https://www.facebook.com/share/1CHBg6LDA1/?mibextid=wwXIfr
31.13.66.35 · Meta Platforms Ireland Limited
Ashburn, United States
10576 days
200 · 23.0s
Valid· DigiCert Global G2 TLS RSA SHA256 2020 CA1, DigiCert Inc, US
COMPLETED
Domain Intelligence: facebook.com
Scanned 2 times since Feb 17, 2026, 09:40 AM UTC
Registered-domain escalation
Submit facebook.com as the primary IOC, enriched with evidence from hostile subdomains like www.facebook.com.
No KB/IOK detections were recorded for this scan.
social_media | technology | finance | ecommerce · 4/5/2026
This page impersonates Facebook. The final URL redirects to a Facebook login path, but the initial URL and domain are used in a deceptive redirect chain targeting credentials. The page title and UI mirror Facebook, yet the domain shown in the URL path and redirects confirms impersonation. The presence of a login form and password field within a heavily loaded page indicates credential collection intended to harvest user credentials.
Capture
Stages: 3
Canonical: Late Render (+3s)
Changed: No
Credential Signals
Forms: 1
Password fields: 1
Late-stage login UI: No
Resource Signals
Resources: 46
Hosts: 3
Domains: 3
Suspicious Endpoints
hxxps://www[.]facebook[.]com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fcrocs.dominique%3Fmibextid%3DwwXIfr%26rdid%3DtMAEYxtzUMl3ZAfm%26share_url%3Dhttps%253A%252F%252Fwww.facebook.com%252Fshare%252F1CHBg6LDA1%252F%253Fmibextid%253DwwXIfr&rdid=tMAEYxtzUMl3ZAfm
Scanner notes indicate a high likelihood of credential harvesting masquerading as Facebook. The page presents a legitimate Facebook login interface, uses a valid DigiCert certificate for facebook domains, and includes a redirect chain that points to a suspicious subpath (crocs.dominique) while preserving Facebook login UI. The presence of a password input, a login form, and heavy external script loading (119 scripts) strengthens the phishing signal. Although the SSL and domain appear Facebook-owned, the redirect and URL path manipulation imply an attempt to harvest credentials under false pretenses. This warrants immediate action to suspend or block the domain/path and alert hosting providers and registrars to prevent victim exposure.
Monitor