{"id":10439,"date":"2025-04-04T19:36:01","date_gmt":"2025-04-04T19:36:01","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=10439"},"modified":"2025-04-28T21:42:35","modified_gmt":"2025-04-28T21:42:35","slug":"router-hacking","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/","title":{"rendered":"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0"},"content":{"rendered":"\n<p>We tend to think about cyberattacks as attempts to hack into our computers, phones, online accounts, or even websites. However, hackers have a lot more options at their disposal to get your information. An important but lesser-known option for cybercriminals is for them to hack into your router. Router hacking is when a cybercriminal gains control over your router without your consent and most of the time, your knowledge.&nbsp;<\/p>\n\n\n\n<p>A hacked router can have devastating consequences. Not only can the hacker access any device connected to it but they can also install malware on the network. There are a lot of possibilities for mischief with a hacked router. That\u2019s why it\u2019s important to learn about the warning signs. So that you can quickly identify that your router is hacked and implement the following solutions to protect your network.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-know-if-your-router-is-hacked-signs-and-solutions-nbsp\"><span class=\"ez-toc-section\" id=\"How_to_Know_if_Your_Router_is_Hacked_Signs_and_Solutions\"><\/span>How to Know if Your Router is Hacked: Signs and Solutions&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A hacker in your router can do a lot of damage to you, your family, or friends. They will have access to multiple devices and the information that comes with them. Luckily, we are going through the telltale warning signs that you have a hacked router. Alone, one of these signs may not be an indication that your router is hacked. However, multiple is when you should take this matter seriously.&nbsp;&nbsp;<\/p>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/Signs_Your_Router_Is_Hacked-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/Signs_Your_Router_Is_Hacked-scaled.jpg\"\n      alt=\"Signs Your Router Is Hacked\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-is-my-internet-slow-all-of-a-sudden-nbsp\"><span class=\"ez-toc-section\" id=\"Why_is_My_Internet_Slow_All_of_a_Sudden\"><\/span>Why is My Internet Slow All of a Sudden?&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Slow internet speeds are not a direct indicator of a hacked router. It\u2019s completely normal for internet speeds to change and sometimes slow down. Factors like router placement, amount of users, weather, downloading or streaming activities can all affect your internet connection. A hacked router, however, can slow down your internet.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Cybercriminals tend to use hacked networks for their own activities like <a href=\"\/blog\/software\/malware-prevention\/\">malware distribution<\/a> or cryptojacking, slowing down your internet. Although slow internet isn\u2019t a direct sign of router hacking, it is something to take note of.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-are-there-unknown-devices-on-my-wi-fi-network-nbsp\"><span class=\"ez-toc-section\" id=\"Are_There_Unknown_Devices_on_My_Wi-Fi_Network\"><\/span>Are There Unknown Devices on My Wi-Fi Network?&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Most routers nowadays have an accompanying web interface or mobile app. These tools allow owners to monitor the devices on the network and identify any unfamiliar devices. Once you login to the router\u2019s web interface or app, look for a section like \u201cDevice List\u201d or \u201cConnected Devices\u201d. This section typically shows the IP address, name, and MAC address of connected devices. You can cross reference the devices listed and their IP addresses with your own. Anything unfamiliar could be a sign of a hacker but it\u2019s best to look for other signs as well.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-are-my-router-settings-changed-nbsp\"><span class=\"ez-toc-section\" id=\"Why_Are_My_Router_Settings_Changed\"><\/span>Why Are My Router Settings Changed?&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Are you struggling to sign into your router gateway? This can be a sign that someone has hacked into your router and changed your login credentials. Cybercriminals are known to use brute force techniques to guess a password or by using malware. However, it\u2019s also extremely common to forget or misspell your password. Before jumping to any conclusions, make sure your login credentials are accurate.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-can-malicious-websites-appear-automatically-nbsp\"><span class=\"ez-toc-section\" id=\"Can_Malicious_Websites_Appear_Automatically\"><\/span>Can Malicious Websites Appear Automatically?&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A more blatant warning sign of a hacked router is when you experience a browser hijacking. This is when malware is designed to change your browser settings to direct you to malicious websites. This can include changing the default home page, search engine, and security settings.