{"id":1616,"date":"2026-02-28T13:04:41","date_gmt":"2026-02-28T13:04:41","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/"},"modified":"2026-02-28T13:04:41","modified_gmt":"2026-02-28T13:04:41","slug":"who-is-the-kimwolf-botmaster-dort","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/","title":{"rendered":"Who is the Kimwolf Botmaster \u201cDort\u201d?"},"content":{"rendered":"<div>\n<p>In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build <strong>Kimwolf<\/strong>, the world\u2019s largest and most disruptive botnet. Since then, the person in control of Kimwolf \u2014 who goes by the handle \u201c<strong>Dort<\/strong>\u201d \u2014 has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher\u2019s home. This post examines what is knowable about Dort based on public information.<\/p>\n<p>A public \u201cdox\u201d created in 2020 asserted Dort was a teenager from Canada (DOB August 2003) who used the aliases \u201c<strong>CPacket<\/strong>\u201d and \u201c<strong>M1ce<\/strong>.\u201d A search on the username CPacket at the open source intelligence platform <strong>OSINT Industries<\/strong> finds a <strong>GitHub<\/strong> account under the names Dort and CPacket that was created in 2017 using the email address <strong>jay.miner232@gmail.com<\/strong>.<\/p>\n<div id=\"attachment_73247\" style=\"width: 759px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-73247\" decoding=\"async\" class=\" wp-image-73247\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png\" alt=\"\" width=\"749\" height=\"537\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png 988w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord-768x551.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord-782x561.png 782w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"><\/p>\n<p id=\"caption-attachment-73247\" class=\"wp-caption-text\">Image: osint.industries.<\/p>\n<\/div>\n<p>The cyber intelligence firm <strong>Intel 471<\/strong> says jay.miner232@gmail.com was used between 2015 and 2019 to create accounts at multiple cybercrime forums, including <strong>Nulled<\/strong> (username \u201cUubuntuu\u201d) and <strong>Cracked <\/strong>(user \u201cDorted\u201d); Intel 471 reports that both of these accounts were created from the same Internet address at Rogers Canada (99.241.112.24).<\/p>\n<p>Dort was an extremely active player in the Microsoft game <strong>Minecraft<\/strong> who gained notoriety for their \u201c<strong>Dortware<\/strong>\u201d software that helped players cheat. But somewhere along the way, Dort graduated from hacking Minecraft games to enabling far more serious crimes.<\/p>\n<p>Dort also used the nickname <strong>DortDev<\/strong>, an identity that was active in March 2022 on the chat server for the prolific cybercrime group known as <a href=\"https:\/\/krebsonsecurity.com\/tag\/lapsus\/\" target=\"_blank\" rel=\"noopener\">LAPSUS$<\/a>. Dort peddled a service for registering temporary email addresses, as well as \u201c<a href=\"https:\/\/pypi.org\/project\/dort\/\" target=\"_blank\" rel=\"noopener\">Dortsolver<\/a>,\u201d code that could bypass various CAPTCHA services designed to prevent automated account abuse. Both of these offerings were advertised in 2022 on <strong>SIM Land<\/strong>, a Telegram channel dedicated to <a href=\"https:\/\/krebsonsecurity.com\/category\/sim-swapping\/\" target=\"_blank\" rel=\"noopener\">SIM-swapping<\/a> and account takeover activity.<\/p>\n<p>The cyber intelligence firm <strong>Flashpoint <\/strong>indexed 2022 posts on SIM Land by Dort that show this person developed the disposable email and CAPTCHA bypass services with the help of another hacker who went by the handle \u201c<strong>Qoft<\/strong>.\u201d<\/p>\n<p>\u201cI legit just work with Jacob,\u201d Qoft said in 2022 in reply to another user, referring to their exclusive business partner Dort. In the same conversation, Qoft bragged that the two had stolen more than $250,000 worth of <a href=\"https:\/\/www.xbox.com\/en-US\/xbox-game-pass\" target=\"_blank\" rel=\"noopener\">Microsoft Xbox Game Pass accounts<\/a> by developing a program that mass-created Game Pass identities using stolen payment card data.<span id=\"more-73057\"><\/span><\/p>\n<p>Who is the Jacob that Qoft referred to as their business partner? The breach tracking service <strong>Constella Intelligence<\/strong> finds the password used by jay.miner232@gmail.com was reused by just one other email address: <strong>jacobbutler803@gmail.com<\/strong>. Recall that the 2020 dox of Dort said their date of birth was August 2003 (8\/03).<\/p>\n<p>Searching this email address at <strong>DomainTools.com<\/strong> reveals it was used in 2015 to register several Minecraft-themed domains, all assigned to a Jacob Butler in Ottawa, Canada and to the Ottawa phone number 613-909-9727.