One safe interface to manage crypto, NFTs, DeFi and staking while keeping keys offline.
Ledger Live is the official companion application for Ledger hardware wallets. It acts as a secure gateway for viewing balances, sending and receiving supported cryptocurrencies, interacting with DeFi and marketplaces, staking, and viewing NFT collections — while keeping private keys on the user’s offline device.
Anyone who self-custodies crypto using a Ledger hardware device (e.g., Nano models, Ledger Stax) and prefers an integrated desktop or mobile UI for portfolio tracking, transactions, and NFT management.
Ledger devices use a hardware Secure Element to store private keys and to render transaction details on the device screen so you can confirm what you sign independently of the connected computer or phone.
Users generate a seed (secret recovery phrase) when setting up a Ledger device; the seed must be kept offline and never shared. Ledger provides guidance on secure backup practices and also offers optional recovery services/solutions via official channels.
Ledger Live supports a wide library of coins and tokens; it guides you through creating accounts, sending transactions (signed on-device), and staking where supported by the protocol.
Ledger Live provides NFT viewing and marketplace integrations (via WalletConnect and supported partners) to display, transfer, and manage NFTs while requiring on-device confirmations for sensitive actions.
Download Ledger Live on desktop or mobile, follow the “Add a device” flow, create or restore your account, and install the crypto apps for the chains you use. Ledger Live keeps an account list and portfolio dashboard for quick reference.
Check portfolio balances, receive addresses, and approve/send transactions with your hardware device. Use Ledger Live’s integrations for swaps, buys and staking rather than non-official third-party executables where possible.
Phishing and fake apps are the most common threats — attackers mimic official branding to trick users into entering seed phrases or installing malware. Always verify sources and never enter the recovery phrase.