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Hackers with access to your router\u2019s admin account can also change your IP address settings to have your traffic redirected to any website of their choice, including a malware-infested one. If you have experienced something like this, it\u2019s important to download a reputable anti-virus software for malware removal and data recovery.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"\/contact-us\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0-1024x256.png\" alt=\"\" class=\"wp-image-10410\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0-1024x256.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0-300x75.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0-768x192.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0-512x128.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0-920x230.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-01-v1.0.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-check-router-logs-for-suspicious-activity-nbsp\"><span class=\"ez-toc-section\" id=\"How_to_Check_Router_Logs_for_Suspicious_Activity\"><\/span>How to Check Router Logs for Suspicious Activity&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Having access to router logs depends on the internet service provider that you have. Some allow router logs to be created, and others are shifting away from this practice. In this circumstance, router logs are an amazing way to check for any suspicious or unfamiliar activity. Here\u2019s how you can try to access your router logs.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n\n<li>Check the IP address on the router.\u00a0<\/li>\n\n\r\n\r\n\n<li>Enter the IP address in the search bar.\u00a0<\/li>\n\n\r\n\r\n\n<li>Log in to the router gateway.\u00a0<\/li>\n\n\r\n\r\n\n<li>Look for a tab titled \u201cSystem Logs\u201d, \u201cHistory\u201d, \u201cRouter History\u201d\u00a0<\/li>\r\n<\/ol>\n\n\r\n\r\n\n<h2 id=\"h-can-someone-hack-my-router-common-methods-and-prevention-tips-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Can_Someone_Hack_My_Router_Common_Methods_and_Prevention_Tips\"><\/span>Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>Router hacking is not as widely discussed as other forms of cybercrimes but it\u2019s one of the most devastating attacks to go through. The breach in your network security can affect everything on your router, making malware removal and data recovery a necessity for multiple devices. It\u2019s important to take precautionary measures for router security and form an incident response plan in case anything happens. We can start by understanding the common methods hackers use to bypass your network security.\u00a0<\/p>\n\n\r\n\r\n\n<h3 id=\"h-what-are-common-router-hacking-methods-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Are_Common_Router_Hacking_Methods\"><\/span>What Are Common Router Hacking Methods?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\r\n\r\n\n<p>According to a recent survey of over three thousand people, eighty six percent of them did not change the default router administrator password<sup>(<\/sup><sup>1)<\/sup>. This exposes a lot of people to cybercriminals who can simply guess their password and gain access to their router. A weak password is only one of the ways hackers can gain control of your router. There are four more that you need to be aware of.\u00a0<\/p>\n\n\r\n\r\n\n<ul class=\"wp-block-list\">\n\n<li>Vulnerabilities in outdated router firmware<\/li>\n\n\r\n\r\n\n<li>Wi-Fi Protected Setup (WPS) attacks<\/li>\n\n\r\n\r\n\n<li>Exploiting UPnP vulnerabilities<\/li>\n\n\r\n\r\n\n<li><a href=\"\/blog\/software\/phishing-attack-repsonse\/\">Phishing Links<\/a><\/li>\n\n<\/ul>\n\n\r\n\r\n\n<h2 id=\"h-how-to-change-my-router-password-to-a-strong-one-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Change_My_Router_Password_to_a_Strong_One\"><\/span>How to Change My Router Password to a Strong One?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>If you have never updated your router password from the default settings, you need to do that as soon as possible. Hackers can guess default router passwords very easily. You can change the admin password by entering the IP address listed of your router into your URL. From there, you should be taken to a login page for your router. You can sign in and change your username and password.\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-how-to-update-my-router-firmware-for-security-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Update_My_Router_Firmware_for_Security\"><\/span>How to Update My Router Firmware for Security?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>Firmware updates are not perfect and have flaws that hackers can exploit to gain access to your router. Manufacturers distribute firmware updates to fix bugs and patch up any vulnerabilities. Keeping your router firmware updated will strengthen your network security from cyberattacks. You can update the firmware by signing into the router gateway. Some internet service providers have a setting in which you can enable automatic router firmware updates to keep it up to date.