Crypto Basics

What is Cryptojacking? - A Comprehensive Guide

Learn everything about cryptojacking in this comprehensive guide. Understand what it is and how to protect yourself from this cybersecurity threat.
S. Vishwa
9 Minutes
MIN

In today's digital age, cybercriminals are constantly coming up with new ways to exploit unsuspecting victims. One such method is cryptojacking, a type of cybercrime that involves the unauthorized use of people's devices for cryptocurrency mining. 

In this comprehensive guide, we will learn everything about cryptojacking, exploring what it is, how it works, and how you can protect yourself from falling victim to this insidious threat.

What is Cryptojacking?

Before we delve into the intricacies of cryptojacking, it is essential to have a basic understanding of cryptocurrency. 

Cryptocurrency refers to digital or virtual money that takes the form of tokens or "coins." While Bitcoin is the most well-known cryptocurrency, there are approximately 3,000 other forms in circulation.

These digital currencies operate using a distributed database called the blockchain, which records all transactions and ensures their integrity.

The Role of Miners - To produce new blocks in the blockchain, cryptocurrencies rely on individuals known as miners. These miners provide computing power to solve complex mathematical problems, for which they are rewarded with cryptocurrency. 

In the case of larger cryptocurrencies like Bitcoin, dedicated computer rigs are used to complete these calculations, consuming a significant amount of electricity.

The Rise and Fall of Cryptojacking - Cryptojacking emerged as a response to the high costs associated with traditional cryptocurrency mining. 

By surreptitiously using other people's devices, cybercriminals can mine for cryptocurrency without the need for expensive hardware or the burden of electricity bills. The cryptocurrency of choice for cryptojackers is often Monero due to its difficulty to trace.

However, cryptojacking has faced challenges in recent years. Law enforcement crackdowns and the shutdown of prominent cryptojacking platforms like Coinhive have had a dampening effect on this form of cybercrime. 

Coinhive, a site that provided JavaScript code for website owners to mine Monero using their visitors' devices, was widely abused by hackers and ultimately shut down in 2019.

How Does Cryptojacking Work?

Methods of Infection - Cybercriminals employ various methods to infect devices and initiate cryptojacking. 

One common approach is through malicious links embedded in phishing emails, which load crypto mining code onto the victim's computer upon clicking. 

Another method involves injecting JavaScript code into websites or online ads, which automatically executes when the victim's browser loads the content.

Cryptojacking
Image Source - https://www.imperva.com/learn/application-security/cryptojacking/

The Impact on Performance - Cryptojacking scripts do not directly damage computers or steal data. Instead, they exploit the device's processing power to mine cryptocurrency, resulting in decreased performance. 

Victims may experience slower system speed, frequent crashes, and shorter battery life. In business settings, the collective impact of cryptojacked systems can lead to increased IT costs and electricity consumption.

The Spread of Cryptojacking - Some cryptojacking scripts possess worming capabilities, allowing them to infect other devices and servers on a network. This makes them harder to detect and remove. 

Additionally, some websites may request users' permission to mine cryptocurrency while on their site, positioning it as a fair exchange for free content. 

However, malicious cryptojacking scripts continue to run even after the user leaves the initial site, often remaining hidden in the background.

How to Detect Cryptojacking?

Signs of Infection - Detecting cryptojacking can be challenging, as the process is often hidden or disguised as a legitimate activity on the victim's device. 

However, there are several signs to watch out for. Decreased performance, such as slow system speed and frequent crashes, is a common indicator. Overheating devices, noticeable through an unusually fast-running fan, can also suggest the presence of cryptojacking scripts. 

Monitoring CPU usage, especially during periods of low media content, can reveal spikes that may be attributed to cryptojacking activities.

Monitoring CPU Usage - A useful method for detecting cryptojacking is to monitor CPU usage using system tools like the Activity Monitor or Task Manager. 

Unusually high CPU usage when no resource-intensive tasks are being performed can indicate the presence of cryptojacking scripts. 

However, it's important to note that some scripts may attempt to disguise themselves or mask their activities as legitimate processes, making detection more challenging.

The Importance of Vigilance - Being vigilant and proactive is crucial in the fight against cryptojacking. Regularly monitoring your device's performance, staying informed about the latest cybersecurity trends, and investing in comprehensive cybersecurity solutions can help detect and prevent cryptojacking attacks.

How to Protect Yourself from Cryptojacking?

