Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 491

Hot Wallet

What is Hot Wallet?

Hot WalletA crypto wallet whose private keys reside on an internet-connected device, trading lower security for low-friction signing of frequent transactions.


Hot wallets are software wallets that hold private keys on devices with active network access: browser extensions (MetaMask, Phantom, Rabby), mobile apps (Trust Wallet, Coinbase Wallet), desktop applications, custodial exchange accounts, or server-side wallets used by dApp backends. They are convenient for daily DeFi, NFT minting, gaming, and trading, but are exposed to malware, info-stealer logs, malicious browser extensions, phishing, drainer kits, and operating-system compromise. Risk-reducing patterns include holding only small balances, segregating funds across multiple wallets, using transaction-simulation features, enabling allowlists, and pairing the hot wallet with a hardware signer for higher-value approvals.

Examples

  1. 01

    MetaMask browser extension used as the everyday DeFi wallet on Ethereum and Layer-2 networks.

  2. 02

    An exchange hot wallet that holds the liquidity needed for customer withdrawals.

Frequently asked questions

What is Hot Wallet?

A crypto wallet whose private keys reside on an internet-connected device, trading lower security for low-friction signing of frequent transactions. It belongs to the Web3 & Blockchain category of cybersecurity.

What does Hot Wallet mean?

A crypto wallet whose private keys reside on an internet-connected device, trading lower security for low-friction signing of frequent transactions.

How does Hot Wallet work?

Hot wallets are software wallets that hold private keys on devices with active network access: browser extensions (MetaMask, Phantom, Rabby), mobile apps (Trust Wallet, Coinbase Wallet), desktop applications, custodial exchange accounts, or server-side wallets used by dApp backends. They are convenient for daily DeFi, NFT minting, gaming, and trading, but are exposed to malware, info-stealer logs, malicious browser extensions, phishing, drainer kits, and operating-system compromise. Risk-reducing patterns include holding only small balances, segregating funds across multiple wallets, using transaction-simulation features, enabling allowlists, and pairing the hot wallet with a hardware signer for higher-value approvals.

How do you defend against Hot Wallet?

Defences for Hot Wallet typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Hot Wallet?

Common alternative names include: Online wallet, Software wallet.

Related terms