- High liquidity utilisation of an underlying market.
- Unusually high amount of liquidations in an underlying protocol.
- Unusual asset movements, especially in large quantities, within and underlying market or marketplace.
- Suspected attack patterns in newly deployed on-chain code.

