Security Scan Report: enterpriseenrollment.transpay.com

Redirected to: https://login.microsoftonline.com/organizations/oauth2/v2.0/authorize?client_id=c44b4083-3bb0-49c1-b47d-974e53cbdf3c&scope=https%3A%2F%2Fmanagement.core.windows.net%2F%2F.default%20openid%20profile%20offline_access&redirect_uri=https%3A%2F%2Fintune.microsoft.com%2Fauth%2Flogin%2F&client-request-id=019ba741-b852-7ece-a07f-0597e0eac5a4&response_mode=fragment&client_info=1&nonce=019ba741-b852-71b7-ab4c-ab91af5ee598&state=eyJpZCI6IjAxOWJhNzQxLWI4NTItN2QyNS1hZWVkLWIxODM0ODU0MzNkNyIsIm1ldGEiOnsiaW50ZXJhY3Rpb25UeXBlIjoicmVkaXJlY3QifX0%3D&x-client-SKU=msal.js.browser&x-client-VER=4.21.0&response_type=code&code_challenge=xB0GyfNLEDj7ndfWU3qJTxd43pHDI5FRwZcxoDtdEak&code_challenge_method=S256&site_id=501430&instance_aware=true&sso_reload=true

Site favicon
Submitted: Jan 10, 2026, 9:34:14 AMCompleted: Jan 10, 2026, 9:36:07 AMpubliccompleted
Loading additional data...

Summary

This website contacted 7 IPs in 3 countries across 8 domains to perform 42 HTTP transactions. The main domain is login.microsoftonline.com and was registered NaN years ago.

Submitted URL: https://enterpriseenrollment.transpay.com

Effective URL: https://login.microsoftonline.com/organizations/oauth2/v2.0/authorize?client_id=c44b4083-3bb0-49c1-b47d-974e53cbdf3c&scope=https%3A%2F%2Fmanagement.core.windows.net%2F%2F.default%20openid%20profile%20offline_access&redirect_uri=https%3A%2F%2Fintune.microsoft.com%2Fauth%2Flogin%2F&client-request-id=019ba741-b852-7ece-a07f-0597e0eac5a4&response_mode=fragment&client_info=1&nonce=019ba741-b852-71b7-ab4c-ab91af5ee598&state=eyJpZCI6IjAxOWJhNzQxLWI4NTItN2QyNS1hZWVkLWIxODM0ODU0MzNkNyIsIm1ldGEiOnsiaW50ZXJhY3Rpb25UeXBlIjoicmVkaXJlY3QifX0%3D&x-client-SKU=msal.js.browser&x-client-VER=4.21.0&response_type=code&code_challenge=xB0GyfNLEDj7ndfWU3qJTxd43pHDI5FRwZcxoDtdEak&code_challenge_method=S256&site_id=501430&instance_aware=true&sso_reload=trueRedirected

AI Security Verdict

High Risk

Confidence: 82%

7
Risk Score

Suspicious login page impersonating Microsoft; likely phishing for credentials.

Risk Factors
Credential‑harvesting login form on a non‑official Microsoft domain
Brand impersonation of Microsoft on an unrelated domain
Redirect to legitimate Microsoft login after form submission
Domain age information unavailable

Details

Page Title

Sign in to Microsoft Azure

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

technology software

(78%)

Domain Information

Within the commercial generic top-level domain (.com), 'enterpriseenrollment.transpay.com' is registered with subdomain 'enterpriseenrollment'. The second-level label 'transpay' is 8 characters long with two vowels and 6 consonants. Segmentation suggests two words: trans, pay. The median word length lands at four characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://enterpriseenrollment.transpay.com

Page Load Overview

4.70s
Total Load Time
7
HTTP Requests
5
Domains
307 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:187 chars
Detector Agreement:100%

Website Classification

Primary Category

technology software78% confidence
Type: webapp
Method: ml+structural

All Detected Categories

technology software
78%

Detected Features

Login Form
Search

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
1150.171.84.26United States
AS8075MICROSOFT-CORP-MSN-AS-BLOCK
120.91.147.72Sweden
AS8075MICROSOFT-CORP-MSN-AS-BLOCK
113.107.246.44United States
AS8075MICROSOFT-CORP-MSN-AS-BLOCK
140.126.31.1Sweden
12.21.239.142Unknown
140.126.32.133Amsterdam, North Holland, Netherlands
AS8075MICROSOFT-CORP-MSN-AS-BLOCK
120.189.173.13Unknown
77--

Detected Technologies5

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T1518349A97EB71937C68A54B4B4793D02AE7A59078948CDA4F08CCD842FFBB9D8133117

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

1536:eb8GLGGY6eo08+nLxzzTEyqU6MVnvnaloMPt/EfoitUt1:A8d6eo08+LxmyS2vUt1

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:87959:oIFSCUQBmnKiZwmgISVRhmRJhAkkw7xAgDRSgq8YxPCSJzkCBALUTh0jAUICMYAYmpAJY0gAS0ASpQYIiWXlRE8TQILKowyA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:003e3f3f373fff00
Perceptual Hash:85d970f626d919e4
Difference Hash:c8e2d2d2e4cae6e7
Wavelet Hash:003a3b3f373f7700
Color Hash:#4082bf

Other Hashes

Scan History

Scan history not available

Unable to load historical scan data