All
FAQ
Announcements
Product documents
OKX API FAQ
API keys that aren't bound to IP and have transaction or withdrawal permissions will be automatically deleted after 14 days of inactivity. API keys will not be considered inactive if they are used to call private or account-related interfaces that require identity verification, such as viewing account balance, billing data, or placing orders.Published on 20 Sept 2024Updated on 23 Mar 2026133How do I stay safe from phishing SMS using the name OKX?
Monitor your login activity in the app regularly for any suspicious devices or IP addresses. Save and use only the official OKX website (https://www.okx.com/) and download the app from verified app stores. If something seems off, contact OKX support through the app for official assistance.What I should NOT do: Don’t click on links from suspicious or unexpected SMS messages. Don’t call phone numbers from SMS messages unless you’ve confirmed their legitimacy through official sources.Published on 9 May 2025Updated on 4 Mar 2026321How do I authorize a new device when I log in?
When entering the verification code and completing facial verification, please ensure both steps are performed in the same IP network environment. If the network environment differs between the web and app, to complete the process more smoothly (such as resetting your password), we recommend performing the operation directly in the app. Depending on your country and available choices, you may need to take certain steps in order to authorize your device.Published on 31 Aug 2023Updated on 16 Mar 202613,725What's a dusting attack?
A VPN hides your IP from local observers, but it doesn’t stop on-chain analysis. Wallet hygiene (avoiding address reuse, using HD wallets) is more effective. Explore more about risk and fraud by visiting here.Published on 4 Oct 2024Updated on 3 Mar 202613Self-Managed Super Fund (SMSF) FAQ
Use IP whitelisting and withdrawal address whitelisting to restrict unauthorized access. Use Secure Wallets for Storage Store long-term holdings in a dedicated hardware wallet. Keep only essential working capital on exchanges. Protect Credentials and Access Provide view-only API keys to accountants or advisors. Never share login or trading credentials. Implement a Risk-Control Strategy Define rules for position sizing, exchange diversification, and cold storage thresholds.Published on 2 July 2025Updated on 3 Dec 2025
Showing 1-5 of 5 articles