# tesselategroup.be — SUSPICIOUS > tesselategroup.be is a credential harvesting phishing domain detected by PhishDestroy. Domain resolves to 13.81.201.168; check the full report. ## Summary PhishDestroy identifies tesselategroup.be as an active credential harvesting phishing domain designed to trick users into submitting login credentials or sensitive information. The site mimics legitimate business or service login portals but captures entered data for malicious use. Visitors risk account takeover, financial loss, or identity theft if they interact with this domain. This domain was flagged by PhishDestroy with zero detections on VirusTotal out of 95 scans as of the latest update. The domain tesselategroup.be was registered on September 17, 2020, and currently resolves to IP address 13.81.201.168. It utilizes a Let's Encrypt SSL certificate, which adds a false sense of legitimacy. The lack of detections highlights how new or evasive phishing domains can bypass initial security checks, emphasizing the need for proactive threat intelligence. If you visited tesselategroup.be and entered any personal or login information, immediately change your passwords, enable two-factor authentication on affected accounts, and monitor for unusual activity. Run a full antivirus scan on your device. Avoid re-entering credentials on this site. Report the domain to your IT team or platform provider to help block further access. Stay alert for follow-up phishing attempts as attackers may use stolen data for targeted scams. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registered: 2020-09-17 00:00:00 - Registrar: REGISTRAR_NOT_FOUND - IP: 13.81.201.168 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/cc7f35d3-5b45-4853-86af-99b71c5ba519 - PhishDestroy: https://phishdestroy.io/domain/tesselategroup.be/ - LLM endpoint: https://phishdestroy.io/domain/tesselategroup.be/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/tesselategroup.be/ Last updated: 2026-03-25