Trusted crypto
exchange

Here’s why you can trust us
EU Regulated
The company is under EU jurisdiction (Lithuania).
4 Stars
We respect your rights over your personal information
We only collect the necessary personal data in order to provide you with the best protection and services we can – and are transparent in how we use it and why we share it.
Lock
Get the help you need, when you need it
You can always contact our support team by phone or depending on the hours, with a real live support agent. You can also check out our Help Center for quick solutions to common problems.
Message
We use state-of-the-art encryption and security
The technology that powers our platform was developed with industry-leading security and encryption at its core. Our security team is constantly working to make sure you and your assets are protected from emerging threats.
Your assets are protected
Your crypto is your crypto. It’s that simple. Icex doesn’t use, or lend, your assets without your permission. Also, we have a cold wallet protection of your funds.

How do we protect
your account?

Here are some of the examples of the best protections
available to all our users
01
2-Step Verification on All Accounts
2-Step Verification adds an additional layer of protection to your account. You have Google Authenticator
and Text Message (SMS) as a way to secure entry.
02
Logging of access
Each access to the database server is restricted and logged.
03
Encrypted Database
Client personal data is stored in a database located on an encrypted partition.
Even direct access to the server does not give any access to client data.
04
Whitelist
You can add your IP address to the login whitelist to exclude any attempts by outsiders to get into your account.

Security

SSH key server access
SSH key server access
To get access to the server our personnel use the SSH key. Access is limited to a number of persons, each of them having a computer with an encrypted disk.
safe authorization
Safe Authorization
Back-end security, 2FA, malware and phishing protection, etc.
Cold Wallets
Cold wallets
Highly secure hardware wallets that are not connected to the internet. Programmed algorithms regularly transfer client funds into cold storages thus providing the necessary level of safety.
Access Loging
Access logging
Each access to the database server is restricted and logged.

Start trading today

Easiest place to buy and sell cryptocurrency.
Register and get started.