\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-how-to-disable-wps-and-upnp-for-router-security-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Disable_WPS_and_UPnP_for_Router_Security\"><\/span>How to Disable WPS and UPnP for Router Security?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>Wi-fi Protected Setup (WPS) was designed to simplify the process of connecting to a router. It allows users to connect to their router by either pressing a button or by entering a PIN. The latter, however, poses a network security issue. Hackers can use brute force techniques to guess the PIN and gain access to the router. WPS is now used a lot less by internet service providers but there are still routers that provide the option.\u00a0<\/p>\n\n\r\n\r\n\n<p>On the other hand, Universal Plug and Play (UPnP) is a service that allows devices on the same network to interact with each other. Smart houses use UPnP to interact with your phone and other devices. UPnP is convenient and practical but there is a network security risk with using UPnP. If a hacker gains access to one of the devices that uses UPnP, they can gain control of the other devices on the local network including a smart house, Ring Camera, etc.\u00a0<\/p>\n\n\r\n\r\n\n<p>Depending on the router you have, it may be possible to turn these settings off in your router\u2019s settings.\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-how-to-avoid-phishing-links-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Avoid_Phishing_Links\"><\/span>How to Avoid Phishing Links?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>Phishing scams are one of the most common ways that hackers put <a href=\"\/blog\/software\/malware-prevention\/\">malware<\/a> on a device. There are instances in which a hacker can access a device using malware and the network that it is using. This demonstrates the importance of phishing prevention and awareness.\u00a0\u00a0<\/p>\n\n\r\n\r\n\n<p>You can lose a lot of data and control after your device becomes infected with malicious code. When it comes to cybersecurity,<a href=\"\/blog\/software\/phishing-attack-repsonse\/\"> phishing prevention<\/a> is always recommended. Verify the sender\u2019s identity before clicking on a link in an email or message. This way you avoid needing a malware removal or data recovery service.\u00a0<\/p>\n\n\r\n\r\n\n<figure class=\"wp-block-image size-large\"><a href=\"\/contact-us\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" class=\"wp-image-10408\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0-1024x256.png\" alt=\"\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0-1024x256.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0-300x75.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0-768x192.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0-512x128.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0-920x230.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250331-1200x300-System-Security-Banner-03-v1.0.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\r\n\r\n\n<h2 id=\"h-how-to-set-up-a-guest-network-for-added-security-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Set_Up_a_Guest_Network_for_Added_Security\"><\/span>How to Set Up a Guest Network for Added Security?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>In the era of internet access, guest networks have become a vital feature to protect your router security. It is an expectation to share your wi-fi with family and friends when they visit you, but this is also a security concern. On top of that, smart devices are used with your wi-fi and in some cases, because of bugs, they can stay connected to your wi-fi even after a factory reset. Guest networks allow you to create a separate and isolated network that allows users to use your internet connection without exposing private network information.\u00a0\u00a0<\/p>\n\n\r\n\r\n\n<p>You can enable the guest network settings under the \u201cwireless settings\u201d section and can set the name, password, and security. It\u2019s recommended to set the guest network security to WPA2 to avoid any hacker exploiting a vulnerability in the firmware and accessing your router from the guest network.\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-how-to-change-my-default-router-ip-address-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Change_My_Default_Router_IP_Address\"><\/span>How to Change My Default Router IP Address?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>Your router IP address or external IP address is what everyone outside of your network will see when you\u2019re on the internet. It can be used to track your activity or location. Hackers can use your router IP address to launch a cyberattack on your network or look for vulnerabilities to exploit. You can temporarily change or hide your router IP address by using a Virtual Private Network (VPN) to browse the internet.