Content
Initial account verification and Know Your Customer process
When you register on kings128, we collect your email, phone number, and a password. This creates your login credential. But before you can fund your account or access live-dealer tables, we conduct a Know Your Customer (KYC) verification. This is a standard security requirement across regulated platforms.
The KYC process on kings128 asks for three pieces of information: your full legal name (as it appears on your ID), your date of birth, and your address. You then upload a government-issued ID—such as a national identity card, passport, or driver's license—and a proof of address (utility bill, bank statement, or official letter). We verify these documents within standard business windows, typically within one business day. Once verified, you're cleared to deposit, access tables, and withdraw funds.
We store these documents securely and only use them for verification and regulatory compliance. We don't sell your data to third parties, and we follow strict data-protection protocols aligned with applicable law in supported jurisdictions.



Password security and credential management
Your password is the first barrier to your account. We recommend using a unique password for kings128—one you don't use elsewhere. Strong passwords contain a mix of uppercase and lowercase letters, numbers, and symbols, and are at least 12 characters long. Avoid common words, birthdates, or sequences that are easy to guess.
On kings128, you can update your password at any time from your account settings. If you forget your password, we offer a recovery flow: you verify your email or phone number, then set a new password. This process typically completes within minutes. Never share your password with anyone, and if you suspect someone has accessed your account, change your password immediately and contact our support team.
Key takeaways
- KYC verification confirms your identity before you can deposit or withdraw
- Use a strong, unique password for your kings128 account
- Two-factor authentication adds a second layer of protection via phone or email
- Monitor your account activity regularly through your transaction history
- Contact support immediately if you notice unusual activity or suspect compromise
Two-factor authentication and additional security options
Two-factor authentication (2FA) requires a second verification step when you log in. On kings128, you can enable 2FA via email or phone. Once activated, logging in from a new device or browser asks you to confirm your identity using a code sent to your email or phone number. This prevents someone from accessing your account even if they know your password.
We recommend enabling 2FA if you access kings128 from multiple devices or if you regularly fund and withdraw funds. The additional step takes seconds but significantly reduces account-takeover risk. You can manage 2FA settings from your account security page, toggling it on or off as needed.
Payment method security and deposit protection
On kings128, deposits route through trusted payment partners: DANA, e-wallet, mobile banking, local payment, online payment, e-wallet, and bank transfers via mobile banking, local payment, online payment, and e-wallet. Each of these partners maintains their own security protocols. When you deposit, your payment credentials are handled directly by the payment provider—we never store your full bank details or card numbers.
Your deposit history is visible in your account dashboard. You can filter by date, payment method, and amount. If a deposit fails or doesn't reflect in your account within the expected window, you can contact our support team with the transaction ID. We'll investigate and ensure the funds are reconciled or refunded to your original payment method.
Monitoring and fraud detection
Our systems monitor all account activity around the clock. We track login patterns, deposit and withdrawal amounts, and table behaviour to detect anomalies. If we identify unusual activity—such as logins from a new country, sudden large deposits, or rapid withdrawal attempts—we may temporarily suspend the account and contact you via email or phone to verify the activity.
This protection works in your favour. If a third party gains unauthorised access to your account, our fraud-detection system typically flags it within minutes. Once you confirm the activity is unauthorised, we can reverse recent transactions, reset your credentials, and help you regain full control.
Account security isn't a single gate—it's a continuous process of verification, encryption, and monitoring that runs behind the scenes every time you access kings128.
Account recovery and support escalation
If you lose access to your account—due to a forgotten password, a compromised email address, or a phone number change—our support team can help restore access. Contact us via live chat (available during peak hours, typically 8am–11pm Jakarta time), email, or phone. Have your registered email or phone number available, and be prepared to verify your identity through a series of security questions or by submitting ID documentation.
Recovery usually takes between one and three business days, depending on the nature of the access loss and the verification method. Our support team responds in both Indonesian and English. If your account has been compromised and funds have been withdrawn unauthorised, we initiate a separate investigation and work with payment providers to attempt recovery.

Regional considerations and support across cities
Our support team operates across multiple time zones. If you're in Jakarta, Surabaya, Bandung, Medan, or Semarang, you can reach us during local business hours via multiple channels. We maintain language support in both Indonesian and English. Email inquiries are typically answered within one business day; phone support during peak hours (8am–11pm) usually responds within subject to verification.
We recognise that account security concerns often require urgent attention. For immediate threats—such as a suspected ongoing breach—our live chat team can escalate your case to a security specialist. Documentation is maintained for all interactions, so you have a clear record of what actions were taken and when.