<\/p>\n<p><strong>Constella Intelligence<\/strong> finds jacobbutler803@gmail.com was used to register an account on the hacker forum Nulled in 2016, as well as the account name \u201cM1CE\u201d on Minecraft. Pivoting off the password used by their Nulled account shows it was shared by the email addresses<strong> j.a.y.m.iner232@gmail.com<\/strong> and <strong>jbutl3@ocdsb.ca<\/strong>, the latter being an address at a domain for the <strong>Ottawa-Carelton District School Board<\/strong>.<\/p>\n<p>Data indexed by the breach tracking service <strong>Spycloud<\/strong> suggests that at one point Jacob Butler shared a computer with his mother and a sibling, which might explain why their email accounts were connected to the password \u201cjacobsplugs.\u201d Neither Jacob nor any of the other Butler household members responded to requests for comment.<\/p>\n<p>The open source intelligence service <strong>Epieos<\/strong> finds jacobbutler803@gmail.com created the GitHub account \u201c<strong>MemeClient<\/strong>.\u201d Meanwhile, Flashpoint indexed a deleted anonymous Pastebin.com post from 2017 declaring that MemeClient was the creation of a user named CPacket \u2014 one of Dort\u2019s early monikers.<\/p>\n<p>Why is Dort so mad? On January 2, KrebsOnSecurity published <a href=\"https:\/\/krebsonsecurity.com\/2026\/01\/the-kimwolf-botnet-is-stalking-your-local-network\/\" target=\"_blank\" rel=\"noopener\">The Kimwolf Botnet is Stalking Your Local Network<\/a>, which explored research into the botnet by <strong>Benjamin Brundage<\/strong>, founder of the proxy tracking service <strong>Synthient<\/strong>. Brundage figured out that the Kimwolf botmasters were exploiting a little-known weakness in residential proxy services to infect poorly-defended devices \u2014 like TV boxes and digital photo frames \u2014 plugged into the internal, private networks of proxy endpoints.<\/p>\n<p>By the time that story went live, most of the vulnerable proxy providers had been notified by Brundage and had fixed the weaknesses in their systems. That vulnerability remediation process massively slowed Kimwolf\u2019s ability to spread, and within hours of the story\u2019s publication Dort created a Discord server in my name that began publishing personal information about and violent threats against Brundage, Yours Truly, and others.<\/p>\n<div id=\"attachment_73249\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73249\" decoding=\"async\" loading=\"lazy\" class=\" wp-image-73249\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/ben-flyswat.png\" alt=\"\" width=\"750\" height=\"652\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/ben-flyswat.png 872w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/ben-flyswat-768x668.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/ben-flyswat-782x680.png 782w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\"><\/p>\n<p id=\"caption-attachment-73249\" class=\"wp-caption-text\">Dort and friends incriminating themselves by planning swatting attacks in a public Discord server.<\/p>\n<\/div>\n<p>Last week, Dort and friends used that same Discord server (then named \u201cKrebs\u2019s Koinbase Kallers\u201d) to threaten a swatting attack against Brundage, again posting his home address and personal information. Brundage told KrebsOnSecurity that local police officers subsequently visited his home in response to a swatting hoax which occurred around the same time that another member of the server posted a door emoji and taunted Brundage further.<\/p>\n<div id=\"attachment_73245\" style=\"width: 758px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73245\" decoding=\"async\" loading=\"lazy\" class=\" wp-image-73245\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/ben-door.png\" alt=\"\" width=\"748\" height=\"155\"><\/p>\n<p id=\"caption-attachment-73245\" class=\"wp-caption-text\">Dort, using the alias \u201cMeow,\u201d taunts Synthient founder Ben Brundage with a picture of a door.<\/p>\n<\/div>\n<p>Someone on the server then linked to a cringeworthy (and NSFW) new Soundcloud <a href=\"https:\/\/soundcloud.com\/dortdev\/larpgod\" target=\"_blank\" rel=\"noopener\">diss track<\/a> recorded by the user DortDev that included a stickied message from Dort saying, \u201cUr dead nigga. u better watch ur fucking back. sleep with one eye open. bitch.\u201d<\/p>\n<p>\u201cIt\u2019s a pretty hefty penny for a new front door,\u201d the diss track intoned. \u201cIf his head doesn\u2019t get blown off by SWAT officers. What\u2019s it like not having a front door?\u201d<\/p>\n<p class=\"p1\">With any luck, Dort will soon be able to tell us all exactly what it\u2019s like.