From Wikipedia, the free encyclopedia
IndustryInformation Technology
HeadquartersRiga, Latvia
Key people
John Tully (CEO)
Arnis Riekstiņš (CTO)
Productsrouters, firewalls, software (RouterOS)
Revenue374.6 million Euro (2021)[1]
90.6 million Euro (2021)[1]
Number of employees
343 (2020)[2]

MikroTik (officially SIA "Mikrotīkls") is a Latvian network equipment manufacturer. The company develops and sells wired and wireless network routers, network switches, access points, as well as operating systems and auxiliary software. The company was founded in 1996, and as of August 2019, the company website reported an estimated 280 employees. In 2021, with a value of EUR 1.24B, Mikrotik was the 3rd largest company in Latvia and the first private company to surpass EUR 1B value in Latvia.[3]

Two MikroTik branded routers.
Roof-top LTE antenna.


MikroTik was founded in 1996 by John Tully and Arnis Riekstiņš in Riga, Latvia, developing networking software for x86 PC hardware that would develop into a product called RouterOS. The earliest versions of RouterOS were based on Linux 2.2. In 2002, MikroTik began producing their own networking-focused low-power single-board computers, branded RouterBoard, that ran RouterOS. These early SBCs could be expanded and/or used as components of other systems, but as time passed, this RouterBoard/RouterOS platform would develop into a full line network equipment.[4][additional citation(s) needed]


  • 1997 - Release of software for x86 PC platform, called simply MikroTik Router Software, that would eventually develop into RouterOS. [5]
  • 2002 - Release of RouterBoard series PCI add-in boards to be used with MikroTik x86-based PCs running RouterOS.
  • 2003 - Release of RouterBoard 200, a single-board router platform, and RouterBOARD 220 with the SBC integrated into an enclosure with a 2.4 GHz wireless antenna powered by PoE. Original RouterBoard was based on the Geode CPU, but later used MIPS.
  • 2012 - Release of Cloud Core Router (CCR) 1000-series, using Tilera's TILE-Gx many-core CPUs. Tilera-base CCRs would eventually be released with up to 72-cores at 1GHz.
  • 2022 - Release of CCR 2000-series using ARM64-architecture CPUs and featuring 100GbE capability in the CCR2216. Also, a return to PC add-in boards with the CCR2004-1G-2XS-PCIe.

Product vulnerabilities[edit]

  • On 23 May 2018, Cisco Talos Intelligence Group reported that some MikroTik devices were found vulnerable to the VPNFilter malware.[6][7][8]
  • RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.[9][10][11]


Beginning in June 2021, a botnet composed of unprotected Mikrotik devices created huge volumes of application-layer traffic using HTTP pipelining, resulting in DDOS. The net was named Mēris (or Meris) by Qrator. Yandex reported attacks beginning August 4, 2021 (over 5 million requests per second) with a massive attack on 5 September 2021 reaching almost 22 million RPS (requests per second). Cloudflare acknowledged an attack at over 17 million RPS in July 2021.[citation needed]


  1. ^ a b 'Mikrotīkls' apgrozījums sasniedzis 374,6 milj. eiro
  2. ^ Mikrotikls SIA Company Profile Riga, Latvia Competitors, Financials & Contacts - Dun & Bradstreet, Dun & Bradstreet
  3. ^ ""Mikrotīkls" kā pirmais privātuzņēmums Latvijā pārsniedzis miljarda eiro vērtību". LSM.lv.
  4. ^ "MikroTik - About us". MikroTik.
  5. ^ "MikroTik Software". Archived from the original on 1999-12-01.
  6. ^ "New VPNFilter malware targets at least 500K networking devices worldwide". Talos Threat Source Newsletter. 2018-05-23.
  7. ^ Lucero II, Louis (2018-05-27). "F.B.I.'s Urgent Request: Reboot Your Router to Stop Russia-Linked Malware". The New York Times.
  8. ^ Godin, Dan (2018-05-23). "Hackers infect 500,000 consumer routers all over the world with malware". Ars Technica. Retrieved 2019-04-21.
  9. ^ "CVE-2018-14847 winbox vulnerability". blog.mikrotik.com. Retrieved 2021-05-30.
  10. ^ "CVE-2018-14847 winbox vulnerability". blog.mikrotik.com. Retrieved 2021-05-30.
  11. ^ "CVE-2018-14847". nvd.nist.gov. Retrieved 2021-05-30.{{cite web}}: CS1 maint: url-status (link)

External links[edit]