Invest in Comprehensive Cybersecurity - To protect yourself from cryptojacking and other cyber threats, it is essential to invest in comprehensive cybersecurity solutions. Cybersecurity provider can help detect and mitigate the risks associated with cryptojacking. 

Additionally, keeping your operating system and applications up to date with the latest software updates and patches is crucial.

Stay Informed About Latest Trends - Cybercriminals are constantly evolving their techniques, including the methods they use for cryptojacking. 

Staying informed about the latest trends and developments in cybersecurity can help you detect and protect against emerging threats.

Utilize Browser Extensions - Browser extensions designed to block cryptojacking scripts can be an effective defense against this form of cybercrime. Extensions like minerBlock, No Coin, and Anti Miner can help prevent cryptojacking activities when browsing the web.

Leverage Ad Blockers - Since cryptojacking scripts are often delivered through online ads, installing an ad blocker can be an additional layer of protection. 

Ad Blocker Plus is a popular ad-blocking tool that can detect and block malicious cryptojacking code.

Disabling JavaScript - Disabling JavaScript in your browser settings can prevent cryptojacking code from executing on your device. 

However, it's important to note that disabling JavaScript may also affect the functionality of certain websites and services, so exercise caution when employing this method.

Blocking Known Cryptojacking Pages - To further protect yourself from cryptojacking, you can create a whitelist of trusted websites and block known cryptojacking pages. This approach ensures that only verified websites are allowed, reducing the risk of encountering cryptojacking scripts.

Examples of Cryptojacking Attacks

Cryptojacking attacks have been observed in various contexts, targeting both individual users and organizations. Here are some notable examples:

App Store Exploitation - In 2019, several apps were discovered in the Microsoft Store that secretly mined cryptocurrency using the resources of unsuspecting users. 

These apps were downloaded by users who encountered them through keyword searches or on lists of top free apps. 

Upon launching the apps, users unknowingly downloaded cryptojacking JavaScript code, resulting in significant resource consumption and slower device performance.

Compromised Websites - In 2018, the Los Angeles Times' Homicide Report page was found to have embedded cryptojacking code. 

Visitors to the page had their devices used to mine the cryptocurrency Monero. The minimal impact on device performance made it difficult to detect the presence of the cryptojacking script.

Industrial Control System Attack - Also in 2018, a European water utility control system fell victim to a cryptojacking attack. 

The operational technology network of the utility plant was targeted, severely impacting the plant's management capabilities.

This incident marked the first known instance of a cryptojacking attack against an industrial control system.

YouTube Ads and Router Infections - Cryptojackers have even utilized platforms like YouTube and infected routers to carry out their activities. 

In early 2018, the CoinHive miner was found running on YouTube ads through Google's DoubleClick platform. 

Additionally, a massive cryptojacking attack infected over 200,000 MikroTik routers in Brazil during July and August of the same year, injecting CoinHive code into a significant amount of web traffic.

Legal and Ethical Implications of Cryptojacking

The Motive Behind Cryptojacking - The primary motivation behind cryptojacking is financial gain. Mining cryptocurrencies can be highly profitable, but the costs associated with traditional mining methods often limit the potential for profit. 

Cryptojacking provides an illicit yet cost-effective way for cybercriminals to mine valuable coins without incurring significant expenses.

The Victim's Perspective - From the victim's perspective, cryptojacking represents a violation of privacy and the unauthorized use of computing resources. 

While the direct impact may seem minimal, the cumulative effect of multiple cryptojacked systems can result in real costs for businesses and individuals.

Cybersecurity and the Fight Against Cryptojacking

The fight against cryptojacking relies on robust cybersecurity measures and the commitment of individuals, businesses, and law enforcement agencies. 

By investing in comprehensive cybersecurity solutions, staying informed about emerging threats, and adopting preventive measures, we can collectively combat the menace of cryptojacking.

Frequently Asked Questions

Q1. What types of devices are most vulnerable to cryptojacking?

Any device with internet access can potentially fall victim to cryptojacking. However, the more powerful the device (like high-performance PCs), the more attractive it is for cryptojackers.

Q2. Why is cryptojacking seen as an easier way for criminals to make money compared to other forms of cybercrime?

Cryptojacking often goes unnoticed for a long time compared to other cybercrimes like hacking or ransomware. Thus, it allows cybercriminals to continuously earn money with less risk of being detected and stopped.

