USDT
USDT

Tether price

$1.0005
+$0.000070000
(+0.00%)
Price change for the last 24 hours
USDUSD
How are you feeling about USDT today?
Share your sentiments here by giving a thumbs up if you’re feeling bullish about the coin or a thumbs down if you’re feeling bearish.
Vote to view results

Tether market info

Market cap
Market cap is calculated by multiplying the circulating supply of a coin with its latest price.
Market cap = Circulating supply × Last price
Circulating supply
Total amount of a coin that is publicly available on the market.
Market cap ranking
A coin's ranking in terms of market cap value.
All-time high
Highest price a coin has reached in its trading history.
All-time low
Lowest price a coin has reached in its trading history.
Market cap
$153.33B
Circulating supply
153,312,689,046 USDT
100.00% of
153,312,689,046 USDT
Market cap ranking
--
Audits
CertiK
Last audit: Apr 1, 2019, (UTC+8)
24h high
$1.0007
24h low
$1.0003
All-time high
$1.0130
-1.23% (-$0.01244)
Last updated: Mar 13, 2023, (UTC+8)
All-time low
$0.95145
+5.15% (+$0.049070)
Last updated: May 12, 2022, (UTC+8)

Tether Feed

The following content is sourced from .
PANews
PANews
PANews reported on June 3 that, according to official news, Gate will launch the BDXN perpetual contract real trading (USDT settlement) for the first time at 18:00 on June 3, 2025 (UTC+8), supporting 1-20 times leverage.
Show original
1.05K
0
PANews
PANews
preface This event is a victory for capital, not users, and it is a regression for the development of the industry. Bitcoin to the left, Sui to the right, and every industry move that shakes up decentralization brings a stronger belief in Bitcoin. The world needs not just a better global financial infrastructure, but a group of people who will always need freedom. Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users. 1. Background of the event On May 22, 2025, Cetus, the largest decentralized exchange (DEX) in the Sui public chain ecosystem, was attacked by hackers, causing a sharp drop in liquidity and the collapse of multiple trading pairs, resulting in a loss of more than $220 million. As of press time, the timeline is as follows: On the morning of May 22, hackers attacked Cetus to extract $230 million, and Cetus urgently suspended the contract and issued an announcement On the afternoon of May 22, the hacker transferred about $60 million across the chain, and the remaining $162 million was still in the Sui on-chain address, and the Sui validator node quickly took action to add the hacker address to the "Deny List" and freeze the funds On the evening of May 22, Sui CPO @emanabio tweeted that the funds have been frozen and will start soon On May 23rd, Cetus began fixing bugs and updating contracts On May 24th, Sui opened an open source PR, explaining that the funds will be recovered through aliasing and whitelist On May 26, Sui initiated an on-chain governance vote proposing whether to perform a protocol upgrade and transfer the hacker's assets to an escrow address On May 29, the voting results were announced, and more than 2/3 of the validator nodes were weighted to support; The protocol upgrade is ready to be executed From May 30 to early June, the protocol upgrade took effect, the specified transaction hash was executed, and the hacked assets were "legally transferred" 2. Attack principle The principle of events is related, and there have been many statements in the industry, so here is only an overview of the core principles: From the perspective of attack flow: The attacker first used a flash loan to lend about 10,024,321.28 haSUI, which instantly lowered the price of the trading pool 99.90%。 This huge sell order brought the target pool price down from about 1.8956×10^19 to 1.8425×10^19, almost bottoming out. Subsequently, the attacker creates a liquidity position on Cetus with an extremely narrow range (Tick lower limit of 300000, upper limit of 300200, and the width of the interval is only 1.00496621%). Such a narrow interval amplifies the impact of subsequent calculation errors on the number of tokens required. The core principle of the attack: There is an integer overflow vulnerability in the get_delta_a function that Cetus uses to calculate the required number of tokens. The attacker deliberately stated that he wanted to add a huge amount of liquidity (about 10^37 units), but in fact only put 1 token into the contract. Due to the wrong overflow detection condition of the checked_shlw, the contract was truncated at a high level during the left-shift calculation, causing the system to seriously underestimate the amount of haSUI required, thus exchanging a huge amount of liquidity at a very small cost. Technically, the above vulnerability stems from Cetus using incorrect masks and judgment conditions in the Move smart contract, resulting in any value less than 0xffffffffffffffff << 192 being able to bypass detection; After moving 64 bits to the left, the high-level data is truncated, and the system only charges a very small number of tokens to consider that it has gained a lot of liquidity. After the incident, 2 official operations were derived: "Freezing" vs "Recovery", which is two phases: The freezing phase is completed by Deny List + node consensus; In the clawback stage, on-chain protocol upgrade + community voting + designated transaction execution is required to bypass the blacklist. 