All
FAQ
Announcements
Product documents
How do I protect my account from Trojan horse takeovers?
Refrain from visiting untrustworthy websites or installing unknown software. Use devices and software from reputable sources only. Note: If your email, authenticator, and passkey accounts share the same login, a hacker could compromise all of them at once. Use separate accounts where possible for critical services. Your awareness is your first line of defense.Published on May 30, 2025Updated on Feb 5, 2026FAQ11OKX Web3 FAQ
Activities such as money laundering, fraud, terrorist financing, sanctions evasion, system attacks, malicious code distribution, identity misuse, or API abuse may lead us to suspend or terminate access to our wallet software service without notice.As a non-custodial wallet software service, users maintain full control of their funds even if the service is no longer accessible.12. What security measures are in place to prevent illicit use of our Web3 Wallet?Published on Jan 19, 2026Updated on Feb 27, 2026FAQ774 Steps to Keep Accounts Safe
To improve security awareness, users do not login account on the public computer; and personal computer should install anti-virus software. 3. Users should create an admin password when making transactions. OKX has a strong security system, but we need users’ cooperation and use the relevant settings.Published on Oct 3, 2017Updated on Nov 17, 2025AnnouncementsGet started with Orbit livestream
Copy the stream key and stream URL, and paste it into your preferred external streaming software. The following screenshots use OBS as an example. Paste the stream key and stream URL into your external streaming software. Configure the source of your video and audio. Preview your livestream on the Orbit livestream. Start streaming from your external streaming service.End your livestream When you are done streaming, you can end your livestream on OKX or your external streaming service.Published on Jan 5, 2026Updated on Jan 29, 2026Product documentationHow do I use a physical security key to protect my account?
Unlike software-based options, physical security keys work offline and are not reliant on cloud services, minimizing risks like account takeovers or unauthorized access.Why choose physical security key? A physical security key provides an additional layer of protection, especially against potential vulnerabilities in software-based options like authenticator apps and passkeys.Published on Jan 10, 2025Updated on Feb 12, 2026FAQ17,974OKX Supports Users to Claim Polkadot (DOT)
Open MyCrypto software and click [Sign & Verify Message], and then login your wallet with one of the methods indicated. 10. Click [Sign Message] and paste the content copied in the step 8 into the Message textbox. Then, click [Sign Message] in the blue bar to generate Signature textbox. Please copy the content in the textbox. 11. Get back to the web page in step 8 and paste the content copied in step 10 into the textbox. Then, click [Confirm claim] 12.Published on Jul 8, 2020Updated on Nov 17, 2025AnnouncementsOKX API FAQ
If you're using a third-party software to connect with OKX and see this error, please check with the software provider if it supports regional domains. For example, EEA users must connect through eea.okx.com, otherwise the request will fail.Why does it show the error "50110" when binding to a third-party software?Published on Sep 20, 2024Updated on Apr 9, 2026FAQ135OKX lists Internet Computer's native asset, ICP, for spot trading and launches $10M fund to support ecosystem
Geared towards developers and entrepreneurs, the creators of websites and software, the project boasts blockchain technology that runs at web speed, efficient data processing and storage and high security. The ICP token is used for decision making on the network, as well as a utility token to pay for services within the decentralized ecosystem.Published on May 10, 2021Updated on Nov 17, 2025AnnouncementsWhat's OKX Security Assistant?
You’ve recently installed software or plugins from unknown sources, run suspicious installers, or opened suspicious attachments. Can verify first, then handle (but don’t delay long-term) The risk level is medium, and you can clearly associate it with legitimate software components you installed. It’s still recommended to verify: Process path Source Whether there’s abnormal auto-start behaviorHow do I handle risks? Please prioritize “clean / uninstall” actions.Published on Jan 15, 2026Updated on Feb 13, 2026FAQ15Trading of Internet Computer's ICP now live on OKX
Geared towards developers and entrepreneurs, the creators of websites and software, the project boasts blockchain technology that runs at web speed, efficient data processing and storage and high security. The ICP token is used for decision making on the network, as well as a utility token to pay for services within the decentralized ecosystem.Published on May 10, 2021Updated on Nov 17, 2025AnnouncementsThe Recommendations to Improve OKX Account Safety
To improve security awareness, users do not login account on the public computer; and personal computer should install anti-virus software. 4. Users should create an admin password when making transactions OKX has a strong security system, but we need users’ cooperation to use the relevant settings. We strongly recommend that users follow the above tips.Published on Sep 30, 2017Updated on Nov 17, 2025AnnouncementsWhat can I do if my device is running in an unsafe environment?
A virtual machine (VM) is software that simulates a complete hardware system, allowing a single physical computer to run multiple operating systems independently and in isolation. Your account may be automatically logged out because the browser environment has changed. We recommend switching to a different browser and trying to log in again.Published on Jan 19, 2023Updated on Feb 12, 2026FAQ298Why is my deposit/withdrawal suspended?
Upgrading the software of the nodes (also known as client software) is known as a blockchain upgrade, and does not involve changing the existing ledger. As public blockchains are decentralised, node upgrades are not compulsory. Node upgrades usually take place after a mainnet upgrade. If I encounter this situation, what should I do? We'll be keeping a close eye on the upgrade/maintenance process. Upon completion, we will resume our service immediately.Published on Aug 31, 2023Updated on Jan 26, 2026FAQ992How do I use recurring buy trading bot?
Trading bots are automated software programs designed to assist traders manage their crypto trades. These bots offer various advantages that can enhance trading strategies and potentially increase portfolio growth. For more details, visit here.What are recurring buy trading bot? We offer a variety of automated trading functions as part of our trading bot, including recurring buy.Published on Aug 30, 2024Updated on Jan 28, 2026FAQ587How do I safeguard my Web3 wallet from fraudsters?
Refrain from authorizing unknown third-party project software to prevent information leakage and potential asset lossFraud case studyFraud case study 1: Guiding users to click on unfamiliar links for wallet authorization Review of fraudulent tactics: Tactic 1: Luring users with high-yield activities to open unfamiliar links and authorize their wallets. Tactic 2: Posing as official entities and guiding users to authorize wallets.Published on Dec 13, 2023Updated on Jan 27, 2026FAQ990