Is qian-gua.com Safe? Security Analysis for 福州果集信息科技有限公司
Check if qian-gua.com is a scam or legitimate. Free security scan and reviews.

AI Summary
千瓜数据是一家专注于小红书平台的营销数据分析服务提供商,成立于2019年,隶属于福州果集信息科技有限公司。该网站提供多样化的数智工具、营销策略方案及精准种草服务,旨在驱动品牌数字营销能力和业务增长。网站内容丰富,设计专业,面向品牌营销人员和市场分析师,市场定位明确,拥有较强的行业影响力和合作伙伴生态。技术基础扎实,采用多种现代JavaScript库和阿里云托管,性能表现适中,移动端优化良好。安全措施包括HTTPS、滑块验证码和密码复杂度校验,但缺少部分安全头和DNSSEC支持。隐私政策和用户协议齐备,但缺少显式的cookie同意机制。整体安全评分良好,业务可信度高,适合目标用户使用。
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
千瓜数据在小红书营销数据领域具备领先优势,提供全维度数据收录和多元化管理工具,支持品牌进行市场洞察、营销管理和内容创作。其商业模式结合SaaS工具和定制化服务,目标客户为品牌营销人员和内容运营者。公司拥有多个合作伙伴网站,形成完整的营销数据生态。网站内容专业,更新及时,体现出良好的市场竞争力和客户服务能力。业务规模为中型,注册信息与网站内容一致,显示出较高的业务透明度和合法性。
Extracted Contact Information
Marketing Intelligence Data
Phone Numbers (2)
Security Posture Analysis
Comprehensive Security Assessment
网站采用HTTPS保障数据传输安全,集成滑块验证码和短信验证机制防止自动化攻击,密码策略合理。缺少DNSSEC和部分安全HTTP头,存在一定的安全提升空间。未发现明显的安全漏洞或敏感信息泄露。缺少安全事件响应联系方式和漏洞披露渠道,建议完善安全管理流程。整体安全成熟度中等偏上,适合当前业务需求,但需持续改进以应对更复杂的威胁。
Strategic Recommendations
Priority Actions for Security Improvement
启用DNSSEC以增强域名解析安全,防止DNS欺骗攻击。
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
福州果集信息科技有限公司
千瓜数据是小红书营销数据专家,提供全维度数据收录、分钟级数据监控、多元化管理工具和可视化分析工具,并提供营销策略方案及精准种草服务,驱动业务增长,赋能品牌数字营销能力。
good
consistent
Technical Stack
moderate
good
basic
good
Security Assessment
- HTTPS enforced
- Use of CAPTCHA and sliding verification for login
- Password complexity enforcement
- Phone number validation including virtual number blocking
- Use of secure AJAX calls with credentials
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website provides specialized marketing data analytics services focused on the Xiaohongshu (Little Red Book) platform.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Missing Strict-Transport-Security header
HIGHForces HTTPS connections
Missing X-Frame-Options header
HIGHPrevents clickjacking attacks
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
Critical sector without clear security compliance
HIGHDetected sectors: transport, digital
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No SPF record found
HIGHSPF helps prevent email spoofing
No DKIM record found
MEDIUMDKIM adds cryptographic signatures to emails
No BIMI Record
LOWBIMI displays brand logos in email clients
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
No email authentication configured
CRITICALDomain is vulnerable to email spoofing
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Weak Protocols Supported
HIGHServer supports weak protocols: TLSv1.1
OCSP Stapling Not Enabled
LOWOCSP stapling improves performance and privacy
Certificate Transparency Not Implemented
LOWCertificate is not logged in Certificate Transparency logs
Mixed Content Detected
MEDIUM8 resources loaded over insecure HTTP
Partial SSL/TLS Assessment
LOWCompleted 3 of 4 security checks due to time constraints
Protocol Support
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found
Domain Transfer Lock Not Enabled
MEDIUMDomain can be transferred without authorization
Domain Delete Lock Not Enabled
LOWDomain can be deleted without additional verification
No DMARC Record
MEDIUMDMARC policy not configured
Domain Registration Details
- •No domain protection locks enabled
DNS Records
DNSSEC Status
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings