Have you ever wondered if someone else is secretly logging into your Binance account besides you? Regularly checking your logged-in devices is a crucial part of protecting your account security. You can view the records of all devices that have logged into your account on the official Binance website. It is recommended to monitor this anytime through the official Binance App. Apple users should first follow the iOS installation guide to install the app.
Why You Should Manage Logged-in Devices
Every time you log into Binance on a new device, the system records that device's information. These records can help you understand which devices are currently accessing your account.
If you find a device you have never used appearing in your login list, it indicates that someone may have obtained your login credentials and is secretly accessing your account. In this situation, you need to take immediate action: change your password, check your assets, and contact customer support.
Conversely, if you get a new phone or stop using a certain computer, you should also remove the old device from the authorized list. Reducing the number of authorized devices can lower your security risks.
How to View Logged-in Devices
Viewing on the App
Open the Binance App and tap the profile icon in the top left corner to enter the personal center. Find the "Security" or "Security Settings" option. Within the security settings page, look for the "Device Management" or "Trusted Devices" option. Click to enter, and you will see a list of all authorized devices.
Each device will display the following information: device type (phone, computer, tablet, etc.), operating system (iOS, Android, Windows, Mac, etc.), last login time, login IP address, and approximate geographical location.
Viewing on the Web Version
Log into the Binance web version and click the user icon in the top right corner. Select "Security" to enter the security settings page. Find the "Device Management" section. This will similarly list all authorized devices and their login information.
How to Identify Suspicious Devices
When reviewing your device list, pay special attention to the following aspects:
Do You Recognize the Device Type?
If you only use an iPhone and a Windows computer to log into Binance, but an Android phone or Mac computer appears in the list, you need to be on high alert.
Is the Login Time Reasonable?
Compare the login times. If a device logged into your account in the middle of the night while you were sleeping, and you are certain it wasn't you, it's highly likely someone logged in without authorization.
IP Address and Geographical Location
Binance displays the IP address and approximate location of logged-in devices. If there's a login record from a city or country you have never visited, this is a clear red flag.
However, note that if you used a VPN, your IP address and location might differ from your actual whereabouts. Do not misjudge the situation in this case.
Number of Simultaneously Online Devices
If the number of active devices shown in the list is significantly higher than the number of devices you actually use, you need to investigate whether there are unauthorized devices.
How to Remove Suspicious or Unused Devices
Find the device you want to remove and click the "Delete," "Remove," or "Untrust" button next to it. The system may require you to perform identity verification (entering a verification code) to confirm the action.
After removing a device, it will need to undergo login verification (entering a password and 2FA code) the next time it tries to access your Binance account. If it was a stolen device, it will not be able to log in again since the password has already been changed.
Bulk Clearing Devices
If there are many old devices in the list, you can delete them one by one. Some versions of Binance may support a "Remove all other devices" feature, allowing you to remove all authorized devices except the current one with a single click.
After performing a bulk clear, it is recommended to log in again on every device you currently use to reauthorize them.
What to Do After Discovering a Suspicious Login
Step 1: Change Your Password Immediately
The first thing to do after discovering a suspicious device is to change your account password. Set a completely new, strong password, and ensure it has no relation to your old password.
Step 2: Check Security Settings
See if your Google Authenticator, phone number, email, or other 2FA settings have been altered. If there are any changes, it means someone tampered with them, and you need to restore them immediately.
Step 3: Check Account Activity
Review your recent trading history, withdrawal history, and API key management. Look for any actions you don't recognize. Pay special attention to any abnormal withdrawals or transfers.
Step 4: Remove All Suspicious Devices
Remove all devices you do not recognize from the authorized list entirely.
Step 5: Check API Keys
If you have previously created API keys, check to see if there are any unusual ones. Hackers sometimes create API keys to remotely operate your account. Delete all API keys that you do not recognize.
Step 6: Contact Binance Customer Support
If you confirm that your account was compromised, it is advisable to contact Binance customer support to report the incident. They can assist you with further security checks and protective measures.
Login Notification Settings
In addition to periodically checking your device list manually, you should also enable the login notification feature. This way, every time a new device logs into your account, you will receive an email or App push notification.
How to set it up: Find the "Notifications" or "Security Notifications" option in the security settings. Enable "New Device Login Notification." It is recommended to turn on both email and App push notifications simultaneously to ensure you receive them promptly.
When you receive a login notification, if it was your own action, you can ignore it. If it was not you, immediately enter your account to change the password and check your security settings.
Develop the Habit of Regular Checks
It is recommended to check your device management list at least once a week. You can tie this action to other daily habits, such as checking it once every Monday.
Things to check include: Are there any newly added unrecognized devices? Is the last login time of existing devices normal? Are there any anomalies with the IP addresses and geographical locations?
This habit won't take up much of your time, but it can help you spot security risks at the earliest opportunity.
Security Advice for Multi-Device Logins
If you need to use Binance on multiple devices, the following advice can help you stay secure:
Try to minimize the number of logged-in devices. The more devices you have, the larger your risk surface. Only log in on devices you trust and that are secure.
Every device should have a screen lock. Set up a fingerprint or facial recognition on your phone, and a startup password on your computer. This way, even if you lose your device, others cannot directly access your Binance account.
Do not log into Binance on public computers. Public computers in internet cafes, libraries, or hotels might have keyloggers or other malware installed.
Log out after using shared devices. If you temporarily log into Binance on someone else's computer, make sure to log out when you're done and remove that device from your device management.
Frequently Asked Questions
How many devices does Binance allow to be logged in simultaneously?
Binance has not publicly stated a specific limit on the number of simultaneous logged-in devices. However, it is recommended that you only keep the devices currently in use and promptly remove unused ones. Maintaining 2 to 3 commonly used devices is considered appropriate.
Will the App on a removed device automatically log out?
Once authorization is removed, the login status on that device becomes invalid. You will need to log in again the next time you open the App or refresh the web page. However, it will not immediately force the App to close.
Will logging in with a VPN flag my account as suspicious?
It might. A VPN changes your IP address and displayed location, and if this differs significantly from your usual login location, Binance may trigger a security verification (such as requiring an email code). This is a normal security mechanism.
Can family members share the same Binance account?
It is not recommended. Binance's user agreement requires one account per person. Multiple people sharing an account not only violates the rules but also increases security risks. Everyone should register their own independent account.
What should I do if the IP address shown in device management isn't mine?
First, confirm whether you used a VPN or proxy, as this would alter the displayed IP address. If you've ruled this out and still genuinely do not recognize the IP, then you need to follow the process for handling a suspicious login: change your password, remove the device, and check your account activity.