OKX-dolphin-crawler

Neutral Block: Depends Verified robots.txt: No

OKX Dolphin Crawler simulates visits to target web pages as part of malicious dApp scanning

Key facts

Operator
OKX
Family
OKX
Purpose
Site Owner Fetch
User-Agent
OKX-dolphin-crawler
Should you block it?
Depends
Verified
Yes
Respects robots.txt
No
Identity type
Unknown
Confidence
Medium
Last verified
2026-04-19
Last checked
2026-04-19

Bot details

Identity

User-Agent
OKX-dolphin-crawler
robots.txt token
OKX-dolphin-crawler
HTTP user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 OKX-dolphin-crawler
Aliases
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 OKX-dolphin-crawler

Ownership

Operator
OKX
Family
OKX
Type
Security
Purpose
Site Owner Fetch

Verification and trust

Source type
Unknown
Confidence
Medium
Last verified
2026-04-19
Last checked
2026-04-19
Verification
Validate the published identifier against the operator documentation before creating hard allow rules.
Spoofing risk
User-agent strings can be spoofed. For allow-listing or low-friction rules, pair the published identifier with operator documentation or stronger verification when available.

Blocking and detection

Robots

User-agent: OKX-dolphin-crawler
Disallow: /

Cloudflare

(http.user_agent contains "OKX-dolphin-crawler")
Advanced server rules

Apache

RewriteEngine On
RewriteCond %{HTTP_USER_AGENT} OKX\-dolphin\-crawler [NC]
RewriteRule ^ - [F,L]

Nginx

if ($http_user_agent ~* "OKX-dolphin-crawler") { return 403; }

Evidence and source

  • Validate the published identifier against the operator documentation before creating hard allow rules.
  • OKX Dolphin Crawler simulates visits to target web pages as part of malicious dApp scanning
  • User-agent strings can be spoofed. For allow-listing or low-friction rules, pair the published identifier with operator documentation or stronger verification when available.