# How to Safely Use Custom Nodes

Nodes serve as critical bridges connecting decentralized self-custody wallets to blockchain networks. High-quality nodes can provide a smoother user experience. The custom node feature offers users the freedom to choose their preferred node. However, without proper security awareness, especially for new users, it’s easy to be misled into using unsafe nodes, which could ultimately jeopardize your assets. This article will help you understand how to safely choose and use custom nodes to better protect your assets.

***

## **1. What is a Node?**

In a blockchain network, a node refers to a computer or server that participates in the operation of the blockchain network. Nodes are responsible for verifying transactions, maintaining the network's operation and security, and broadcasting transaction data to other nodes in the network, ensuring the decentralized nature of the blockchain.

Nodes are typically divided into the following types:

* **Full Node**: Stores the entire blockchain data and is responsible for verifying all transactions and blocks.
* **Light Node**: Only stores part of the blockchain data and relies on full nodes to access complete data.
* **RPC Node (Remote Procedure Call Node)**: Provides blockchain data access interfaces, often used by wallets or applications to connect to blockchain networks.

***

## **2. What is a Custom Node?**

In decentralized self-custody wallets (like TokenPocket), the wallet application connects by default to official nodes or trusted third-party nodes. However, official nodes may sometimes experience slow access, congestion, or other issues. To address this, wallets often allow users to manually add "custom nodes" for faster and more stable transactions.

However, not all custom nodes are safe and reliable. If users accidentally add malicious nodes or are tricked into adding manipulated nodes, it could lead to asset theft.

***

## **3. What Are the Risks of Custom Nodes?**

<mark style="color:red;">**Phishing Attack Risks**</mark>

Scammers may trick users into adding testnet nodes disguised as mainnet nodes or other malicious nodes. Once connected to these nodes, scammers can mislead users with fake transaction statuses or balance information, tricking them into performing transactions and stealing their assets.

<mark style="color:red;">**Privacy Leakage Risks**</mark>

Malicious nodes may log sensitive information such as users' wallet addresses and transaction data, leading to privacy breaches.

<mark style="color:red;">**Fake Transaction Confirmation Risks**</mark>

Some malicious nodes may forge transaction statuses, displaying fake balances or transaction confirmations to deceive users into believing the transaction is complete, thereby leading to subsequent asset transfers.

***

## **4. How to Identify Safe Nodes?**

Safe nodes generally have the following characteristics:

1. **Provided by Official or Trusted Institutions**\
   For example, nodes recommended by wallet developers, public nodes provided by the blockchain's official team, or nodes offered by well-known blockchain infrastructure providers.
2. **Good Reputation in the Community**\
   Nodes widely recommended by community users are usually more reliable. You can verify and check through blockchain communities or forums.

***

## **5. How to Safely Use Custom Nodes?**

To maximize the protection of your assets, follow these precautions when using custom nodes:

**Use Only Officially Recommended or Trusted Node Service Providers**

Always prioritize nodes recommended by the wallet’s official team or well-known node service providers. Avoid using nodes from unfamiliar sources.

**Verify the Authenticity of Node Information**

Before adding a custom node, carefully verify the node’s URL and Chain ID to ensure the node matches the mainnet or target network.

**Avoid Trusting Recommendations from Strangers**

Do not easily trust nodes recommended by strangers on social media, emails, or unfamiliar chat groups, especially if they involve asset transfers.

**Test with a Small Amount Before Full Use**

When using a custom node for the first time, it’s recommended to test with a small amount of funds. Confirm that transactions are normal and balances are displayed correctly before fully using the node.

**Regularly Check Node Status**

Periodically check whether the node is functioning normally and whether there are any abnormal transaction statuses or information. If any issues are detected, immediately stop using the node and switch to an official node.

***

## **6. Conclusion**

The decentralized nature of blockchain technology provides users with freedom and convenience but also comes with certain security risks. When using custom nodes, users must remain vigilant, carefully choose and use nodes, and avoid asset losses.

By understanding the concept of nodes and mastering the methods for safely using custom nodes, you can better protect your digital assets.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.tokenpocket.pro/en/security-knowledge/security-measure/node.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
