Skip to content
Home Seqlense DOC Seqlense MABU Seqlense Notes Seqlense IMMO Crypto Investigation OSINT Investigation Training & Advisory Pricing Supported Chains Blog Newsletter Contact My Seqlense Get Started
Seqlense MABU

Market Abuse Detection
for Crypto

Regulatory‑grade market abuse detection designed for crypto‑asset service providers under MiCA and ESMA RTS. Monitor on‑chain activity to detect, explain and document abusive behaviors in a compliant, audit‑ready workflow.

Built for compliance teams, regulators and developers — hosted in Europe.

How Seqlense MABU Works

A structured, auditable workflow. Each step transforms raw on‑chain activity into actionable, regulator‑ready evidence.

01

Scan Request

A scan is initiated by the compliance team or automatically triggered by predefined workflows. Requests can originate from API calls, internal dashboards, or transaction-based events such as customer withdrawals or deposits. This step defines the scope of analysis, the wallets involved, and any specific risk parameters to consider.

02

Data Ingestion

MABU ingests on-chain data in real time or batch mode, collecting transactions, token transfers, smart contract interactions, and counterparty activity across supported blockchains. Data is sourced from Seqlense's proprietary blockchain indexer and enriched with third-party market data feeds where applicable. This data lake is available at intel.seqlense.com.

03

Normalization & Contextualization

Raw blockchain data is normalized and enriched. Wallets are clustered, transaction sequences are reconstructed, and market context such as liquidity, timing, and known entities is applied. Transactions are never analyzed in isolation.

04

Behavioral Analysis

MABU establishes behavioral baselines for wallets and groups, identifying deviations, coordination patterns, and abnormal activity over time. This step focuses on behavior, not individual transactions.

05

Abuse Detection Engine

Detected behaviors are evaluated through a combination of rule-based detection aligned with MiCA and ESMA RTS, and statistical or behavioral models designed to reduce false positives while remaining fully explainable.

06

Alert & Case Management

When a risk threshold is met, alerts are generated with clear reasoning, timelines, and supporting evidence. Compliance analysts can review, comment, escalate, or close cases within a structured workflow — via the web interface or integrated into existing systems through APIs.

07

Reporting & Regulatory Evidence

All findings are consolidated into audit-ready outputs, including STOR-compatible reports, evidence packs, and immutable audit trails. This ensures full traceability and regulatory defensibility.

Types of Market Abuse Detected

A combination of regulatory rule sets and behavioral analysis covering the full spectrum of on-chain market abuse.

Insider Trading

Detection of abnormal trading behavior potentially linked to the use of non-public or privileged information.

On-chain Behavioral MiCA-aligned

Wash Trading

Identification of artificial trading volume generated through self-trading or controlled counterparties.

On-chain Rule-based Market Integrity

Pump & Dump

Detection of rapid price inflation followed by coordinated sell-offs across multiple wallets or entities.

On-chain Pattern detection Behavioral

Smurfing

Identification of fund fragmentation across multiple wallets to disguise transaction intent or avoid detection thresholds.

On-chain Transaction analysis Risk-based

AI Behavioral Clustering

Advanced clustering analysis to identify coordinated wallet behavior, hidden relationships, and emerging manipulation patterns.

AI-driven Behavioral Explainable

Detection methods combine deterministic regulatory rules with behavioral and AI-assisted analysis to ensure explainability, auditability, and reduced false positives.

Architecture & Integration

Fully managed SaaS platform. Fast, secure, and compatible with existing compliance workflows.

Fully Managed SaaS

All scanning, analysis, detection, and alerting processes are handled within the Seqlense infrastructure hosted in Europe — ensuring consistent updates, regulatory alignment, and operational reliability.

API Integration

Organizations integrate MABU through secure REST APIs. Transaction data, wallet addresses, or activity scopes are submitted programmatically. MABU analyzes continuously and triggers alerts when potential abuse is detected.

Web Interface

Submit scans and review alerts directly through the Seqlense web interface. Manual investigations, case management, and reporting without requiring any technical integration.

Unified Processing API or web — same analysis pipeline
Real-Time Alerting Automatic alerts when thresholds are met
No On-Premise SaaS only — zero local installation
Secure & Scalable Auto-scaling with strict data segregation

Who is MABU For?

Designed for organizations subject to market abuse monitoring obligations under MiCA and related European regulatory frameworks.

Crypto Exchanges & Trading Platforms

Continuous monitoring of on-chain inflows and outflows. Detection of insider trading, wash trading, and pump & dump patterns. Audit-ready evidence for incident escalation and reporting.

Custodians & Wallet Providers

Monitoring of customer deposits and withdrawals. Detection of abnormal wallet behavior and fund fragmentation. Reduced exposure to indirect market abuse risks.

Brokers & Intermediaries

Risk-based monitoring aligned with MiCA obligations. Automated detection without manual transaction review. Consistent compliance workflows across services.

Compliance & Risk Teams

Clear alerts with contextual evidence. Structured case management and decision tracking. Regulatory-ready reporting and audit trails.

MiCA Market Abuse Coverage

Mapping MiCA market abuse monitoring expectations to current MABU capabilities — detection, analysis, alerting, and investigation support.

MiCA Requirement Regulatory Expectation MABU Coverage
Market Abuse Signal Detection Identify and monitor indicators of potential market abuse on an ongoing basis. Continuous on-chain monitoring using behavioral analysis and rule-based detection models.
Insider Trading Indicators Identification of transactions potentially executed using inside or non-public information. Detection of abnormal pre-event trading behavior, wallet deviations, and temporal correlation patterns.
Market Manipulation Practices Detection of manipulative behaviors affecting price formation or market integrity. Identification of wash trading, pump & dump patterns, and coordinated wallet activity.
Transaction Structuring Identification of fragmented transactions intended to bypass monitoring thresholds. Wallet clustering, transaction splitting analysis, and cross-wallet behavioral linkage.
Monitoring & Alerting Ongoing surveillance mechanisms and timely alerts when risks are identified. Automated alert generation, risk scoring, and analyst review workflows.
Investigation & Traceability Ability to justify decisions, reconstruct events, and maintain traceable investigation records. Evidence timelines, decision logs, and immutable audit trails supporting internal investigations.

This coverage focuses on detection and investigation support. Reporting obligations should be assessed per each organization's internal compliance procedures.

Ready to monitor on-chain activity?

Get started with MABU — API, webhook, or managed onboarding.