3. Sui's freezing mechanism There is a special Deny List mechanism in the Sui chain, which realizes the freezing of hacking funds. Not only that, but Sui's token standard also has a "regulated token" model with a built-in freezing function. This emergency freeze takes advantage of this feature: validator nodes quickly add addresses related to stolen funds in their local configuration files. Theoretically, each node operator can modify the TransactionDenyConfig to update the blacklist on their own, but in order to ensure network consistency, the Sui Foundation has centralized coordination as the original configuration publisher. The Foundation first officially released a configuration update containing the hacker's address, and the validator took effect synchronously according to the default configuration, so that the hacker's funds were temporarily "sealed" on the chain, which actually has a high degree of centralization behind it In order to rescue the victims from the frozen funds, the Sui team immediately launched a patch for the Whitelist mechanism. This is for subsequent transfers back of funds. Legitimate transactions can be constructed in advance and registered on the whitelist, even if the fund address is still on the blacklist, it can be enforced. This new feature transaction_allow_list_skip_all_checks allows specific transactions to be pre-added to the "Censor Freelist", allowing them to skip all security checks, including signatures, permissions, blacklists, and more. It is important to note that whitelisting patches do not directly steal hacker assets; It only gives certain transactions the ability to bypass the freeze, and the real asset transfer still needs to be done with a legal signature or additional system permission module. In fact, the mainstream freezing scheme in the industry often occurs at the token contract level, and is controlled by the issuer for multi-signature. Taking the USDT issued by Tether as an example, its contract has a built-in blacklist function, and the issuing company can freeze the offending address so that it cannot transfer USDT. This scheme requires multisig to initiate a freezing request on the chain, and the multisig is agreed before it is actually executed, so there is an execution delay. Although the Tether freezing mechanism is effective, statistics show that there is often a "window period" in the multisig process, leaving opportunities for criminals. In contrast, Sui's freeze occurs at the underlying protocol level, is collectively operated by validator nodes, and is executed much faster than normal contract calls. In this model, to be fast enough, it means that the management of these validator nodes themselves is highly uniform. 3. Sui's "transfer recycling" implementation principle What's even more striking is that Sui not only froze the hack's assets, but also planned to "transfer and recover" the stolen funds through an on-chain upgrade. On May 27, Cetus proposed a community vote to upgrade the protocol to send frozen funds to a multisig custodial wallet. The Sui Foundation then initiated an on-chain governance vote. On May 29, the results of the vote were announced, and about 90.9% of the validators supported the scheme. Sui officially announced that once the proposal is approved, "all funds frozen in the two hacker accounts will be recovered to a multisig wallet without the hacker's signature". There is no need for a hacker to sign, which is such a difference that there has never been such a fix in the blockchain industry. As can be seen from Sui's official GitHub PR, the protocol introduces an address aliasing mechanism. The upgrade includes pre-specifying alias rules in ProtocolConfig so that certain permitted transactions can be treated as if the legitimate signature was sent from a hacked account. Specifically, a hashlist of rescue transactions to be executed is tied to a destination address (i.e., a hacker address), and any executor who signs and publishes a summary of these fixed transactions is considered to have initiated the transaction as a valid hacker address owner. For these specific transactions, the validator node system bypasses the Deny List check. At the code level, Sui adds the following judgment to the transaction validation logic: when a transaction is blocked by the blacklist, the system iterates through its signer to check whether protocol_config.is_tx_allowed_via_aliasing(sender, signer, tx_digest) is true. As long as a signer satisfies the alias rule, that is, the transaction is allowed to pass, the previous interception error is ignored and the normal package execution continues. 4. Point of view 160 million, tearing apart is the deepest underlying belief in the industry From the author's personal point of view, this may be a storm that will pass soon, but this model will not be forgotten, because it subverts the foundation of the industry and breaks the traditional consensus that blockchain cannot be tampered with under the same set of ledgers. In blockchain design, the contract is the law, and the code is the referee. But in this case, the code failed, governance intervened, and power overrode the pattern, forming a pattern of voting behavior ruling code results". This is because Sui's direct appropriation of transactions is very different from the handling of hackers on mainstream blockchains. This is not the first time that consensus has been tampered with, but it has been the most silent Historically: Ethereum's 2016 The DAO incident used a hard fork to roll back transfers to cover losses, but this decision led to the split between Ethereum and Ethereum Classic, which was controversial, but ultimately different groups formed different consensus beliefs. The Bitcoin community has experienced similar technical challenges: the 2010 value spillover vulnerability was urgently fixed by developers and the consensus rules were upgraded, completely erasing some 18.4 billion illegally generated bitcoins. It's the same hard fork model, rolling back the ledger to the point where it was before the problem, and then the user can still decide which ledger system to continue using under the issue. Compared with the DAO hard fork, Sui did not choose to split the chain, but targeted this event accurately by upgrading the protocol and configuring aliases. In doing so, Sui keeps the chain continuity and most of the consensus rules unchanged, but also shows that the underlying protocol can be used to implement targeted "rescue operations". The problem is that historically, the "forked rollback" is a user's choice of beliefs; Sui's "protocol correction" is that the chain makes the decision for you. Not Your Key, Not Your Coin? I'm afraid not anymore. In the long run, this means that the idea of "Not your keys, not your coins" is dismantled on the Sui chain: even if the user's private key is intact, the network can still block the flow of assets and redirect assets through collective agreement changes. If this becomes a precedent for blockchain to respond to large-scale security incidents in the future, it is even considered to be a practice that can be followed again. "When a chain can break rules for justice, it has a precedent for breaking any rules." Once there is a success of "public welfare money grabbing", the next time it may be an operation in the "moral ambiguity zone". So what happens? The hacker did steal the user's money, so can the crowd vote rob him of his money? Vote based on whose money is more (pos) or more people? If the one with more money wins, then Liu Cixin's final producer will come soon, and if the one with more people wins, then the group rabble will also be loud. Under the traditional system, it is very normal for illegal gains to be unprotected, and freezing and transferring are the routine operations of traditional banks. But the fact that this cannot be done technically is not the root of the development of the blockchain industry. Now the stick of industry compliance is continuing to ferment, today you can freeze for hackers and modify the account balance, then tomorrow you can do arbitrary modifications for geographical factors and contradictory factors. If the chain becomes part of the regional tool. The value of that industry has been greatly reduced, and at best it is a more difficult financial system. This is also the reason why the author is firmly in the industry: "Blockchain is not valuable because it cannot be frozen, but because even if you hate it, it will not change for you." ” Regulatory trends, can the chain keep its soul? Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users. From the perspective of industry development Efficient centralization", is it a necessary stage in the development of blockchain? If the ultimate goal of decentralization is to protect the interests of users, can we tolerate centralization as a means of transition? ” The word "democracy", in the context of on-chain governance, is actually token weighted. So if a hacker holds a large amount of SUI (or one day the DAO is hacked and the hacker controls the votes), can they also "legally vote to whitewash themselves"? In the end, the value of blockchain is not whether it can be frozen, but whether the group chooses not to do so even if it has the ability to freeze. The future of a chain is not determined by the technical architecture, but by the set of beliefs it chooses to protect.
Show original
21.31K
1
ChainCatcher 链捕手
ChainCatcher 链捕手
Author: Fourteen Jun   This event is a victory for capital, not users, and it is a regression for the development of the industry. Bitcoin to the left, Sui to the right, and every industry move that shakes up decentralization brings a stronger belief in Bitcoin. The world needs not just a better global financial infrastructure, but a group of people who will always need freedom. Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users. 1. Background of the event On May 22, 2025, Cetus, the largest decentralized exchange (DEX) in the Sui public chain ecosystem, was attacked by hackers, causing a sharp drop in liquidity and the collapse of multiple trading pairs, resulting in a loss of more than $220 million. As of press time, the timeline is as follows: On the morning of May 22, hackers attacked Cetus to extract $230 million, and Cetus urgently suspended the contract and issued an announcement On the afternoon of May 22, the hacker transferred about $60 million across the chain, and the remaining $162 million was still in the Sui on-chain address, and the Sui validator node quickly took action to add the hacker's address to the "Deny List" and freeze the funds On the evening of May 22, Sui CPO @emanabio tweeted that the funds have been frozen, and the return will start soon On May 23, Cetus began fixing vulnerabilities and updating contracts On May 24th, Sui open-sourced the PR, explaining that it was about to recycle funds through aliasing and whitelist On May 26, Sui initiated an on-chain governance vote proposing whether to perform a protocol upgrade and transfer the hacked assets to an escrow address On May 29, the voting results were announced, and more than 2/3 of the validator nodes were weighted to support; The protocol upgrade is ready to be executed From May 30th to early June, the protocol upgrade took effect, the specified transaction hash was executed, and the hacked assets were "legally transferred" 2. Attack principle The principle of events is related, and there have been many statements in the industry, so here is only an overview of the core principles: From the perspective of attack flow: The attacker first used a flash loan to lend about 10,024,321.28 haSUI, which instantly lowered the price of the trading pool 99.90%。 This huge sell order brought the target pool price down from about 1.8956×10^19 to 1.8425×10^19, almost bottoming out. Subsequently, the attacker creates a liquidity position on Cetus with an extremely narrow range (Tick lower limit of 300000, upper limit of 300200, and interval width of only 1.00496621%). Such a narrow interval amplifies the impact of subsequent calculation errors on the number of tokens required. The core principle of the attack: There is an integer overflow vulnerability in the get_delta_a function that Cetus uses to calculate the required number of tokens. The attacker deliberately stated that he wanted to add a huge amount of liquidity (about 10^37 units), but in fact only put 1 token into the contract. Due to the wrong overflow detection condition of checked_shlw, the contract was truncated at a high level during the left-shift calculation, causing the system to seriously underestimate the amount of haSUI required, thus exchanging a huge amount of liquidity at a very small cost. Technically, the above vulnerability stems from Cetus using incorrect masks and judgment conditions in the Move smart contract, resulting in any value less than 0xffffffffffffffff << 192 being able to bypass detection; After moving 64 bits to the left, the high-level data is truncated, and the system only charges a very small number of tokens to consider that it has gained a lot of liquidity. After the incident, 2 official operations were derived: "Freezing" vs "Recovery", which is two phases: The freezing phase is completed by Deny List + node consensus; In the clawback stage, on-chain protocol upgrade + community voting + designated transaction execution is required to bypass the blacklist. 3. Sui's freezing mechanism There is a special Deny List mechanism in the Sui chain itself, which realizes the freezing of hacking funds. Not only that, but Sui's token standard also has a "regulated token" model with a built-in freezing function. This emergency freeze takes advantage of this feature: validator nodes quickly add addresses related to stolen funds in their local configuration files. Theoretically, each node operator can modify the TransactionDenyConfig to update the blacklist on their own, but in order to ensure network consistency, the Sui Foundation has centralized coordination as the original configuration publisher. The Foundation first officially released a configuration update containing the hacker's address, and the validator took effect synchronously according to the default configuration, so that the hacker's funds were temporarily "sealed" on the chain, which actually has a high degree of centralization behind it In order to rescue the victims from the frozen funds, the Sui team immediately launched a patch for the Whitelist mechanism. This is for subsequent transfers back of funds. Legitimate transactions can be constructed in advance and registered on the whitelist, even if the fund address is still on the blacklist, it can be enforced. This new feature transaction_allow_list_skip_all_checks allows specific transactions to be pre-added to the "checklist", allowing them to skip all security checks, including signatures, permissions, blacklists, etc. It is important to note that whitelisting patches do not directly steal hacker assets; It only gives certain transactions the ability to bypass the freeze, and the real asset transfer still needs to be done with a legal signature or additional system permission module. In fact, the mainstream freezing scheme in the industry often occurs at the token contract level, and is controlled by the issuer for multi-signature. Taking the USDT issued by Tether as an example, its contract has a built-in blacklist function, and the issuing company can freeze the offending address so that it cannot transfer USDT. This scheme requires multisig to initiate a freezing request on the chain, and the multisig is agreed before it is actually executed, so there is an execution delay. Although the Tether freezing mechanism is effective, statistics show that there is often a "window period" in the multi-signature process, leaving opportunities for criminals to take advantage of. In contrast, Sui's freeze occurs at the underlying protocol level, is collectively operated by validator nodes, and is executed much faster than normal contract calls. In this model, to be fast enough, it means that the management of these validator nodes themselves is highly uniform. 3. Sui's "transfer recycling" implementation principle What's even more amazing is that Sui not only froze the hacker's assets, but also planned to "transfer and recover" the stolen funds through on-chain upgrades. On May 27, Cetus proposed a community vote to upgrade the protocol to send frozen funds to a multisig custodial wallet. The Sui Foundation then initiated an on-chain governance vote. On May 29, the results of the vote were announced, and about 90.9% of the validators supported the scheme. Sui officially announced that once the proposal is approved, "all funds frozen in the two hacker accounts will be recovered to a multisig wallet without the hacker's signature". There is no need for a hacker to sign, which is such a difference that there has never been such a fix in the blockchain industry. As can be seen from Sui's official GitHub PR, the protocol introduces an address aliasing mechanism. The upgrade includes pre-specifying alias rules in ProtocolConfig so that certain permitted transactions can be treated as if the legitimate signature was sent from a hacked account. Specifically, a hashlist of rescue transactions to be executed is tied to a destination address (i.e., a hacker address), and any executor who signs and publishes a summary of these fixed transactions is considered to have initiated the transaction as a valid hacker address owner. For these specific transactions, the validator node system bypasses the Deny List check. At the code level, Sui adds the following judgment to the transaction validation logic: when a transaction is blocked by the blacklist, the system iterates through its signer to check whether protocol_config.is_tx_allowed_via_aliasing(sender, signer, tx_digest) is true. As long as a signer satisfies the alias rule, that is, the transaction is allowed to pass, the previous interception error is ignored and the normal package execution continues. 