Enter your router model or ISP name and get a free instant safety analysis and a live threat detection scan of your network.
Any router manufactured in China, Russia, or Iran can no longer receive FCC authorization. Existing models stay legal - but no new ones get in. This includes TP-Link, Huawei, Tenda, and others.
Read the full story →Volt Typhoon, Flax Typhoon, and Salt Typhoon are real, FBI-documented operations. All three exploited vulnerabilities in home routers - especially TP-Link - to infiltrate US military, telecom, and infrastructure networks.
Read the full story →A TP-Link router is a risk because of its ownership. But any router - from any country - is also a risk if it's end-of-life with no more security patches. We score both factors independently. Check yours above.




Device VPN (NordVPN, ExpressVPN, etc.): partial protection only. A VPN app on your laptop or phone encrypts traffic between that device and the VPN exit node. But it does not protect your local network from router-level exploitation. If your router has an unpatched vulnerability or a firmware-level backdoor, a VPN on your laptop won't prevent an attacker from monitoring DNS queries, redirecting traffic, or compromising other devices on your network - your smart TV, thermostat, and phone are still exposed. VPNs are a useful layer, but they don't fix a compromised router.
Router-level VPN: a fundamentally different class of protection. A router with a built-in VPN encrypts all traffic leaving your network - before it even touches your ISP. Every device on your network is automatically protected: your laptop, phone, TV, IoT devices, everything. There's no app to install, no device to remember, and no gaps. The encryption happens at the network boundary, not on individual devices.
Some of the highest-rated routers in our database have this built in:
If you're relying on a device VPN to compensate for a router with a D or F grade, it's not enough. The right fix is the router itself.