by Tommy N. Updated Apr 24, 2026
You've just moved into a new place and the ISP technician left without a single rundown. Three days later you need to set up port forwarding, the setup sheet is gone, and you're staring at a login screen with no idea what to type. The default router passwords list is your first line of attack — a brand-by-brand reference that gets you back into the admin panel without a factory reset. Paired with our default router IP addresses list, these credentials unlock the control panel of every major brand. This guide gives you the full reference table, a step-by-step login walkthrough, and the security steps you must take the moment you get in.
Most modern routers print default credentials on a sticker on the underside or back of the device. But older hardware, ISP-supplied equipment, and routers that have been reset in the field don't always follow that convention. Understanding the full router login workflow — not just the credentials — separates users who get locked out repeatedly from those who handle it confidently every time.
Whether you're recovering access to an old device, setting up a new router, or troubleshooting a stubborn login screen, this reference covers credentials, login steps, common failure modes, and the long-term security habits every network owner needs.
Contents
Spend enough time on networking forums and you'll encounter the same bad advice recycled endlessly. These myths cause real problems — failed logins, unnecessary factory resets, and in some cases, routers that stay exposed for months because the owner assumed they were protected.
The assumption that every router accepts admin/admin as default credentials is flat-out wrong. Here's what the data actually shows:
admin / admin on older models — but newer units ship with a unique password printed on the label, not a shared default.admin / password on most consumer devices. Not admin.admin / admin on many models but forces a password change on first login — so the factory default is often already invalid.admin as the password. Many users fail login by typing something into the username field.Trying admin/admin as a universal key wastes time and can temporarily lock you out of routers that enforce failed-login rate limiting.
Sticker credentials are accurate for factory-new devices. But consider these scenarios where the sticker gives you the wrong answer:
Pro tip: Before assuming the sticker is wrong, confirm you're hitting the correct IP address. Accessing 192.168.0.1 when your router uses 192.168.1.1 produces a browser error that looks identical to a failed credential — it's the most common source of false troubleshooting.
The following table covers the most common consumer and small-business routers. This is the default router passwords list you'll return to every time you set up or recover a device. Bookmark it.
| Brand | Default IP | Username | Password |
|---|---|---|---|
| Asus | 192.168.1.1 | admin | admin |
| Belkin | 192.168.2.1 | (blank) | (blank) |
| Cisco | 192.168.1.1 | admin | admin |
| D-Link | 192.168.0.1 | admin | (blank) |
| Google Nest | 192.168.86.1 | App only | App only |
| Huawei | 192.168.100.1 | admin | admin |
| Linksys | 192.168.1.1 | (blank) | admin |
| Motorola | 192.168.100.1 | admin | motorola |
| Netgear | 192.168.1.1 | admin | password |
| Netgear Orbi | 192.168.1.1 / 10.168.168.1 | admin | password |
| Tenda | 192.168.0.1 | admin | admin |
| TP-Link | 192.168.0.1 / 192.168.1.1 | admin | admin |
| Ubiquiti | 192.168.1.1 | ubnt | ubnt |
| ZTE | 192.168.1.1 | admin | admin |
| Zyxel | 192.168.1.1 | admin | 1234 |
Mesh systems and ISP gateway devices don't follow the same conventions as retail routers. They require a different approach:
Knowing the credentials is half the battle. Getting to the correct login page is the other half. Here's the complete process from scratch, whether you're on a new setup or recovering access.
ipconfig. Look for "Default Gateway." On Mac or Linux: run ip route or netstat -rn and look for the 0.0.0.0 route.Warning: Never access your router admin panel over a public or shared WiFi connection. Any credentials you type are potentially visible to others on that network, and changes you make to your router from an untrusted connection are a security risk.
Default passwords aren't a result of lazy engineering. They exist for operational reasons. But those same reasons create a structural vulnerability that attackers exploit at scale.
The problem is structural: if millions of devices ship with identical credentials, automated scanners can log in to unpatched routers without guessing. This is not a theoretical threat. Botnets like Mirai spread almost entirely by logging into routers using a fixed list of known factory credentials.
Default credentials fail more often than most people expect. Run through this checklist before reaching for the reset pin — the fix is usually simpler than a full reset.
ipconfig before anything else.Important: A hard reset erases all custom settings without exception — WiFi names, passwords, port forwarding rules, DNS configuration, and any other changes. Full reconfiguration from scratch is required.
Getting into the admin panel is step one. What you do in the next ten minutes determines whether your network stays secure or becomes an easy target the next time someone nearby runs a scan.
The difference between someone who uses a router and someone who manages a network isn't technical knowledge — it's habits. Here's how those two groups actually behave when dealing with default credentials and admin access.
Start with the sticker on the back or underside of your router — it lists the default IP, username, and password for that unit. If the sticker is missing or the credentials don't work, use the brand table in this guide or search RouterHax for your specific gateway IP address to find a model-specific walkthrough with screenshots.
No. Factory credentials are publicly documented and trivially easy to find. Leaving them in place means anyone on your network — or anyone who can reach your router's admin panel remotely — can log in without your knowledge. Changing the admin password takes under two minutes and eliminates one of the most commonly exploited consumer router vulnerabilities.
If you can't retrieve it from a password manager, a hard reset is your only reliable option. Locate the reset pinhole on your router, hold it for 10–30 seconds with the device powered on, wait for the LEDs to cycle, then give it 90 seconds to reboot. You can then log in with the factory default credentials — but all your custom settings will be gone and you'll need to reconfigure from scratch.
The default router passwords list in this guide gives you everything you need to get into your admin panel and take ownership of your network. Your next step is concrete: open a browser tab right now, navigate to your router's IP, log in with the credentials above, and change the admin password before you do anything else. That single action — done today — closes the most commonly exploited entry point on home and small-office networks.
![]() |
![]() |
![]() |
![]() |
About Tommy N.
Tommy is the founder of RouterHax and a network engineer with over ten years of experience in home and enterprise networking. He has configured and troubleshot networks ranging from simple home setups to multi-site enterprise deployments, with deep hands-on experience in router configuration, WiFi optimization, and network security. At RouterHax, he oversees editorial direction and covers home networking guides, mesh WiFi system reviews, and practical troubleshooting resources for everyday users.
Promotion for FREE Gifts. Moreover, Free Items here. Disable Ad Blocker to get them all.
Once done, hit any button as below
![]() |
![]() |
![]() |
![]() |