Why Manage Your Login Devices
Every time you log into Binance on a new device, that device is recorded as an "authorized device." If you've ever logged in on a public computer, a friend's phone, or an old device, those devices may still retain login authorization. Regularly checking and cleaning up authorized devices is an essential part of protecting your account.
If you don't have a Binance account yet, register on Binance first. Once registered, you can manage devices in your security settings.
How to View Authorized Devices
On the App
- Open the Binance App
- Tap your profile icon in the top left
- Go to "Security" settings
- Find "Device Management"
- View the list of all authorized login devices
On the Web
- Log into the Binance website
- Go to "Account Security"
- Find "Device Management" or "Trusted Devices"
- View the device list
What Information Does the Device List Show
Each device entry typically includes:
- Device Type: iPhone, Android phone, Windows PC, Mac, etc.
- Device Name/Model: e.g., iPhone 15 Pro, Chrome on Windows
- Login Time: The last time this device was used to log in
- IP Address: The IP address used during login
- Geographic Location: Approximate location based on IP
How to Remove Suspicious Devices
If you spot a device you don't recognize or no longer use:
- Find the target device in the list
- Tap the "Remove" or "Delete" button next to it
- Confirm the removal
- You may need to complete security verification (email/phone/2FA code)
Once removed, the device's login authorization is revoked. The next login from that device will require re-verification.
When Should You Clean Up Devices
1. Unrecognized Devices
If a device you've never used or a login from an unfamiliar location appears in the list, your account may have been accessed by someone else. Remove the device immediately and change your password.
2. After Switching Phones
When you stop using an old phone, remember to remove its login authorization.
3. After Logging in on Public Devices
If you logged into Binance at an internet cafe, hotel computer, or someone else's phone, remove that device afterward.
4. Regular Cleanup
Check your device list once a month and remove any devices you no longer use.
What to Do If You Find a Suspicious Device
If you confirm that a device on the list doesn't belong to you, take the following steps immediately:
Step 1: Remove the Suspicious Device
Remove it from the list right away.
Step 2: Change Your Password
Change your Binance password immediately. Use a completely new, strong password.
Step 3: Check 2FA
Confirm your 2FA (two-factor authentication) settings are intact and haven't been changed.
Step 4: Check Withdrawal Addresses
Look for any unfamiliar withdrawal addresses added to your whitelist.
Step 5: Review Transaction History
Check recent trades, withdrawals, and P2P records for any unauthorized activity.
Step 6: Contact Support
If you find unauthorized activity, contact Binance support immediately to freeze your account.
Preventing Unauthorized Device Logins
1. Enable All Security Verifications
- Email verification
- Phone verification
- Google Authenticator/2FA
- Passkey
Multiple layers of verification effectively block unauthorized logins.
2. Don't Log in on Untrusted Devices
Avoid logging into Binance on public computers or other people's devices. If you must, remove the device and change your password immediately afterward.
3. Enable Login Alerts
Turn on new device login notifications in the Binance App settings. You'll receive an alert immediately if someone logs into your account from a new device.
4. Set Up an Anti-Phishing Code
After setting an anti-phishing code in Binance, all emails from Binance will include your code. Any "Binance email" without this code is a phishing attempt.
We recommend downloading the Binance App to manage your device list on your phone — it's more convenient.
Device Management Limitations
- After removing a device, it will need to re-verify to log in again
- You cannot remove the device you're currently using
- Removing a device doesn't affect completed transactions
- Certain security actions (like password changes) may automatically log out all devices
Summary
Managing authorized login devices is a fundamental account security practice. Regularly checking your device list, removing unnecessary devices, and responding immediately to suspicious devices are simple habits that can significantly reduce the risk of account theft. We recommend checking at least once a month to keep your device list clean.