\u00a0\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-how-to-use-a-firewall-on-my-router-for-protection-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Use_a_Firewall_on_My_Router_for_Protection\"><\/span>How to Use a Firewall on My Router for Protection?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>A router firewall is a security feature that provides extra protection against cybersecurity threats. It acts as a gate between your home network and the internet, blocking any malicious traffic that is attempting to exploit your security vulnerabilities. You can enable the firewall in the router settings under something like \u201cAdvanced Security\u201d or \u201cFirewall\u201d.\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-how-to-secure-my-wi-fi-network-with-wpa3-encryption-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Secure_My_Wi-Fi_Network_with_WPA3_Encryption\"><\/span>How to Secure My Wi-Fi Network with WPA3 Encryption?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>Most routers use the second version of wi-fi protected access security protocol (WPA2) to encrypt the information on their network. However, there is a third version known as WPA3 that has a higher-level of encryption and more effectively protects your information from criminals.\u00a0<\/p>\n\n\r\n\r\n\n<h2 id=\"h-what-should-i-do-if-my-router-is-already-hacked-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Should_I_Do_If_My_Router_is_Already_Hacked\"><\/span>What Should I Do If My Router is Already Hacked?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>If you notice multiple of these warning signs with your router, then it is very possible that you were hacked. You need to take immediate steps to mitigate the damage the hacker could do. Here is a step-by-step incident response plan for a hacked router and how you can address it.\u00a0<\/p>\n\n\r\n\r\n\n<ul class=\"wp-block-list\">\n\n<li><strong>Reset your router. <\/strong>A hard reset is an effective way to remove malicious code on your router. However, the method is not always successful. You may still need to proceed with caution. On many routers, you can do a full reset by holding the power button on the device for fifteen to thirty seconds.\u00a0<\/li>\n\n\r\n\r\n\n<li><strong>Change your password. <\/strong>You always need a strong password but especially if your security has been breached.\u00a0<\/li>\n\n\r\n\r\n\n<li><strong>Malware Removal.<\/strong> If your router has been breached, then it\u2019s possible that <a href=\"\/blog\/software\/malware-prevention\/\">malware<\/a> could\u2019ve spread to any device connected. A malware removal tool is essential to prevent any further damage from hackers.\u00a0<\/li>\n\n\r\n\r\n\n<li><strong>Update firmware. <\/strong>After resetting the router, make sure the device has the most recent firmware update. The latest router firmware can fix a lot of flaws in the current version.\u00a0<\/li>\n\n\r\n\r\n\n<li><strong>Contact your internet service provider. <\/strong>When all else fails, contact your internet service provider and tell them the situation. They will do their best to help you.\u00a0<\/li>\n\n<\/ul>\n\n\r\n\r\n\n<h2 id=\"h-digital-forensics-corp-securing-your-network-nbsp\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Digital_Forensics_Corp_Securing_Your_Network\"><\/span>Digital Forensics Corp: Securing Your Network\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\r\n\r\n\n<p>When it comes to the specifics of securing a network, it\u2019s not an easy topic for many people to grasp. A network breach can be an even more complex topic but that\u2019s where we come in. Digital Forensics Corp. is a cybersecurity firm that can secure your network and respond to cyber-attacks on your behalf.\u00a0<\/p>\n\n\r\n\r\n\n<p>We have an incident response plan to quickly assess, investigate, and respond to breaches on your network and the devices connected to it. Our team of engineers can also identify and fix the security gaps that compromised your network. We happily provide all of these services and take on the burdens of handling any cyber-attacks coming your way. <a href=\"\/contact-us\">Contact Digital Forensics Corp.<\/a> if you want digital security experts who will work on your behalf.\u00a0<\/p>\n\n\r\n\r\n\n<p><strong>Sources:<\/strong>\u00a0<\/p>\n\n\r\n\r\n\n<ol class=\"wp-block-list\" start=\"1\">\n\n<li><a href=\"https:\/\/www.broadband.co.uk\/broadband\/help\/router-security-research\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.broadband.co.uk\/broadband\/help\/router-security-research<\/a>\u00a0<\/li>\n\n\r\n\r\n\n<li><a href=\"https:\/\/www.staysafeonline.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.staysafeonline.org\/<\/a>\u00a0<\/li>\n\n<\/ol>\n\n","protected":false},"excerpt":{"rendered":"We tend to think about cyberattacks as attempts to hack into our computers, phones, online accounts, or even&hellip;","protected":false},"author":132,"featured_media":10440,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-10439","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Is Your Router Hacked?<\/title>\n<meta name=\"description\" content=\"Has your router been hacked? This is a scary question but the DFC team has answers that will make the situation less frightening.