4. Point of view 160 million, tearing apart is the deepest underlying belief in the industry From the author's personal point of view, this may be a storm that will pass soon, but this model will not be forgotten, because it subverts the foundation of the industry and breaks the traditional consensus that blockchain cannot be tampered with under the same set of ledgers. In blockchain design, the contract is the law, and the code is the referee. But in this case, the code failed, governance interfered, and power overrode the pattern, forming a pattern of voting behavior adjudicating code results. This is because Sui's direct appropriation of transactions is very different from the handling of hackers on mainstream blockchains. This is not the first time that consensus has been tampered with, but it has been the most silent Historically: Ethereum's 2016 The DAO incident used a hard fork to roll back transfers to cover losses, but this decision led to the split between Ethereum and Ethereum Classic, which was controversial, but ultimately different groups formed different consensus beliefs. The Bitcoin community has experienced similar technical challenges: the 2010 value spillover vulnerability was urgently fixed by developers and the consensus rules were upgraded, completely erasing some 18.4 billion illegally generated bitcoins. It's the same hard fork model, rolling back the ledger to the point where it was before the problem, and then the user can still decide which ledger system to continue using under the issue. Compared with the DAO hard fork, Sui did not choose to split the chain, but targeted this event accurately by upgrading the protocol and configuring aliases. In doing so, Sui maintains the continuity of the chain and most of the consensus rules, but also shows that the underlying protocol can be used to implement targeted "rescue operations". The problem is that historically, the "forked rollback" is a user's choice of faith; Sui's "protocol correction" is that the chain makes the decision for you. Not Your Key, Not Your Coin? I'm afraid not anymore. In the long run, this means that the idea of "not your keys, not your coins" is dismantled on the Sui chain: even if the user's private key is intact, the network can still block the flow of assets and redirect them through collective agreement changes. If this becomes a precedent for blockchain to respond to large-scale security incidents in the future, it is even considered to be a practice that can be followed again. "When a chain can break rules for the sake of justice, it has a precedent for breaking any rules." Once there is a success of "public welfare money grabbing", the next time it may be an operation in the "moral ambiguity". So what happens? The hacker did steal the user's money, so can the crowd vote rob him of his money? Vote based on whose money is more (pos) or more people? If the one with more money wins, then Liu Cixin's final producer will come soon, and if the one with more people wins, then the group rabble will also be loud. Under the traditional system, it is very normal for illegal gains to be unprotected, and freezing and transferring are the routine operations of traditional banks. But the fact that this cannot be done technically is not the root of the development of the blockchain industry. Now the stick of industry compliance is continuing to ferment, today you can freeze for hackers and modify the account balance, then tomorrow you can do arbitrary modifications for geographical factors and contradictory factors. If the chain becomes part of the regional tool. The value of that industry has been greatly reduced, and at best it is a more difficult financial system. This is also the reason why the author is firmly committed to the industry: "Blockchain is not valuable because it cannot be frozen, but because even if you hate it, it will not change for you." Regulatory trends, can the chain keep its soul? Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users. From the perspective of industry development Efficient centralization, is it a necessary stage in the development of blockchain? If the ultimate goal of decentralization is to protect the interests of users, can we tolerate centralization as a means of transition? The word "democracy", in the context of on-chain governance, is actually token weighted. So if a hacker holds a large amount of SUI (or one day the DAO is hacked, and the hacker controls the votes), can they also "legally vote to launder themselves"? In the end, the value of blockchain is not whether it can be frozen, but whether the group chooses not to do so even if it has the ability to freeze. The future of a chain is not determined by the technical architecture, but by the set of beliefs it chooses to protect.
Show original
22.27K
0
PANews
PANews
PANews reported on June 3 that according to the Aave community forum, AAVE will officially launch the Umbrella system on June 5, 2025, allowing users to stake aToken to prevent bad debts in the protocol and receive rewards. This mechanism replaces the old staking AAVE and stkABPT methods, and directly burns aTokens to deal with bad debts, achieving higher capital efficiency and an objective triggering mechanism. Initially, it will be launched on networks such as Ethereum, Arbitrum, Avalanche and Base, covering major assets such as USDC, USDT, WETH and so on. Umbrella has been developed and audited and is ready to go live.
Show original
15.26K
0
Velodrome
Velodrome
LP Rewards on Ink & Soneium🚴‍♂️ • $USDC.e - $WETH: ~217% - Ink • $USDT0 - $WETH: ~167% - Ink • $USDG - $kBTC: ~77% - Ink • $ASTR - $USDC.e: ~483% - Soneium • $WBTC - $WETH: ~287% - Soneium • $USDC.e - $WETH: ~174% - Soneium Incentives for key pools are live—supporting deeper liquidity, better execution, and broader adoption across the Superchain
34.26K
17

