Register via our exclusive referral link for permanent fee discounts — Sign Up →
All Registration KYC App Deposit P2P Futures Security Earn
Security Settings

Binance Device Management - How to View and Remove Unknown Devices

· ~ 15 min read · ChainKer Editorial Team

How to Manage Authorized Devices on Binance

Every time you log into Binance from a new device, that device is recorded and added to your authorized device list. Reviewing and managing this list is a critical but often overlooked security practice. This guide explains how to access your device list, what information it shows, how to remove devices, and how to set up alerts for new device logins.

Why Device Management Matters

Binance's device management feature gives you visibility into every device that has accessed your account. This is important because:

  • Detecting unauthorized access: If you see a device or location you do not recognize, it may indicate your account has been compromised
  • Limiting your attack surface: Removing old devices you no longer use reduces the number of potential entry points
  • Responding to account theft: If your credentials are stolen, revoking all active sessions immediately can contain the damage
  • Peace of mind: Knowing exactly which devices are authorized gives you confidence in your account's security status

How to View Your Authorized Devices

On the Binance Website

  1. Log in to your Binance account
  2. Hover over your profile icon in the top right corner
  3. Click Security
  4. Scroll down to the Device Management section, or click it directly from the Security menu
  5. You will see a list of all devices that have accessed your account

On the Binance Mobile App

  1. Open the Binance app and ensure you are logged in
  2. Tap the Profile icon (top left or right depending on your layout)
  3. Tap Security
  4. Scroll down to Device Management and tap it

Understanding the Device List

Each entry in your device list shows:

  • Device name: The device model or browser type (e.g., "iPhone 15 Pro," "Chrome on Windows")
  • Device ID: A unique identifier assigned to that device session
  • Location: The city and country of the IP address used at login time — note that VPN users will see the VPN server's location, not their actual location
  • Last active time: When the device last accessed your account
  • Status: Current (active session) or inactive

Interpreting Unusual Locations

A login from an unexpected country is the clearest warning sign. However, there are some legitimate explanations for unfamiliar locations:

  • VPN usage: If you use a VPN, the listed location will be your VPN server, not your real location
  • Mobile network routing: In some cases, mobile carrier traffic is routed through servers in different cities or countries
  • Travel: If you logged in while traveling, the location will reflect where you were at the time

If you cannot explain an unfamiliar location with any of these factors, treat it as a potential compromise and take action immediately.

How to Remove a Device

Removing a Single Device

  1. Go to Security > Device Management
  2. Find the device you want to remove
  3. Click or tap Remove next to that device entry
  4. Binance will ask you to verify the action via your email or 2FA
  5. Once confirmed, that device is no longer authorized and the associated session is invalidated

Removing All Devices at Once

If you suspect your account has been compromised, the fastest protective action is to invalidate all sessions simultaneously:

  1. Go to Security > Device Management
  2. Click Log Out of All Devices or Remove All Devices
  3. Confirm via email or 2FA

After this action, every logged-in session — including your own current one — will be terminated. You will need to log back in and re-authenticate on each of your devices.

How New Device Authorization Works

When you log in from a device that Binance does not recognize, the platform applies additional verification steps:

  1. You enter your email/phone and password
  2. Binance detects this is a new device
  3. A verification code is sent to your registered email
  4. You enter this code to confirm the new device
  5. The device is added to your authorized list

This means that even if someone has your password and 2FA app, they would also need access to your email to authorize a completely new device. This is an important security layer.

Managing Device Trust Level

Trusted vs. Untrusted Devices

When authorizing a new device, you may have the option to mark it as Trusted for 30 days. On a trusted device:

  • Binance may not request additional verification on subsequent logins within the trust period
  • Fewer authentication steps are required for routine account access

Use the trusted device option only for your own personal devices that you control exclusively. Never mark a shared or public computer as trusted.

Removing Trust from a Device

  1. Go to Device Management
  2. Find the trusted device
  3. Click Revoke Trust or Remove Trust
  4. Confirm the action

This does not remove the device entirely — it just requires full authentication on the next login from that device.

Setting Up Login Notifications for New Devices

Binance can notify you whenever a new device logs into your account. This is your earliest warning system for unauthorized access.

Enabling Login Notifications

  1. Go to Profile > Notification Settings (app) or Security > Notification Settings (web)
  2. Ensure Login Notifications or Security Alerts is toggled on
  3. Choose your preferred notification method: email, push notification, or both

With notifications enabled, you will receive an alert within seconds of any new device login. If you receive a notification you did not initiate, immediately:

  1. Change your password
  2. Remove all devices
  3. Review your recent activity
  4. Contact Binance support

What to Do If You Suspect Unauthorized Access

If you see an unrecognized device in your list or receive an unexpected login notification:

Immediate Actions

  1. Do not close the app — Note the suspicious device details
  2. Remove all devices immediately via Security > Device Management
  3. Change your password to a new, strong, unique one
  4. Check your email — See if any unauthorized email address changes were requested
  5. Review recent activity — Check trade history and withdrawals for anything you did not authorize

Follow-Up Actions

  1. Check your email account for signs of compromise (read emails you did not open, forwarding rules, filter changes)
  2. Rotate your 2FA — If you suspect your authenticator was compromised, set up a new 2FA device
  3. Contact Binance support immediately to report the incident and request an account freeze if needed
  4. File a police report if funds were stolen — you may need this for any potential recovery process

Best Practices for Device Management

  • Review your device list monthly — Remove any inactive or unrecognized entries
  • Remove devices promptly after travel — If you logged in at a hotel or on a borrowed phone, remove that session when you return
  • Use biometric authentication on your primary mobile device — This adds a local layer of protection even if your password is compromised
  • Never log in on shared computers — If you must, log out immediately after and remove the device from your authorized list
  • Keep your registered email secure — Device authorization depends on email verification, making your email account a critical security dependency

Get Started Today

Ready to begin? Sign up on Binance using our referral link and enjoy permanent trading fee discounts.

You can also download the Binance app to trade anytime, anywhere.

Sign Up on Binance Now
Use our referral link to get permanent trading fee discounts

Download Binance App and Start Trading

Android APK direct download, no VPN required. iOS requires a non-China Apple ID.