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0\" \/>\n<meta property=\"og:description\" content=\"Has your router been hacked? This is a scary question but the DFC team has answers that will make the situation less frightening.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-04T19:36:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T21:42:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/DFC-Router-Hacking-1024x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Benjamin Carpenter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benjamin Carpenter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/\"},\"author\":{\"name\":\"Benjamin Carpenter\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\"},\"headline\":\"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0\",\"datePublished\":\"2025-04-04T19:36:01+00:00\",\"dateModified\":\"2025-04-28T21:42:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/\"},\"wordCount\":2089,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DFC-Router-Hacking.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/\",\"name\":\"Is Your Router Hacked?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DFC-Router-Hacking.png\",\"datePublished\":\"2025-04-04T19:36:01+00:00\",\"dateModified\":\"2025-04-28T21:42:35+00:00\",\"description\":\"Has your router been hacked? This is a scary question but the DFC team has answers that will make the situation less frightening.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DFC-Router-Hacking.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DFC-Router-Hacking.png\",\"width\":1080,\"height\":1080,\"caption\":\"Router hacking gives dangerous entry to cybercriminals. Don't let this become an issue.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/router-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\",\"name\":\"Benjamin Carpenter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"caption\":\"Benjamin Carpenter\"},\"description\":\"Cybercrime Content Strategist and Victim Advocacy Writer \\\"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\\\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/benjamin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is Your Router Hacked?","description":"Has your router been hacked? This is a scary question but the DFC team has answers that will make the situation less frightening.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0","og_description":"Has your router been hacked? This is a scary question but the DFC team has answers that will make the situation less frightening.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-04-04T19:36:01+00:00","article_modified_time":"2025-04-28T21:42:35+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/DFC-Router-Hacking-1024x1024.png","type":"image\/png"}],"author":"Benjamin Carpenter","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Benjamin Carpenter","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/"},"author":{"name":"Benjamin Carpenter","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6"},"headline":"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0","datePublished":"2025-04-04T19:36:01+00:00","dateModified":"2025-04-28T21:42:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/"},"wordCount":2089,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/DFC-Router-Hacking.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/","name":"Is Your Router Hacked?","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/DFC-Router-Hacking.png","datePublished":"2025-04-04T19:36:01+00:00","dateModified":"2025-04-28T21:42:35+00:00","description":"Has your router been hacked? This is a scary question but the DFC team has answers that will make the situation less frightening.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/DFC-Router-Hacking.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/DFC-Router-Hacking.png","width":1080,"height":1080,"caption":"Router hacking gives dangerous entry to cybercriminals. Don't let this become an issue."},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/router-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Can Someone Hack My Router? Common Methods and Prevention Tips\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6","name":"Benjamin Carpenter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","caption":"Benjamin Carpenter"},"description":"Cybercrime Content Strategist and Victim Advocacy Writer \"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;","url":"https:\/\/www.digitalforensics.com\/blog\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/132"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=10439"}],"version-history":[{"count":6,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10439\/revisions"}],"predecessor-version":[{"id":14434,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10439\/revisions\/14434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/10440"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=10439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=10439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=10439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}