Q3. Can cryptojacking affect mobile devices like smartphones and tablets?

Yes, any device with processing power and an internet connection can be a target for cryptojacking, including smartphones and tablets.

Q4. If a device is infected, is there a way to trace the mined cryptocurrency back to the cryptojacker?

Tracing the mined cryptocurrency to its source can be challenging due to the anonymity features in cryptocurrencies like Monero, which are commonly used in cryptojacking.

Q5. How does cryptojacking affect businesses differently than individual users?

For businesses, the cumulative impact of many cryptojacked systems can lead to increased IT costs, electricity consumption, and potentially compromised business operations.

Q6. What can be done if my device has already been infected with a cryptojacking script?

In case of an infection, users should run a reputable antivirus or anti-malware software that can detect and remove the script. 

It's also important to update all software and operating systems to their latest versions as updates often contain security fixes.

Q7. Are there any legal consequences for those who are caught cryptojacking?

Cryptojacking is illegal and those caught engaging in this activity can face serious legal repercussions, including fines and imprisonment.

Conclusion

Cryptojacking is a form of cybercrime that exploits the computing resources of unsuspecting victims for cryptocurrency mining. 

By understanding how cryptojacking works and implementing effective protective measures, we can safeguard ourselves and our devices against this insidious threat.

Through comprehensive cybersecurity, vigilance, and staying informed about the latest trends, we can play an active role in combating cryptojacking and ensuring a secure digital environment for all.

Disclaimer

The information provided on this website does not constitute investment advice, financial advice, trading advice, or any other sort of advice and you should not treat any of the website's content as such.

Token Metrics does not recommend that any cryptocurrency should be bought, sold, or held by you. Do conduct your own due diligence and consult your financial advisor before making any investment decisions.

Build Smarter Crypto Apps &
AI Agents in Minutes, Not Months
Real-time prices, trading signals, and on-chain insights all from one powerful API.
Grab a Free API Key
Token Metrics Team
Token Metrics Team

Recent Posts

Research

Why Manual Crypto Portfolio Management Is Costing You Money (And Time)

Token Metrics Team
6
MIN

You're tracking 50+ tokens across three exchanges, updating your rebalancing spreadsheet every weekend, and second-guessing every exit decision at 2 AM. Sound familiar? Manual crypto portfolio management isn't just exhausting—it's expensive. Between missed rebalances, execution drag, and behavioral mistakes during volatility, DIY portfolio management quietly erodes returns before you see any market gains.

The data tells the story: investors who manually manage diversified crypto portfolios typically underperform comparable automated strategies by 12-18% annually, with 60% of that gap coming from operational inefficiency rather than market timing. If you're spending 10+ hours weekly maintaining positions, those hours have a cost—and it's higher than you think.

The Hidden Costs Destroying Your Returns

Time Drain: The 500-Hour Tax

Managing a diversified crypto portfolio demands constant vigilance. For investors holding 20+ positions, the weekly time investment breaks down to approximately:

  • Market monitoring: 5-8 hours tracking prices, news, and on-chain metrics
  • Rebalancing calculations: 2-3 hours determining optimal weights and required trades
  • Order execution: 3-5 hours placing trades across multiple platforms
  • Record keeping: 1-2 hours logging transactions for tax reporting
  • Research updates: 3-5 hours staying current on project developments

That's 14-23 hours weekly, or 728-1,196 hours annually. At a conservative $50/hour opportunity cost, you're spending $36,400-$59,800 in time value maintaining your portfolio. Even if you value your time at minimum wage, that's still $10,000+ in annual "sweat equity" that automated solutions eliminate.

Execution Drag: Death by a Thousand Trades

Small trades erode portfolios through accumulated friction. Every manual rebalance across a 50-token portfolio requires dozens of individual transactions, each incurring:

  • Trading fees: 0.1-0.5% per trade (average 0.25%)
  • Bid-ask spreads: 0.2-0.8% depending on liquidity
  • Slippage: 0.3-1.2% on smaller cap tokens
  • Gas fees: $2-50 per transaction depending on network congestion

For a $100,000 portfolio rebalanced monthly with 40 trades per rebalance, the costs add up:

  • Average cost per trade: ~$100
  • Monthly execution drag: $4,000
  • Annual execution drag: $48,000 (48% of portfolio value)

The smaller your individual trades, the worse the ratio becomes. A $500 rebalancing trade on a low-liquidity altcoin might pay $25 in fees—a 5% instant loss before any price movement.

