Inara Poli @cumwithlink.zip Today

A smart tool for scrape email address and phone number from Facebook groups members, fans page followers, and friends by friends.

Add to Chrome (It's free)
Current version: v2.0.3, 2025-11-18
Inara Poli @Cumwithlink.zip

Extract details of FB group members and page feed's Commentors / Likers to find their verified professional email address and even mobile phone.

Features

Everything you need to extract and export Facebook leads safely.

Group Members & Page Audiences

Extract from groups, pages, and profiles.

Verified Emails & Phones

Find professional emails and mobile numbers.

Followers & Followings

Fetch user followers and followings.

Bulk ID Finder

Quickly resolve User, Group, and Page IDs.

Fast & Lightweight

Optimized for speed and reliability.

Export CSV / XLSX

Export clean data for your workflows.

How it works

Start in minutes — no coding required.

1. Install the extension

Download the ZIP and load it in Chrome's Extensions (Developer mode).

2. Sign in

Sign in to Facebook. If prompted, ensure a linked Instagram account is logged in.

3. Extract & export

Choose a source, start extraction, then export CSV/XLSX.

Pricing

Get started for free. No credit card required, cancel anytime.

Basic

Free
per user / month
  • Export up to 10 Facebook leads.
  • Basic support
Add to chrome

Professional

$12.99 $20.00 / Month
per user / month
  • Export unlimited Facebook leads
  • Premium support
Add to chrome

100% money back guarantee.

We know you're gonna love our professional services, but let us prove it. If our service hasn't exceeded your expectations after 7 days, you'll get a full refund. Simple as that. Inara Poli @Cumwithlink.zip

Get started now

In the current digital landscape, creators often use "link-in-bio" tools to direct fans to external content. Malicious actors frequently impersonate popular figures—like the name mentioned—to distribute harmful files. Here is why strings like the one you provided are red flags:

: Many of these links lead to "gatekeeper" sites that ask for a credit card "just for age verification." These are almost exclusively phishing sites designed to capture financial data. How to Protect Yourself

However, this provides a great opportunity to discuss a more useful subject: The Risks of "Link-in-Bio" and Compressed Files

: Never download a .zip or .exe file from a social media bio or an unverified profile. Legitimate content creators typically use trusted platforms (like Patreon, OnlyFans, or Substack) rather than direct file downloads.

: Compressed files (.zip, .rar) are a favorite tool for attackers. They are used to bypass basic email and browser scanners. Once a user downloads and extracts the file, they often unwittingly execute scripts that install keyloggers (to steal passwords) or remote access trojans (RATs) .

Treat any unsolicited file download as a high-level security threat. Your digital privacy is worth more than the curiosity of a "hidden" link.

: If you are suspicious of a link, use a service like VirusTotal to scan the URL or file hash before interacting with it.

Inara Poli @cumwithlink.zip Today

In the current digital landscape, creators often use "link-in-bio" tools to direct fans to external content. Malicious actors frequently impersonate popular figures—like the name mentioned—to distribute harmful files. Here is why strings like the one you provided are red flags:

: Many of these links lead to "gatekeeper" sites that ask for a credit card "just for age verification." These are almost exclusively phishing sites designed to capture financial data. How to Protect Yourself

However, this provides a great opportunity to discuss a more useful subject: The Risks of "Link-in-Bio" and Compressed Files

: Never download a .zip or .exe file from a social media bio or an unverified profile. Legitimate content creators typically use trusted platforms (like Patreon, OnlyFans, or Substack) rather than direct file downloads.

: Compressed files (.zip, .rar) are a favorite tool for attackers. They are used to bypass basic email and browser scanners. Once a user downloads and extracts the file, they often unwittingly execute scripts that install keyloggers (to steal passwords) or remote access trojans (RATs) .

Treat any unsolicited file download as a high-level security threat. Your digital privacy is worth more than the curiosity of a "hidden" link.

: If you are suspicious of a link, use a service like VirusTotal to scan the URL or file hash before interacting with it.