USDT calculator

USDUSD
USDTUSDT

Tether price performance in USD

The current price of Tether is $1.0005. Over the last 24 hours, Tether has increased by +0.01%. It currently has a circulating supply of 153,312,689,046 USDT and a maximum supply of 153,312,689,046 USDT, giving it a fully diluted market cap of $153.33B. At present, the Tether coin holds the 0 position in market cap rankings. The Tether/USD price is updated in real-time.
Today
+$0.000070000
+0.00%
7 days
+$0.00062000
+0.06%
30 days
+$0.00072000
+0.07%
3 months
+$0.00082000
+0.08%

About Tether (USDT)

4.1/5
Certik
4.2
02/07/2025
CyberScope
4.4
02/08/2025
TokenInsight
3.7
11/07/2024
The rating provided is an aggregated rating collected by OKX from the sources provided and is for informational purpose only. OKX does not guarantee the quality or accuracy of the ratings. It is not intended to provide (i) investment advice or recommendation; (ii) an offer or solicitation to buy, sell or hold digital assets; or (iii) financial, accounting, legal or tax advice. Digital assets, including stablecoins and NFTs, involve a high degree of risk, can fluctuate greatly, and can even become worthless. The price and performance of the digital assets are not guaranteed and may change without notice. Your digital assets are not covered by insurance against potential losses. Historical returns are not indicative of future returns. OKX does not guarantee any return, repayment of principal or interest. OKX does not provide investment or asset recommendations. You should carefully consider whether trading or holding digital assets is suitable for you in light of your financial condition. Please consult your legal/ tax/ investment professional for questions about your specific circumstances.
Show more
  • Official website
  • White Paper
  • Block explorer
  • About third-party websites
    About third-party websites
    By using the third-party website ("TPW"), you accept that any use of the TPW will be subject to and governed by the terms of the TPW. Unless expressly stated in writing, OKX and its affiliates ("OKX") are not in any way associated with the owner or operator of the TPW. You agree that OKX is not responsible or liable for any loss, damage and any other consequences arising from your use of the TPW. Please be aware that using a TPW may result in a loss or diminution of your assets.

Tether (USDT) is the world's first and most widely used stablecoin and the third-largest cryptocurrency by market cap. USDT is an Ethereum-based, asset-backed, stablecoin pegged to the US dollar. Hence, Tether's value is meant to remain consistently close to 1 USD.

Initially called Realcoin, Tether was launched in 2014 by Reeve Collins, Craig Sellars, and Brock Pierce. USDT tokens are issued by Tether Limited, a company controlled by Bitfinex, and can theoretically be redeemed at any time for an equivalent amount.

How does Tether work

Tether was initially built on top of the Bitcoin blockchain, but its network has now been expanded to run on over ten different blockchain protocols, including Ethereum (ETH), Tron (TRX), and Solana (SOL). Tether was also launched on the Omni layer, a platform for creating and trading assets on the Bitcoin network.

USDT can be minted or destroyed by its issuing company Tether Limited, and more importantly, be quickly and cheaply transferred to individuals over any supporting blockchain network. Whenever new USDT tokens are issued, Tether is meant to allocate the corresponding USD amount to its reserves, in order to ensure that USDT remains fully backed by cash and cash equivalents.

What is Tether used for?

USDT has become popular for trading across major exchanges due to its ease of use and wide acceptance. In most cases, users can also conveniently move their holdings between their Web3 wallets and exchanges.

Tether can also be used to gain some level of exposure to the US dollar. Tether Limited publishes a daily report on the value of its reserves and has quarterly assurance opinions issued by external accountants.

USDT developments

In an updated statement, Tether revealed that USDT tokens are no longer backed entirely by US dollar deposits. Instead, Tether is allegedly backed by reserves, including traditional currency, cash equivalents, short-term deposits, commercial papers, US treasury bills, corporate bonds, secured loans, precious metals, corporate funds, and more.

