All
FAQ
Announcements
Product documents
How do I protect my account from Trojan horse takeovers?
Refrain from visiting untrustworthy websites or installing unknown software. Use devices and software from reputable sources only. Note: If your email, authenticator, and passkey accounts share the same login, a hacker could compromise all of them at once. Use separate accounts where possible for critical services. Your awareness is your first line of defense.Published on 30 May 2025Updated on 5 Feb 202612How do I use a physical security key to protect my account?
Unlike software-based options, physical security keys work offline and are not reliant on cloud services, minimizing risks like account takeovers or unauthorized access.Why choose physical security key? A physical security key provides an additional layer of protection, especially against potential vulnerabilities in software-based options like authenticator apps and passkeys.Published on 10 Jan 2025Updated on 12 Feb 202618,275OKX API FAQ
If you're using a third-party software to connect with OKX and see this error, please check with the software provider if it supports regional domains. For example, EEA users must connect through eea.okx.com, otherwise the request will fail.Why does it show the error "50110" when binding to a third-party software?Published on 20 Sept 2024Updated on 18 Apr 2026137What's OKX Security Assistant?
You’ve recently installed software or plugins from unknown sources, run suspicious installers, or opened suspicious attachments. Can verify first, then handle (but don’t delay long-term) The risk level is medium, and you can clearly associate it with legitimate software components you installed. It’s still recommended to verify: Process path Source Whether there’s abnormal auto-start behaviorHow do I handle risks? Please prioritize “clean / uninstall” actions.Published on 15 Jan 2026Updated on 13 Feb 202620What can I do if my device is running in an unsafe environment?
A virtual machine (VM) is software that simulates a complete hardware system, allowing a single physical computer to run multiple operating systems independently and in isolation. Your account may be automatically logged out because the browser environment has changed. We recommend switching to a different browser and trying to log in again.Published on 19 Jan 2023Updated on 12 Feb 2026299Why is my deposit/withdrawal suspended?
Upgrading the software of the nodes (also known as client software) is known as a blockchain upgrade, and does not involve changing the existing ledger. As public blockchains are decentralised, node upgrades are not compulsory. Node upgrades usually take place after a mainnet upgrade. If I encounter this situation, what should I do? We'll be keeping a close eye on the upgrade/maintenance process. Upon completion, we will resume our service immediately.Published on 31 Aug 2023Updated on 26 Jan 20261,000How do I use recurring buy trading bot?
Trading bots are automated software programs designed to assist traders manage their crypto trades. These bots offer various advantages that can enhance trading strategies and potentially increase portfolio growth. For more details, visit here.What are recurring buy trading bot? We offer a variety of automated trading functions as part of our trading bot, including recurring buy.Published on 30 Aug 2024Updated on 28 Jan 2026587How do I safeguard my Web3 wallet from fraudsters?
Refrain from authorizing unknown third-party project software to prevent information leakage and potential asset lossFraud case studyFraud case study 1: Guiding users to click on unfamiliar links for wallet authorization Review of fraudulent tactics: Tactic 1: Luring users with high-yield activities to open unfamiliar links and authorize their wallets. Tactic 2: Posing as official entities and guiding users to authorize wallets.Published on 13 Dec 2023Updated on 27 Jan 20261,000What's a futures trading bot and how do you automate trades with it?
A trading bot is a software program designed to automatically execute trades on your behalf in the crypto market. Using advanced algorithms and real-time market data, trading bots can analyze market conditions, identify opportunities, and execute trades quickly and precisely. The bot operates 24/7, monitoring the markets and identifying profitable opportunities even when you're not actively watching.Published on 26 Dec 2023Updated on 29 Oct 202535Why did my identity verification fail?
Ensure the photos have not been edited using image software (e.g., Photoshop) and are not screenshots. Upload color photos or files. Upload clear photos showing all four corners of the document (front and back if applicable). Make sure all pages containing important information are included. Ensure the entire document is visible, readable, undamaged, and free of glare. Confirm that the document is still valid and not expired.Published on 5 Sept 2023Updated on 18 Apr 202611,537How do I secure my exchange account?
The other four security features are: Authenticator app Authenticator apps are free software authenticators that add extra security to online accounts. The most popular example is Google Authenticator, which is widely used to generate time-based, one-time codes. Our users who activate their authenticator are required to provide confirmation codes when withdrawing funds or making changes to the security settings of their accounts. To activate your authenticator app, you can learn it from here.Published on 12 Jun 2024Updated on 23 Mar 20261,319
Showing 1-11 of 11 articles