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the world\u2019s largest and most disruptive botnet. Since then, the person in control of Kimwolf \u2014 who goes by the handle \u201cDort\u201d \u2014 has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[113,114,529,722,90,348,723,414,724,725,726,122,296,727,728,729,360,730,731,115,534,732,136],"tags":[91],"class_list":["post-1616","post","type-post","status-publish","format-standard","hentry","category-a-little-sunshine","category-breadcrumbs","category-constella-intelligence","category-cpacket","category-cybersecurity","category-ddos-for-hire","category-domaintools","category-dort","category-dortdev","category-dortsolver","category-epieos","category-flashpoint","category-github","category-intel-471","category-jacobbutler803gmail-com","category-jay-miner232gmail-com","category-kimwolf-botnet","category-m1ce","category-minecraft","category-neer-do-well-news","category-osint-industries","category-qoft","category-spycloud","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Who is the Kimwolf Botmaster \u201cDort\u201d? - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who is the Kimwolf Botmaster \u201cDort\u201d? - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the world\u2019s largest and most disruptive botnet. Since then, the person in control of Kimwolf \u2014 who goes by the handle \u201cDort\u201d \u2014 has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-28T13:04:41+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Who is the Kimwolf Botmaster \u201cDort\u201d?\",\"datePublished\":\"2026-02-28T13:04:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\"},\"wordCount\":979,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"A Little Sunshine\",\"Breadcrumbs\",\"Constella Intelligence\",\"CPacket\",\"Cybersecurity\",\"DDoS-for-Hire\",\"domaintools\",\"Dort\",\"DortDev\",\"Dortsolver\",\"Epieos\",\"Flashpoint\",\"GitHub\",\"Intel 471\",\"jacobbutler803@gmail.com\",\"jay.miner232@gmail.com\",\"Kimwolf botnet\",\"M1CE\",\"Minecraft\",\"Ne'er-Do-Well News\",\"osint.industries\",\"Qoft\",\"SpyCloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\",\"name\":\"Who is the Kimwolf Botmaster \u201cDort\u201d? - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png\",\"datePublished\":\"2026-02-28T13:04:41+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage\",\"url\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png\",\"contentUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who is the Kimwolf Botmaster \u201cDort\u201d?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who is the Kimwolf Botmaster \u201cDort\u201d? - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/","og_locale":"en_US","og_type":"article","og_title":"Who is the Kimwolf Botmaster \u201cDort\u201d? - Imperative Business Ventures Limited","og_description":"In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the world\u2019s largest and most disruptive botnet. Since then, the person in control of Kimwolf \u2014 who goes by the handle \u201cDort\u201d \u2014 has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-02-28T13:04:41+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Who is the Kimwolf Botmaster \u201cDort\u201d?","datePublished":"2026-02-28T13:04:41+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/"},"wordCount":979,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage"},"thumbnailUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png","keywords":["Cybersecurity"],"articleSection":["A Little Sunshine","Breadcrumbs","Constella Intelligence","CPacket","Cybersecurity","DDoS-for-Hire","domaintools","Dort","DortDev","Dortsolver","Epieos","Flashpoint","GitHub","Intel 471","jacobbutler803@gmail.com","jay.miner232@gmail.com","Kimwolf botnet","M1CE","Minecraft","Ne'er-Do-Well News","osint.industries","Qoft","SpyCloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/","name":"Who is the Kimwolf Botmaster \u201cDort\u201d? - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage"},"thumbnailUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png","datePublished":"2026-02-28T13:04:41+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#primaryimage","url":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png","contentUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/02\/cpacket-discord.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/28\/who-is-the-kimwolf-botmaster-dort\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Who is the Kimwolf Botmaster \u201cDort\u201d?"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1616"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1616\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}