china.cn operates as an online portal providing information and resources related to China. The website serves as a digital platform offering content about Chinese business, culture, and general information for domestic and international audiences. UpGuard continuously monitors the security posture of china using open-source, commercial, and proprietary threat intelligence feeds. Our analysis is centered on objective, externally verifiable information.
china's security rating is based on the analysis of their external attack surface. The higher the rating, the better their security posture. Start a free trial to get a more in-depth risk assessment for china.
Last updated April 10, 2026
This vendor risk report is based on UpGuard's continuous monitoring of china's security posture using open-source, commercial, and proprietary threat intelligence feeds. The results are summarized into a security rating based on the analysis of hundreds of individual checks across five risk categories: website security, email security, phishing & malware, brand & reputation risk, and network security.
Ensuring the server information header is not exposed reduces the ability of attackers to exploit certain vulnerabilities.
Information about specific technology used on the server is obscured.
The website's Referrer Policy is not configured to allow unsafe information to be sent in the referrer header.
Ensuring the ASP.NET version header is not exposing a specific version makes it harder for attackers to exploit certain vulnerabilities.
Ensuring the ASP.NET version header is not exposed makes it harder for attackers to exploit certain vulnerabilities.
The page appears to be maintained.
The 'MySQL' service is running and exposed to the internet. The configuration of the server should be reviewed and unnecessary ports closed.
The 'HTTP' service is running and exposed to the internet. The configuration of the server should be reviewed and unnecessary ports closed.
Port 12111 is open on this server, however no service was detected listening on this port. The configuration of the server should be reviewed and unnecessary ports closed.
Port 12113 is open on this server, however no service was detected listening on this port. The configuration of the server should be reviewed and unnecessary ports closed.
Port 3001 is open on this server, however no service was detected listening on this port. The configuration of the server should be reviewed and unnecessary ports closed.
Port 6666 is open on this server, however no service was detected listening on this port. The configuration of the server should be reviewed and unnecessary ports closed.
Port 843 is open on this server, however no service was detected listening on this port. The configuration of the server should be reviewed and unnecessary ports closed.
DNSSEC records prevent third parties from forging the records that guarantee a domain's identity. DNSSEC should be configured for this domain.
No unregistered MX records that could lead to receiving mail on behalf of the target organization were detected.
HTTPS is the standard protocol for secure communication on the internet. All redirects should be performed over HTTPS.
All HTTP requests are redirected to HTTPS.
This IP/domain has not been reported as a source of botnet activity in the last 30 days.
This IP/domain did not appear on any list of IPs and domains known to perform brute force login attempts in the last 30 days.
This IP/domain has been reported for distributing malware in the last 30 days.
This IP/domain has not been reported for performing unsolicited scanning in the last 30 days.
This IP/domain has not been reported as a phishing site in the last 30 days.
This IP/domain has not been reported as a source of botnet activity in the last 90 days.
This IP/domain did not appear on any list of IPs and domains known to perform brute force login attempts in the last 90 days.
This IP/domain has been reported for distributing malware in the last 90 days.
This IP/domain has not been reported for performing unsolicited scanning in the last 90 days.
This IP/domain has not been reported as a phishing site in the last 90 days.
Compare china's security performance with other companies in their industry.
YouTube operates an online video-sharing platform where users can upload, view, rate, share, and comment on content. The service hosts a wide variety of user-generated and corporate media videos, including music videos, educational content, and entertainment programming.
Deloitte provides professional services including audit and assurance, consulting, financial advisory, risk advisory, tax, and legal services to clients across various industries. The firm offers expertise in areas such as economics, strategy and operations, technology implementation, cybersecurity, and sustainability.
Commonwealth Bank provides financial services including personal and business banking accounts, credit cards, home loans, insurance products, and investment services. The company operates retail branches and digital banking platforms across Australia, offering foreign exchange services and institutional banking solutions.
Amazon.com operates an online retail platform offering a wide range of consumer products, including electronics, books, clothing, and household goods. The company also provides cloud computing services through Amazon Web Services and operates digital streaming and subscription services.
Adobe develops and publishes software products for creative professionals, marketers, and enterprises. The company offers applications for graphic design, video editing, web development, photography, and document management. Its products are primarily delivered through cloud-based subscription services.
Nike designs, manufactures, and sells athletic footwear, apparel, equipment, and accessories for sports and lifestyle use. The company operates across multiple sports categories including running, basketball, football, golf, and tennis.
The ultimate guide to attack surface and third-party risk management – actionable advice for security teams, managers, and executives.
Security research and global news about data breaches.
Explore resourcesArticles, news, and research on third-party risk management.
Explore resourcesArticles, news, and research on attack surface management.
Explore resourcesArticles, news, and research on cybersecurity.
Explore resources