Automated indices solve this. TM Global 100, Token Metrics' rules-based index, consolidates 100 individual positions into a single transaction at purchase, with weekly rebalances executed through optimized smart contract batching. Users typically save 3-7% annually in execution costs alone compared to manual approaches.

Behavioral Mistakes: Your Worst Enemy Is in the Mirror

Market psychology research shows that manual portfolio managers tend to make predictable, costly mistakes:

  • Panic selling during drawdowns: When Bitcoin drops 25% in a week, can you stick to your exit rules? Many override their plans during high volatility, often selling near local bottoms.
  • FOMO buying at peaks: Tokens up 300% in a week attract chase behavior, with managers entering after the movement is mostly over.
  • Rebalancing procrastination: Putting off rebalancing leads to drift, holding too much of past winners and missing new opportunities.

Token Metrics' systematic approach removes emotion from the equation. The TM Global 100 Index follows a transparent ruleset: hold the top 100 tokens by market cap during bullish phases, shift to stablecoins during bearish cycles, and rebalance weekly—eliminating emotional override and procrastination.

Missed Rebalances: Drifting Out of Position

Market cap rankings shift constantly. A token ranked #73 on Monday might hit #95 by Friday, or surge to #58. Without systematic rebalancing, your portfolio becomes a collection of recent winners or dumpers.

In Q3 2024, Solana ecosystem tokens surged while Ethereum DeFi tokens consolidated. Manual managers who missed weekly rebalances held too much ETH and insufficient SOL exposure. The result: 15-20% underperformance compared to systematically rebalanced portfolios. Data from Token Metrics shows that weekly rebalancing outperforms monthly or quarterly approaches by 8-12% annually.

Tax Reporting Nightmares

Every trade creates a taxable event. Manual managers executing over 200 trades yearly face:

  • Hours spent compiling transaction logs
  • Reconciliation across multiple exchanges
  • Cost-basis tracking for numerous lots
  • High professional accounting fees ($500-2,000+)

Automated solutions like Token Metrics provide transparent transaction logs for each rebalance, simplifying tax reporting and reducing accounting costs.

The Token Metrics Advantage: Research Meets Execution

Token Metrics has established itself as a leading crypto analytics platform, supporting over 50,000 users with AI-powered token ratings, market regime detection, portfolio optimization tools, and trading signals. But analysis alone isn't enough—implementation is crucial.

TM Global 100 Index bridges this gap. It turns research into actionable, tradeable products by automating rebalancing based on Token Metrics' signals and methodology. One click replaces hours of manual work, following a validated systematic approach.

Automation Without Compromise

The best automation is transparent. TM Global 100 offers:

  • Rules-Based Discipline: Bull markets—hold top 100 tokens; bear markets—move to stablecoins
  • Weekly rebalancing every Monday
  • Full methodology disclosure
  • One-Click execution via embedded self-custodial wallet
  • Real-time market insights and holdings visualization
  • Transaction logs with fees and timestamps

This streamlined process allows users to rapidly execute disciplined rebalancing, saving countless hours and increasing operational efficiency while maintaining asset control.

Decision Framework: When to Automate

Automation suits investors who:

  • Hold 15+ tokens and find rebalancing burdensome
  • Miss optimal rebalancing windows due to time constraints
  • Have experienced emotional trading decisions during volatility
  • Spend over 5 hours a week on portfolio management
  • Want broad exposure without manual tracking

Manual management may be suitable for those with fewer positions, active trading infrastructure, or tactical strategies. For most diversified portfolios, automation enhances efficiency and reduces operational errors.

The Compound Effect of Efficiency

Small inefficiencies compound over time. Over five years, a $50,000 portfolio managed manually with a 12% annual return minus 4-2-1% losses yields roughly a 5% net return, ending at about $63,814. A systematic approach with optimizer integration, zero behavioral errors, and regular rebalancing can attain a 13% net return, reaching approximately $92,246—an increase of over $28,000, not counting time saved.

Conclusion: Time Back, Returns Up

Manual crypto portfolio management made sense when portfolios were small and concentrated. Today’s diversified sets require operational discipline to prevent erosion of returns due to execution drag, missed rebalances, and emotional mistakes. Token Metrics built TM Global 100 to turn research into automated, transparent execution, reclaim your time, and boost portfolio discipline—without sacrificing control.

