Change the default immediately
Every router of the same model ships with the same default router password. Attackers don’t need to guess it—they already know it. Changing your admin password is the single highest-impact step you can take.
Generate a strong router admin password for Netgear, Asus, TP-Link, Linksys, Cisco, D-Link, Ubiquiti, MikroTik and more. 100% client-side, powered by the Web Crypto API.
All router passwords are generated locally in your browser using the Web Crypto API
(crypto.getRandomValues). Nothing is ever sent to a server, logged, or stored.
You can disconnect from the internet and the generator still works.
Pro tip: remember one password, not fifty. Use a password manager to store this router admin password alongside the rest of your logins.
Trusted by millions for secure password storage. We may earn a commission if you sign up using these links. There is no extra cost to you.
These factory defaults are public knowledge and compiled into every attacker’s wordlist. If your router still uses one of these, change it now.
| Brand | Admin IP | Username | Default password | Status |
|---|---|---|---|---|
| Netgear | 192.168.1.1 | admin | password | Change now |
| Asus | 192.168.1.1 | admin | admin | Change now |
| TP-Link | 192.168.0.1 | admin | admin | Change now |
| Linksys | 192.168.1.1 | admin | (blank) | Change now |
| Cisco | 192.168.1.1 | cisco | cisco | Change now |
| D-Link | 192.168.0.1 | admin | (blank) | Change now |
| Ubiquiti | 192.168.1.1 | ubnt | ubnt | Change now |
| MikroTik | 192.168.88.1 | admin | (blank) | Change now |
Your router admin password is the key to your entire home or office network. Unlike your WiFi password, which lets devices connect to the internet, the admin password grants access to your router control panel. Anyone with it can redirect your traffic, install malware at the network level, monitor every device connected, and lock you out of your own router.
Most people never change the default router password. That is a serious problem. Attackers maintain large databases of every default router login and weak pattern they see in the wild. A router running on a default router password can be compromised in under a minute. The fix takes less time than that: generate a strong 16–20 character random password using this router password generator, log into your admin panel, and update it.
Common router IPs for the control panel are 192.168.1.1 (Netgear, Asus, Linksys, Cisco) and 192.168.0.1 (TP-Link, D-Link),
while MikroTik often uses 192.168.88.1. Not sure which you have? On Windows, run
ipconfig and look for “Default Gateway”. On macOS and Linux, run
netstat -nr or check your network settings. That router IP is where you change the password.
Every router of the same model ships with the same default router password. Attackers don’t need to guess it—they already know it. Changing your admin password is the single highest-impact step you can take.
Your router admin password controls the configuration panel. Your WiFi password only connects devices. They must be different. A guest who guesses your WiFi password should never be able to reach your router settings.
You log into your router rarely. That makes it a perfect candidate for a 20-character random string stored safely in a password manager. Sticky notes and spreadsheets are how breaches happen.
Remote management exposes your router control panel to the open internet. Unless you have a specific operational need, turn it off. Look under Administration or Advanced settings in the UI.
Router firmware updates patch known vulnerabilities and harden the login experience. Log in and check for updates at least once a year, or enable automatic updates if your router supports it.
Use a separate SSID for guests and IoT devices. A compromised smart bulb or TV should not have layer 2 access to your laptop or NAS. Many modern routers expose this as a “Guest network” toggle.
password, Asus uses admin, TP-Link uses admin,
Linksys often leaves the password blank, and Cisco uses cisco. Whatever yours is,
change it immediately.
crypto.getRandomValues.
No password ever leaves your device. Open your browser dev tools, watch the Network tab while you
generate passwords, and you will see zero outbound requests.
Need a different kind of password or security check? These tools use the same client-side, zero-tracking approach.