In January 2021, Tether Limited minted a record 2 billion USDT tokens in a single week. This came during tremendous growth in the crypto markets. The growing interest in USDT was due to several reasons, including an increasing lack of trust in the traditional financial system and rising institutional interest in cryptocurrencies.

In November 2021, USDT launched on the Avalanche platform. Avalanche, launched in 2020, is one of the blockchain industry's fastest and cheapest-to-use smart contracts platforms. The Avalanche-native USDT was first supported by Bitfinex and was said to offer cheaper and quicker USDT transactions.

In April 2022, USDT support was added for the blockchain network Kusama making Kusama the tenth network to support the asset-backed stablecoin. This represented a milestone for Kusama and an especially significant one for USDT. Kusama is a decentralized network of specialized, parallel blockchains closely related to the much more extensive Polkadot network and is often referred to as Polkadot's Canary network.

In May 2022, USDT was launched on the Polygon network. Polygon is an Ethereum scaling solution, also known as a sidechain or Layer-2 network, known for charging significantly lower transaction fees and being faster than its main network, Ethereum. At the time, Polygon had processed over $1.6 billion in transactions, had over $5 billion in locked value, and had more than 19,000 decentralized apps (DApps) running on it. Polygon is the 11th blockchain network that USDT was launched on.

Tether's expansion continued during 2023 with key partnerships such as that with Argentinian crypto payments provider KriptonMarket. The partnership supports USDT transactions at the Central Market of Buenos Aires, allowing customers to pay for goods using USDT. The collaboration also allows vendors to pay a portion of their employees' salaries in the stablecoin.

On August 12, 2024, USDT reached a new record market cap of $115 billion, on its way to capturing a 70% share of the total stablecoin market. The milestone followed noteworthy growth for the leading stablecoin, with USDT increasing its market cap by more than 40% between September 2023 and August 2024.

In the same month, Tether announced the expansion of USDT to the Aptos blockchain in a move that aimed to improve accessibility to digital currencies globally. The integration of USDT with Aptos brought lower gas fees and high performance to users of the chain, opening the door to wider adoption.

USDT price and tokenomics

Tether Limited controls the minting and burning of USDT tokens. IN theory, when there is demand for USDT, Tether mints new tokens and when USDT is sold, the corresponding number of tokens is burned.

There are about 116.99 billion USDT in circulation as of mid-2024, and USDT has a current total supply of 118 billion. Some USDT tokens are held in reserve by Tether Limited, explaining the gap between the number of tokens in circulation and the number in existence.

USDT has no supply cap, so any number of USDT tokens could potentially be created by Tether Limited, if there is sufficient collateral to back them. Minting new tokens doesn’t erode the value of existing tokens. Likewise, burning USDT tokens doesn’t increase token value.

About the founders

Tether was founded in 2014 by a group of early crypto adopters and Bitcoin enthusiasts passionate about digitizing fiat currencies. Its origins lie in the Mastercoin protocol, based on the Bitcoin blockchain.

Brock Pierce was one of the original members of the Mastercoin Foundation who helped develop and promote Mastercoin. Pierce, Craig Sellars, and Reeve Collins co-founded Tether in 2014, with Mastercoin protocol as its technological foundation.

Tether's precursor, "Realcoin," was announced in July 2014, and the first tokens were issued in October 2014. The project was renamed Tether in November of that year, alongside an announcement of entering the private beta phase, with three currencies: USTether (for USD), EuroTether (for EUR), and YenTether (for JPY).

Brock Pierce is a widely known entrepreneur and co-founder of multiple high-profile entertainment and crypto projects, including Blockchain Capital and Block.one, the company that created the EOS blockchain. He also served as Director of a non-profit organization called Bitcoin Foundation, created to improve and promote Bitcoin.

Reeve Collins is also a serial entrepreneur who had already co-founded successful companies like Traffic Marketplace, RedLever, and Pala Interactive. On the other hand, Craig Sellars has been an active member of the Omni Foundation and associated with multiple organizations, including Bitfinex, Synereo, MaidSafe Foundation, and Factom.