Research

Moonshots API: Discover Breakout Tokens Before the Crowd

Token Metrics Team
5
MIN

The biggest gains in crypto rarely come from the majors. They come from Moonshots—fast-moving tokens with breakout potential. The Moonshots API surfaces these candidates programmatically so you can rank, alert, and act inside your product. In this guide, you’ll call /v2/moonshots, display a high-signal list with TM Grade and Bullish tags, and wire it into bots, dashboards, or screeners in minutes. Start by grabbing your key at Get API Key, then Run Hello-TM and Clone a Template to ship fast.

What You’ll Build in 2 Minutes

Why This Matters

Discovery that converts. Users want more than price tickers, they want a curated, explainable list of high-potential tokens. The Moonshots API encapsulates multiple signals into a short list designed for exploration, alerts, and watchlists you can monetize.

Built for builders. The endpoint returns a consistent schema with grade, signal, and context so you can immediately sort, badge, and trigger workflows. With predictable latency and clear filters, you can scale to dashboards, mobile apps, and headless bots without reinventing the discovery pipeline.

Where to Find The Moonshots API

The cURL request for the Moonshots endpoint is displayed in the top right of the API Reference. Grab it and start tapping into the potential!

How It Works (Under the Hood)

The Moonshots endpoint aggregates a set of evidence—often combining TM Grade, signal state, and momentum/volume context—into a shortlist of breakout candidates. Each row includes a symbol, grade, signal, and timestamp, plus optional reason tags for transparency.

For UX, a common pattern is: headline list → token detail where you render TM Grade (quality), Trading Signals (timing), Support/Resistance (risk placement), Quantmetrics (risk-adjusted performance), and Price Prediction scenarios. This enables users to understand why a token was flagged and how to act with risk controls.

Polling vs webhooks. Dashboards typically poll with short-TTL caching. Alerting flows use scheduled jobs or webhooks to smooth traffic and avoid duplicates. Always make notifications idempotent.

Production Checklist

Use Cases & Patterns

Next Steps

FAQs

1) What does the Moonshots API return?

A list of breakout candidates with fields such as symbol, tm_grade, signal (often Bullish/Bearish), optional reason tags, and updated_at. Use it to drive discover tabs, alerts, and watchlists.

2) How fresh is the list? What about latency/SLOs?

The endpoint targets predictable latency and timely updates for dashboards and alerts. Use short-TTL caching and queued jobs/webhooks to avoid bursty polling.

3) How do I use Moonshots in a trading workflow?

Common stack: Moonshots for discovery, Trading Signals for timing, Support/Resistance for SL/TP, Quantmetrics for sizing, and Price Prediction for scenario context. Always backtest and paper-trade first.

4) I saw results like “+241%” and a “7.5% average return.” Are these guaranteed?

No. Any historical results are illustrative and not guarantees of future performance. Markets are risky; use risk management and testing.

5) Can I filter the Moonshots list?

Yes—pass parameters like min_grade, signal, and limit (as supported) to tailor to your audience and keep pages fast.

6) Do you provide SDKs or examples?

REST works with JavaScript and Python snippets above. Docs include quickstarts, Postman collections, and templates—start with Run Hello-TM.

7) Pricing, limits, and enterprise SLAs?

Begin free and scale up. See API plans for rate limits and enterprise options.

Research

Support and Resistance API: Auto-Calculate Smart Levels for Better Trades

Token Metrics Team
4
MIN

Most traders still draw lines by hand in TradingView. The support and resistance API from Token Metrics auto-calculates clean support and resistance levels from one request, so your dashboard, bot, or alerts can react instantly. In minutes, you’ll call /v2/resistance-support, render actionable levels for any token, and wire them into stops, targets, or notifications. Start by grabbing your key on Get API Key, then Run Hello-TM and Clone a Template to ship a production-ready feature fast.

What You’ll Build in 2 Minutes

A minimal script that fetches Support/Resistance via /v2/resistance-support for a symbol (e.g., BTC, SOL).

  • A one-liner curl to smoke-test your key.
  • A UI pattern to display nearest support, nearest resistance, level strength, and last updated time.

Next Endpoints to add

  • /v2/trading-signals (entries/exits)
  • /v2/hourly-trading-signals (intraday updates)
  • /v2/tm-grade (single-score context)
  • /v2/quantmetrics (risk/return framing)

Why This Matters

Precision beats guesswork. Hand-drawn lines are subjective and slow. The support and resistance API standardizes levels across assets and timeframes, enabling deterministic stops and take-profits your users (and bots) can trust.

