All
FAQ
Announcements
Product documents
How do I protect my account from Trojan horse takeovers?
Refrain from visiting untrustworthy websites or installing unknown software. Use devices and software from reputable sources only. Note: If your email, authenticator, and passkey accounts share the same login, a hacker could compromise all of them at once. Use separate accounts where possible for critical services. Your awareness is your first line of defense.Published on May 30, 2025Updated on Feb 5, 202612OKX Web3 FAQ
Activities such as money laundering, fraud, terrorist financing, sanctions evasion, system attacks, malicious code distribution, identity misuse, or API abuse may lead us to suspend or terminate access to our wallet software service without notice.As a non-custodial wallet software service, users maintain full control of their funds even if the service is no longer accessible.12. What security measures are in place to prevent illicit use of our Web3 Wallet?Published on Jan 19, 2026Updated on Feb 27, 202685How do I use a physical security key to protect my account?
Unlike software-based options, physical security keys work offline and are not reliant on cloud services, minimizing risks like account takeovers or unauthorized access.Why choose physical security key? A physical security key provides an additional layer of protection, especially against potential vulnerabilities in software-based options like authenticator apps and passkeys.Published on Jan 10, 2025Updated on Feb 12, 202618,277OKX API FAQ
If you're using a third-party software to connect with OKX and see this error, please check with the software provider if it supports regional domains. For example, EEA users must connect through eea.okx.com, otherwise the request will fail.Why does it show the error "50110" when binding to a third-party software?Published on Sep 20, 2024Updated on Apr 18, 2026137What's OKX Security Assistant?
You’ve recently installed software or plugins from unknown sources, run suspicious installers, or opened suspicious attachments. Can verify first, then handle (but don’t delay long-term) The risk level is medium, and you can clearly associate it with legitimate software components you installed. It’s still recommended to verify: Process path Source Whether there’s abnormal auto-start behaviorHow do I handle risks? Please prioritize “clean / uninstall” actions.Published on Jan 15, 2026Updated on Feb 13, 202620What can I do if my device is running in an unsafe environment?
A virtual machine (VM) is software that simulates a complete hardware system, allowing a single physical computer to run multiple operating systems independently and in isolation. Your account may be automatically logged out because the browser environment has changed. We recommend switching to a different browser and trying to log in again.Published on Jan 19, 2023Updated on Feb 12, 2026299How do I set up wallet release for my DEX trading wallet?
Software installation pop-up (Windows): close any pop-ups prompting you to install additional software.Published on Jan 29, 2026Updated on Jan 29, 2026What's OKX Web3 wallet?
Be careful when clicking on unknown links and downloading new software. Note: Using the wallet doesn't require identity verification, review, or account login. After creating or importing a wallet, you can start using it immediately without verifying a phone number, email address, or identity information. The wallet password isn't the same as the seed phrase or private key. Its primary purpose is to protect your transaction security and sensitive information.Published on Sep 5, 2023Updated on Mar 12, 2026101,438Why is my deposit/withdrawal suspended?
Upgrading the software of the nodes (also known as client software) is known as a blockchain upgrade, and does not involve changing the existing ledger. As public blockchains are decentralised, node upgrades are not compulsory. Node upgrades usually take place after a mainnet upgrade. If I encounter this situation, what should I do? We'll be keeping a close eye on the upgrade/maintenance process. Upon completion, we will resume our service immediately.Published on Aug 31, 2023Updated on Jan 26, 20261,000How do I use recurring buy trading bot?
Trading bots are automated software programs designed to assist traders manage their crypto trades. These bots offer various advantages that can enhance trading strategies and potentially increase portfolio growth. For more details, visit here.What are recurring buy trading bot? We offer a variety of automated trading functions as part of our trading bot, including recurring buy.Published on Aug 30, 2024Updated on Jan 28, 2026587How do I safeguard my Web3 wallet from fraudsters?
Refrain from authorizing unknown third-party project software to prevent information leakage and potential asset lossFraud case studyFraud case study 1: Guiding users to click on unfamiliar links for wallet authorization Review of fraudulent tactics: Tactic 1: Luring users with high-yield activities to open unfamiliar links and authorize their wallets. Tactic 2: Posing as official entities and guiding users to authorize wallets.Published on Dec 13, 2023Updated on Jan 27, 20261,000What's a futures trading bot and how do you automate trades with it?
A trading bot is a software program designed to automatically execute trades on your behalf in the crypto market. Using advanced algorithms and real-time market data, trading bots can analyze market conditions, identify opportunities, and execute trades quickly and precisely. The bot operates 24/7, monitoring the markets and identifying profitable opportunities even when you're not actively watching.Published on Dec 26, 2023Updated on Oct 29, 202535Why did my identity verification fail?
Ensure the photos have not been edited using image software (e.g., Photoshop) and are not screenshots. Upload color photos or files. Upload clear photos showing all four corners of the document (front and back if applicable). Make sure all pages containing important information are included. Ensure the entire document is visible, readable, undamaged, and free of glare. Confirm that the document is still valid and not expired.Published on Sep 5, 2023Updated on Apr 18, 202611,537How do I secure my exchange account?
The other four security features are: Authenticator app Authenticator apps are free software authenticators that add extra security to online accounts. The most popular example is Google Authenticator, which is widely used to generate time-based, one-time codes. Our users who activate their authenticator are required to provide confirmation codes when withdrawing funds or making changes to the security settings of their accounts. To activate your authenticator app, you can learn it from here.Published on Jun 12, 2024Updated on Mar 23, 20261,319
Showing 1-14 of 14 articles