Show more
Show less
Trade popular crypto and derivatives with low fees
Trade popular crypto and derivatives with low fees
Get started

Socials

Posts
Number of posts mentioning a token in the last 24h. This can help gauge the level of interest surrounding this token.
Contributors
Number of individuals posting about a token in the last 24h. A higher number of contributors can suggest improved token performance.
Interactions
Sum of socially-driven online engagement in the last 24h, such as likes, comments, and reposts. High engagement levels can indicate strong interest in a token.
Sentiment
Percentage score reflecting post sentiment in the last 24h. A high percentage score correlates with positive sentiment and can indicate improved market performance.
Volume rank
Volume refers to post volume in the last 24h. A higher volume ranking reflects a token’s favored position relative to other tokens.
In the last 24 hours, there have been 2.3K new posts about Tether, driven by 1.7K contributors, and total online engagement reached 1.5M social interactions. The sentiment score for Tether currently stands at 87%. Compared to all cryptocurrencies, post volume for Tether currently ranks at 1895. Keep an eye on changes to social metrics as they can be key indicators of the influence and reach of Tether.
Powered by LunarCrush
Posts
2,345
Contributors
1,682
Interactions
1,478,757
Sentiment
87%
Volume rank
#1895

X

Posts
1,292
Interactions
1,142,021
Sentiment
90%

Tether FAQ

What is a stablecoin?

Stablecoins are cryptocurrencies designed to have a fixed price by having their value pegged to some cryptocurrency, commodity, fiat currency, or financial instrument or by utilizing an arbitrage system.

What is USDT?

USDT is a stablecoin pegged to the value of the US dollar. It was launched in 2014 to facilitate the transfer of fiat currencies on the blockchain. USDT is also the largest stablecoin after USD Coin (USDC). Tether is issued by Tether Limited, a company based in Hong Kong, and operates on blockchain networks, including Bitcoin, Ethereum, and Tron. Each USDT token represents one US dollar held in reserve by Tether Limited.

Why would I want to buy USDT?

USDT provides a stable and secure way to store and transfer value on the blockchain. As a stablecoin, its value is pegged to the US Dollar, which makes it less volatile than other cryptocurrencies. This stability makes it a popular choice for traders who want to minimize their exposure to cryptocurrency market fluctuations.

Another good reason to buy Tether is its wide acceptance among cryptocurrency exchanges, which makes it a convenient way to move funds between different trading platforms. However, like most digital assets, cryptocurrency is deemed high-risk and prone to sharp price changes and volatility. Therefore, always DYOR before making any financial decisions.

What is the USDT price prediction?
While it’s challenging to predict the exact future price of USDT, you can combine various methods like technical analysis, market trends, and historical data to make informed decisions.
What is the current USDT price today?
The current price of USDT today is constantly changing and can be checked in real-time on our platform. Visit our price page for the most up-to-date information.
How much is 1 Tether worth today?
Currently, one Tether is worth $1.0005. For answers and insight into Tether's price action, you're in the right place. Explore the latest Tether charts and trade responsibly with OKX.
What is cryptocurrency?
Cryptocurrencies, such as Tether, are digital assets that operate on a public ledger called blockchains. Learn more about coins and tokens offered on OKX and their different attributes, which includes live prices and real-time charts.
When was cryptocurrency invented?
Thanks to the 2008 financial crisis, interest in decentralized finance boomed. Bitcoin offered a novel solution by being a secure digital asset on a decentralized network. Since then, many other tokens such as Tether have been created as well.
Will the price of Tether go up today?
Check out our Tether price prediction page to forecast future prices and determine your price targets.

Monitor crypto prices on an exchange

Watch this video to learn about what happens when you move your money to a crypto exchange.

Disclaimer

The social content on this page ("Content"), including but not limited to tweets and statistics provided by LunarCrush, is sourced from third parties and provided "as is" for informational purposes only. OKX does not guarantee the quality or accuracy of the Content, and the Content does not represent the views of OKX. It is not intended to provide (i) investment advice or recommendation; (ii) an offer or solicitation to buy, sell or hold digital assets; or (iii) financial, accounting, legal or tax advice. Digital assets, including stablecoins and NFTs, involve a high degree of risk, can fluctuate greatly. The price and performance of the digital assets are not guaranteed and may change without notice.

OKX does not provide investment or asset recommendations. You should carefully consider whether trading or holding digital assets is suitable for you in light of your financial condition. Please consult your legal/tax/investment professional for questions about your specific circumstances. For further details, please refer to our Terms of Use and Risk Warning. By using the third-party website ("TPW"), you accept that any use of the TPW will be subject to and governed by the terms of the TPW. Unless expressly stated in writing, OKX and its affiliates (“OKX”) are not in any way associated with the owner or operator of the TPW. You agree that OKX is not responsible or liable for any loss, damage and any other consequences arising from your use of the TPW. Please be aware that using a TPW may result in a loss or diminution of your assets. Product may not be available in all jurisdictions.

USDT calculator

USDUSD
USDTUSDT