It is technically possible for a network provider to identify a Bitcoin transaction traveling through a router and to the internet, but it would be difficult to stop the transaction without also disrupting other legitimate traffic.
When a Bitcoin transaction is broadcast to the network, it is sent to multiple nodes, which then relay the transaction to other nodes. This process continues until the transaction is confirmed and added to the blockchain. Each node that receives the transaction adds it to a pool of unconfirmed transactions, and miners then select transactions from this pool to include in the next block.
If a network provider were to try to stop a specific Bitcoin transaction, they would need to identify the IP address of the node that first broadcast the transaction and then block traffic to that IP address. However, this would also disrupt other legitimate traffic to that IP address, and it would be difficult to ensure that the transaction is completely stopped.
In the case of a VPN or Tor, it would be more difficult for a network provider to identify a Bitcoin transaction, as the traffic would be encrypted and routed through multiple nodes. However, it's still possible for a determined attacker to identify and intercept the traffic, especially if they have access to the exit nodes used by the VPN or Tor network.
Overall, while it is technically possible for a network provider to identify and potentially stop a Bitcoin transaction, it would be difficult to do so without also disrupting other legitimate traffic. Using a VPN or Tor can help to increase privacy and security, but it's important to be aware of the potential risks and to take steps to protect yourself.