The first example is a PHISH and as such could be blocked whenever found malicious.
The second example is more interesting:
wXw.facebook.com/r.php?invid=100003875482305&key=AQCQ52f5QLNpsb31llWxkGKiDHgVsgJeAy5eO283zPNNKrOX0nFbZ99q8WyyPoonTiaLmlDziQY4p-gaGPVZexSoHjM&_noscript=1&_noscript=1 benign
[nothing detected] (metarefresh) wXw.facebook.com/r.php?invid=100003875482305&key=AQCQ52f5QLNpsb31llWxkGKiDHgVsgJeAy5eO283zPNNKrOX0nFbZ99q8WyyPoonTiaLmlDziQY4p-gaGPVZexSoHjM&_noscript=1&_noscript=1
status: (referer=wXw.facebook.com/r.php?invid=100003875482305&key=AQCQ52f5QLNpsb31llWxkGKiDHgVsgJeAy5eO283zPNNKrOX0nFbZ99q8WyyPoonTiaLmlDziQY4p-gaGPVZexSoHjM&_noscript=1)saved 32240 bytes fb451a96778006741d5cc3fa3853d12fe8515ddd
info: [meta refresh] URL=wXw.facebook.com/r.php?invid=100003875482305&amp%3Bamp%3Bamp%3Bkey=AQCQ52f5QLNpsb31llWxkGKiDHgVsgJeAy5eO283zPNNKrOX0nFbZ99q8WyyPoonTiaLmlDziQY4p-gaGPVZexSoHjM&amp%3Bamp%3B_noscript=1&amp%3B_noscript=1&_noscript=1
info: [script] static.ak.fbcdn dot net/rsrc.php/v2/yj/r/4-f92ka3ZrY.js
info: [img] profile.ak.fbcdn dot net/hprofile-ak-snc4/161844_100003875482305_1325184765_q.jpg
info: [img] static.ak.fbcdn dot net/rsrc.php/v2/yb/r/GsNJNwuI-UM.gif
info: [decodingLevel=0] found JavaScript
suspicious facebook profile tracking script
polonus