ICON wallet

Supported by a Third-party wallet

The best wallet for your ICON

Secure your ICON coins with the most trusted cryptocurrency wallet. Cold storage wallets are encrypted devices that store your ICON coins offline, providing a layer of security against the evolving threats emerging from being connected to the internet.

Discover our hardware wallet How to use ICON with Ledger
Trusted by over 6 million customers
ICON wallet

What is a ICON wallet?

To store and manage ICON, you need a compatible hardware wallet. Manage your tokens with a compatible third-party wallet while keeping them safe with a Ledger device:

Get your device

Ledger hardware wallet

Ledger hardware wallet stores your private keys and signs transactions offline, making them resistant to malicious attacks and threats.

Third-Party Wallet

Third-party wallet allows you to buy, send/receive, and swap ICON, view transaction history, and more, depending on its capabilities.

How to get a ICON cryptocurrency wallet?

Get a Ledger Nano

Select and purchase a Ledger wallet of your choice.

  • Beginner in the crypto world? Get started with Nano S Plus.
  • Prefer a Bluetooth connection? Try with Nano X.

Get Ledger Nano

Get a Ledger Nano

Download and install ICONex extension

Download and install a compatible third-party wallet that lets you manage your ICON.

Download and install ICONex extension

Connect your Ledger Nano to your ICONex

  1. Connect your Ledger Nano to a computer/smartphone and unlock it.
  2. Open your wallet extension.
  3. Connect your ICONex to Ledger Nano.

You’re all set, you can now use your ICONex!

Connect your Ledger Nano to your ICONex
1

Bertil A.

5/5

In order to secure cryptocurrencies, Ledger is the perfect tool.

Kevin L.

5/5

Simply a very elegant peace of hardware, with a gorgeous UI in the app.

James P.

5/5

ALL is good, all legal resources bought was as specified and compliant, party on.

Read more reviews

What is ICON?

The concept behind ICON was to develop a novel digital economy model where applications could run on the ICON infrastructure and join the decentralized economy facilitated by ICON’s automated protocol. These applications would act as participants in the economy and could create their own cryptocurrencies, while nodes powered by computational resources could choose which applications to support. Although these applications are independent, they remain interconnected and capable of mutual communication. The Icon Republic is at the core of all operations and economies hosted on the ICON Network, where ICX tokens are produced. The Icon Foundation, which drives the ICON project, aims to “hyperconnect the world.” This is an ambitious endeavor as ICON constantly updates its roadmap and improves its ecosystem. The project’s ultimate goal is to create the most extensive decentralized network that will connect various smart contracts, decentralized applications, and economies while enhancing interoperability.

Frequently Asked Questions

When you first buy coin, you’re issued with two keys: public and private.

  • A public key serves as an address that can be shared with other parties to perform transactions.
  • A private key represents a randomly generated number that signs transactions and protects your assets from malicious attacks. If it gets compromised or lost, you won’t be able to access your hardware wallet to spend, withdraw, or transfer your tokens.

To safeguard and keep track of your keys, you can use online or offline wallets. Online wallets, also known as hot wallets, store private keys on systems or devices that are connected to the internet. Hot wallets are easy and convenient to use, however, they come with several drawbacks. Besides being susceptible to attacks and a honeypot for hackers, with hot wallets, the custody of private keys is often entrusted to a third party such as a crypto exchange, which means you never have full control over your funds. The safer choice are specialized hardware wallets that store private keys offline. Stealing private keys from a hardware wallet would require physical access to the wallet and corresponding PIN or the recovery phrase. What’s more, with hardware wallet, you don’t need to rely on third party custodians.

Ledger Nano is the industry-leading hardware wallet. With more than five million customers, Ledger Nano wallets have several layers of security that protect private keys, and hence your assets:

  • Your private keys are stored on secure element chips.
  • A PIN code and a 24-word recovery phrase are required to access the wallet.
  • Ledger Nano crypto wallets have been built using highly durable materials for protection against physical damage.

With full isolation between private keys and your computer/mobile, Ledger Nano cold wallets keep your keys secure and give you complete control over your coins.

Related Resources

Stay in touch

Announcements can be found in our blog. Press contact:
[email protected]

Subscribe to our
newsletter

New coins supported, blog updates and exclusive offers directly in your inbox


Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time using the link included in the newsletter.

Learn more about how we manage your data and your rights.