https://www.facebook.com/people/Dato-Talahah/100068912653879/
57.145.2.1 · Meta Platforms Ireland Limited
Ashburn, United States
10611 days
200 · 23.1s
Valid· DigiCert Global G2 TLS RSA SHA256 2020 CA1, DigiCert Inc, US
COMPLETED
Domain Intelligence: facebook.com
Scanned 5 times since Feb 17, 2026, 09:40 AM UTC
Registered-domain escalation
Submit facebook.com as the primary IOC, enriched with evidence from hostile subdomains like www.facebook.com.
No KB/IOK detections were recorded for this scan.
Social Media · 4/29/2026
The page presents Facebook branding on a non-official URL path (a Facebook user profile URL under www.facebook.com/people) with impersonation signals. The page title references 'Dato Talahah | Facebook' while the domain is facebook.com, but the domain intelligence notes impersonation of 'ATO' in the title and a misleading profile page. The HTML shows a login form with password fields and multiple login-related POST requests, suggesting credential collection UI likely rendered via dynamic content. However, the hostname is official Facebook and resources load from Facebook domains, indicating a blend of first-party assets with potential impersonation signals in the observed title. The screenshot indicates a legitimate Facebook login UI overlaid, which strongly suggests credential harvesting behavior if presented under a deceptive context.
Capture
Stages: 2
Canonical: Settled Render
Changed: No
Credential Signals
Forms: 2
Password fields: 2
Late-stage login UI: No
Resource Signals
Resources: 102
Hosts: 6
Domains: 2
Suspicious Endpoints
hxxps://www[.]facebook[.]com/login/device-based/regular/login/?login_attempt=1
The scan indicates potential credential phishing targeting Facebook users: the page shows a login form and password field, and network activity includes login-related POST requests to Facebook endpoints. The domain is legitimate Facebook, but the page title signals impersonation of another entity (ATO) within a Facebook context, and the curated evidence notes impersonation signals. This combination suggests a phishing page designed to harvest credentials, leveraging Facebook branding with an impersonation cue in the title. Given the presence of a visible login form and associated exfiltration endpoints, this is actionable abuse evidence, though hosted under a legitimate domain path, which requires careful handling to distinguish first-party Facebook content from impersonation overlays.
Block URL