Skip to main content

Is oilwastetank.com a Scam? Security Check Results - SUMAC Auto Recycling Equipment Co.,Ltd Reviews

oilwastetank.com favicon

Is oilwastetank.com Safe? Security Analysis for SUMAC Auto Recycling Equipment Co.,Ltd

Check if oilwastetank.com is a scam or legitimate. Free security scan and reviews.

EnergyChinamedium
jQuery 3.6.1Swiper.jsLazyLoadLite YouTube embed
Analyzed 8/3/2025Completed 5:52:54 AM
34
Security Score
HIGH RISK

AI Summary

SUMAC Auto Recycling Equipment Co.,Ltd is a China-based company specializing in manufacturing recycling equipment, particularly fuel tanks and ELV (End-of-Life Vehicle) recycling machinery. Established in 2011, the company has developed international partnerships, notably with ARS Australia, to design and produce advanced recycling and dismantling equipment. Their product range includes diesel storage tanks, portable diesel tanks with pumps, and waste oil tanks, targeting industrial and commercial clients in the recycling and automotive sectors. The website reflects a medium-sized enterprise with a global customer base and a commitment to after-sales service and technical support. Technically, the website employs modern JavaScript libraries such as jQuery and Swiper.js, with responsive design elements and lazy loading for images, indicating a moderate level of digital maturity. SEO practices are evident through meta tags and structured navigation, although accessibility features are basic. The site uses HTTPS, but no explicit security headers were detected in the provided data, suggesting room for improvement in security hardening. From a security perspective, the site shows no signs of WAF or blocking mechanisms, and no vulnerabilities were directly observed. However, the absence of privacy and cookie policies, lack of incident response information, and missing WHOIS registration data raise concerns about compliance and legitimacy. The domain WHOIS query returned no match, which is inconsistent with the company's claimed history and reduces trustworthiness. Overall, the website is professionally designed and business-focused but requires enhancements in security policies, compliance documentation, and domain registration transparency to improve trust and reduce risk.

Detected Technologies

jQuery 3.6.1Swiper.jsLazyLoadLite YouTube embed

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

SUMAC operates in the energy and manufacturing sectors, focusing on recycling equipment for tires, metals, and ELVs. Their business model is B2B, supplying specialized machinery and storage solutions globally. The company leverages international partnerships to enhance product development and market reach. Their competitive advantage lies in integrated solutions combining recycling technology with fuel storage systems. Revenue streams likely include equipment sales, after-sales services, and training. The target customers are industrial recycling firms, automotive dismantlers, and fuel storage operators. Growth indicators include a global customer base and multiple projects showcased. The partnership ecosystem includes ARS Australia and various industrial equipment suppliers. Strategic observations highlight the need for improved digital trust signals and compliance transparency to support international expansion.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

s*****@hkmach.com

Phone Numbers (1)

+8613812******

Security Posture Analysis

Comprehensive Security Assessment

The current security posture is moderate. The website uses HTTPS, which is mandatory for secure communications. However, the lack of security headers such as Content-Security-Policy, X-Frame-Options, and HSTS reduces protection against common web attacks. No incident response or vulnerability disclosure information is provided, indicating limited preparedness for security incidents. Data protection practices are unclear due to missing privacy and cookie policies, which also impacts GDPR compliance. The presence of contact forms without visible anti-bot or input validation mechanisms could pose risks. Overall, the security culture appears basic, with room for significant improvement in policy transparency, technical controls, and incident readiness.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement comprehensive privacy and cookie policies to ensure compliance with GDPR and other regulations.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

SUMAC Auto Recycling Equipment Co.,Ltd

Description:

Sumac was established in 2011, specialized in tire rubber recycling and metal recycling industries. Our processing equipment include fuel tank, diesel storage tank, diesel fuel tank, diesel tank with pump, portable diesel tank. SUMAC cooperated with ARS (Australia) to design, develop and manufacture ELV recycling and dismantling equipments. Committed to solving global recycling problems of end-of-life vehicles and becoming world leader in ELV recycling industries.

Key Services:
Manufacture of fuel storage tanksELV recycling equipmentAfter-sales service including installation and training
Content Quality:

good

Branding:

moderate

Technical Stack

Technologies:
jQuery 3.6.1Swiper.jsLazyLoadLite YouTube embed
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
60/100
Best Practices:
  • Use of HTTPS (implied by https URLs)
  • No visible exposed sensitive data
  • Contact forms present

Analytics & Tracking

Services:
51.la
Tracking Level:moderate
Privacy Compliance:poor

Advertising & Marketing

Tracking Pixels:
51.la
Marketing Tools:
51.la analytics
Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:moderate

Key Observations

1

Website is fully accessible with no WAF or blocking detected

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

35/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

Third-party services without privacy policy

HIGH

Detected services: Facebook, LinkedIn, YouTube

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

60/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

No email authentication configured

CRITICAL

Domain is vulnerable to email spoofing

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

0/100
Score

Unable to retrieve SSL certificate

CRITICAL

Could not establish secure connection to retrieve certificate information

Mixed Content Detected

MEDIUM

5 resources loaded over insecure HTTP

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

60/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Transfer Lock Not Enabled

MEDIUM

Domain can be transferred without authorization

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

No DMARC Record

MEDIUM

DMARC policy not configured

Domain Registration Details

Domain Age
0 years(young)
Expiry Risk
low(192 days)
Protection Level
noneDNSSEC OFF
Suspicious Indicators Detected
  • No domain protection locks enabled

DNS Records

A Records:47.254.45.237
Name Servers:
ns1.22.cn
ns2.22.cn

DNSSEC Status

DNSSEC Not Enabled

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built using standard web technologies including HTML5, CSS, and JavaScript libraries like jQuery and Swiper.js for UI components. Lazy loading is used for images to improve performance. The site is responsive and optimized for mobile devices. SEO is supported by meta tags and structured navigation. However, no CMS or hosting provider information is evident. Performance is moderate with room for optimization. The absence of advanced security headers and compliance documentation indicates technical debt in security and privacy areas. Modernization opportunities include adopting a CMS for easier content management, implementing security best practices, and improving accessibility compliance.
Analyze Another Website