Got a hit from FB early this morning (actually, similar hits to two sites):
IP: 66.220.149.nn
GET: /?fbclid=IwAR0Uuiuw7Yat7n2wij7HyVs3_9kXGdIJJ4cJdNsU_TD_0vVhH7r8prlW7eA
UA: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.142 Safari/537.36
This single access grabbed favicon, CSS and images from the page - in fact just as one would expect from Chrome. The querystring drew my attention - I do not use querystrings on these sites.
The second site hit is a single-page semi-honeytrap - when I get around to it. Until a few days ago it was HTTP, now HTTPS; FB came in on port 80 so historical. No one except nasties and genuine bots ever hit it. So far, no second hit (see below).
Three hours later I got...
IP: 173.252.87.nn
GET: /?fbclid=IwAR3Zi-gZca-49iQ7nqAcy8UMfyAKX1pFejaeoBTD5xW8i29yl_2eEOgOcXs
UA: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b
A second hit at the same time with the same bing UA tried to grab favicon.
In the interim I had set up a block on FB IPs except for facebookexternalhit and blocked all accesses that included querystrings.
The querystrings are not the same apart from fbclid but I would say the second access was prompted by the first.
Anyone else noticed this? Why are they forging BingPreview?