured
Domain Registration Details
- •No domain protection locks enabled
DNS Records
DNSSEC Status
DNS Performance
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Service Exposed: SSH
MEDIUMPort 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings