Настройка 192.168.1.1 и Руководство по Входу
Полное руководство о том, как войти в свой роутер или модем по адресу 192.168.1.1. Просмотр имен пользователей по умолчанию, паролей и устройств.
Ad Space
Как войти на 192.168.1.1
Откройте свой любимый веб-браузер.
Введите http://192.168.1.1 в адресную строку вверху и нажмите Enter.
Появится окно входа. Найдите свое устройство в таблице ниже и попробуйте комбинации логина и пароля.
Если вы не можете подключиться, убедитесь, что вы подключены к Wi-Fi роутера или по кабелю Ethernet.
Устройства, использующие 192.168.1.1
| Brand | Model | Логин | Пароль | Протокол |
|---|---|---|---|---|
| Aruba | Base Model | admin | admin | HTTP |
| Aruba | Controller | admin | admin | HTTP |
| Aruba | (web) | admin | admin | HTTP |
| Asus | Base Model | (без пароля) | admin | HTTP |
| Asus | Base Model | adsl | adsl1234 | HTTP |
| Asus | Base Model | admin | admin | HTTP |
| Asus | iKVM BMC (IPMI) | admin | admin | HTTP |
| Asus | Router | admin | admin | HTTP |
| Asus | (ssh) | root | root | SSH |
| Asus | (ssh) | admin | admin | SSH |
| Asus | (ssh) | admin | password | SSH |
| Asus | (ssh) | Admin | Admin | SSH |
| Aztech | backdoor � not in all f/w versions | isp | isp | HTTP |
| Aztech | Base Model | root | admin | HTTP |
| Aztech | Base Model | isp | isp | HTTP |
| Aztech | Base Model | admin | admin | HTTP |
| Cisco | Added by DPL admin. From | root | password | HTTP |
| Cisco | Aironet (ssh) | Cisco | Cisco | SSH |
| Cisco | Base Model | enable | (без пароля) | HTTP |
| Cisco | Base Model | CISCO15 | otbu+1 | HTTP |
| Cisco | Base Model | hsa | hsadb | HTTP |
| Cisco | Base Model | praisenetwork | perfectpraise | HTTP |
| Cisco | Base Model | (без пароля) | _Cisco | HTTP |
| Cisco | Base Model | pnadmin | pnadmin | HTTP |
| Cisco | Base Model | Cisco | Cisco | HTTP |
| Cisco | Base Model | (без пароля) | cable-docsis | HTTP |
| Cisco | Base Model | bubba | (unknown) | HTTP |
| Cisco | Base Model | (без пароля) | changeit | HTTP |
| Cisco | Base Model | guest | (без пароля) | HTTP |
| Cisco | Base Model | (без пароля) | cisco | HTTP |
| Cisco | Base Model | sa | (без пароля) | HTTP |
| Cisco | Base Model | root | secur4u | HTTP |
| Cisco | Base Model | root | blender | HTTP |
| Cisco | Base Model | uwmadmin | password | HTTP |
| Cisco | Base Model | scpuser | scpuser | HTTP |
| Cisco | Base Model | root | password | HTTP |
| Cisco | Base Model | UOMNI_ | (без пароля) | HTTP |
| Cisco | Base Model | root | Cisco | HTTP |
| Cisco | Base Model | wlse | wlsedb | HTTP |
| Cisco | Base Model | wlseuser | wlsepassword | HTTP |
| Cisco | Base Model | UNITY_ | (без пароля) | HTTP |
| Cisco | Base Model | (без пароля) | Cisco router | HTTP |
| Cisco | Base Model | admin | localadmin | HTTP |
| Cisco | Base Model | admin | cisco | HTTP |
| Cisco | Base Model | admin | diamond | HTTP |
| Cisco | Base Model | (без пароля) | c | HTTP |
| Cisco | Base Model | (без пароля) | cc | HTTP |
| Cisco | Base Model | (без пароля) | letmein | HTTP |
| Cisco | Base Model | (без пароля) | ILMI | HTTP |
| Cisco | Base Model | cmaker | cmaker | HTTP |
| Cisco | Base Model | cisco | (без пароля) | HTTP |
| Cisco | Base Model | (без пароля) | riverhead | HTTP |
| Cisco | Base Model | ESubscriber | (без пароля) | HTTP |
| Cisco | Base Model | bbsd-client | (без пароля) | HTTP |
| Cisco | Base Model | (без пароля) | public/private/secret | HTTP |
| Cisco | Base Model | netrangr | attack | HTTP |
| Cisco | Base Model | enable | cisco | HTTP |
| Cisco | Base Model | bbsd-client | changeme2 | HTTP |
| Cisco | Base Model | (без пароля) | (без пароля) | HTTP |
| Cisco | Base Model | End User | 7936 | HTTP |
| Cisco | Base Model | admin | admin | HTTP |
| Cisco | Base Model | admin | (без пароля) | HTTP |
| Cisco | Base Model | Administrator | changeme | HTTP |
| Cisco | Base Model | Administrator | admin | HTTP |
| Cisco | Base Model | (без пароля) | Cisco | HTTP |
| Cisco | Base Model | admin | changeme | HTTP |
| Cisco | Base Model | ripeop | (без пароля) | HTTP |
| Cisco | Base Model | bbsd-client | NULL | HTTP |
| Cisco | Base Model | UAMIS_ | (без пароля) | HTTP |
| Cisco | Base Model | UVPIM_ | (без пароля) | HTTP |
| Cisco | Base Model | EAdmin | (без пароля) | HTTP |
| Cisco | Base Model | technician | 2 + last 4 of Audio | HTTP |
| Cisco | Base Model | cisco | cisco | HTTP |
| Cisco | Base Model | admin | tsunami | HTTP |
| Cisco | Base Model | public ReadOnly access | secret | HTTP |
| Cisco | Base Model | root | attack | HTTP |
| Cisco | Base Model | private ReadWrite access | secret | HTTP |
| Cisco | Base Model | admin | default | HTTP |
| Cisco | Collaboration Endpoint (general) | cisco | admin | HTTP |
| Cisco | Guard (snmp) | (без пароля) | riverhead | HTTP |
| Cisco | (IPMI) | admin | password | HTTP |
| Cisco | (ssh) | cisco | cisco | SSH |
| Cisco | (ssh) | pix | cisco | SSH |
| Cisco | Systems (general) | cisco | cisco | HTTP |
| Cisco-Arrowpoint | Base Model | admin | system | HTTP |
| Grandstream | Base Model | admin | admin | HTTP |
| Grandstream | Base Model | admin | 1234 | HTTP |
| Grandstream | Base Model | End User | 123 (or blank) | HTTP |
| Grandstream | Base Model | (без пароля) | admin | HTTP |
| Grandstream | Base Model | Administrator | admin | HTTP |
| Grandstream | Networks, Inc | admin | admin | HTTP |
| Grandstream | Networks, Inc | End User | 123 | HTTP |
| Grandstream | (web) | admin | admin | HTTP |
| Linksys | Base Model | admin | (без пароля) | HTTP |
| Linksys | Base Model | (без пароля) | epicrouter | HTTP |
| Linksys | Base Model | (без пароля) | (без пароля) | HTTP |
| Linksys | Base Model | comcast | 1234 | HTTP |
| Linksys | Base Model | root | orion99 | HTTP |
| Linksys | Base Model | Administrator | admin | HTTP |
| Linksys | Base Model | admin | admin | HTTP |
Предупреждение
Стандартные пароли общеизвестны. Защитите сеть с помощью VPN.