Production-ready by design. A simple REST shape, predictable latency, and clear semantics let you add levels to token pages, automate SL/TP alerts, and build rule-based execution with minimal glue code.

Where to Find

Need the Support and Resistance data? The cURL request for it is in the top right of the API Reference for quick access.

👉 Keep momentum: Get API Key • Run Hello-TM • Clone a Template

How It Works (Under the Hood)

The Support/Resistance endpoint analyzes recent price structure to produce discrete levels above and below current price, along with strength indicators you can use for priority and styling. Query /v2/resistance-support?symbol=<ASSET>&timeframe=<HORIZON> to receive arrays of level objects and timestamps.

Polling vs webhooks. For dashboards, short-TTL caching and batched fetches keep pages snappy. For bots and alerts, use queued jobs or webhooks (where applicable) to avoid noisy, bursty polling—especially around market opens and major events.

Production Checklist

  • Rate limits: Respect plan caps; add client-side throttling.
  • Retries/backoff: Exponential backoff with jitter for 429/5xx; log failures.
  • Idempotency: Make alerting and order logic idempotent to prevent duplicates.
  • Caching: Memory/Redis/KV with short TTLs; pre-warm top symbols.
  • Batching: Fetch multiple assets per cycle; parallelize within rate limits.
  • Threshold logic: Add %-of-price buffers (e.g., alert at 0.3–0.5% from level).
  • Error catalog: Map common 4xx/5xx to actionable user guidance; keep request IDs.
  • Observability: Track p95/p99; measure alert precision (touch vs approach).
  • Security: Store API keys in a secrets manager; rotate regularly.

Use Cases & Patterns

  • Bot Builder (Headless): Use nearest support for stop placement and nearest resistance for profit targets. Combine with /v2/trading-signals for entries/exits and size via Quantmetrics (volatility, drawdown).
  • Dashboard Builder (Product): Add a Levels widget to token pages; badge strength (e.g., High/Med/Low) and show last touch time. Color the price region (below support, between levels, above resistance) for instant context.
  • Screener Maker (Lightweight Tools): “Close to level” sort: highlight tokens within X% of a strong level. Toggle alerts for approach vs breakout events.
  • Risk Management: Create policy rules like “no new long if price is within 0.2% of strong resistance.” Export daily level snapshots for audit/compliance.

Next Steps

  • Get API Key — generate a key and start free.
  • Run Hello-TM — verify your first successful call.
  • Clone a Template — deploy a levels panel or alerts bot today.
  • Watch the demo: Compare plans: Scale confidently with API plans.

FAQs

1) What does the Support & Resistance API return?

A JSON payload with arrays of support and resistance levels for a symbol (and optional timeframe), each with a price and strength indicator, plus an update timestamp.

2) How timely are the levels? What are the latency/SLOs?

The endpoint targets predictable latency suitable for dashboards and alerts. Use short-TTL caching for UIs, and queued jobs or webhooks for alerting to smooth traffic.

3) How do I trigger alerts or trades from levels?

Common patterns: alert when price is within X% of a level, touches a level, or breaks beyond with confirmation. Always make downstream actions idempotent and respect rate limits.

4) Can I combine levels with other endpoints?

Yes—pair with /v2/trading-signals for timing, /v2/tm-grade for quality context, and /v2/quantmetrics for risk sizing. This yields a complete decide-plan-execute loop.

5) Which timeframe should I use?

Intraday bots prefer shorter horizons; swing/position dashboards use daily or higher-timeframe levels. Offer a timeframe toggle and cache results per setting.

6) Do you provide SDKs or examples?

Use the REST snippets above (JS/Python). The docs include quickstarts, Postman collections, and templates—start with Run Hello-TM.

7) Pricing, limits, and enterprise SLAs?

Begin free and scale as you grow. See API plans for rate limits and enterprise SLA options.

Disclaimer

This content is for educational purposes only and does not constitute financial advice. Always conduct your own research before making any trading decisions.

Choose from Platinum, Gold, and Silver packages
Reach with 25–30% open rates and 0.5–1% CTR
Craft your own custom ad—from banners to tailored copy
Perfect for Crypto Exchanges, SaaS Tools, DeFi, and AI Products