Trading Glass
FeaturesPricingAcademyBlogChartJournal
Loading
All Courses
Order Flow FoundationsUnderstanding Depth of MarketCumulative DeltaUsing Footprint ChartsAbsorption, Imbalance & InitiativeSpoofing, Stacking & Iceberg OrdersOrder Flow Confirmation
Academy/Execution Precision/Order Flow

Spoofing, Stacking & Iceberg Orders

Execution Precision

8 min read

Detect manipulation patterns including spoofing, order stacking, and hidden iceberg orders that distort the visible order book.

Loading

Related Lessons

Order Flow Foundations

10 min

Understanding Depth of Market

8 min

Cumulative Delta

8 min

Using Footprint Charts

8 min

Previous Lesson

Absorption, Imbalance & Initiative

Next Lesson

Order Flow Confirmation

Trading Glass

Next-generation charting order flow platform with rotation view, cluster visualization, and real-time analytics for professional traders and quantitative analysts.

Product

  • Features
  • Pricing
  • Chart
  • Journal

Resources

  • Academy
  • Blog
  • Documentation
  • API Reference
  • Support

Company

  • About
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 Trading Glass. All rights reserved.

PrivacyTerms

Not everything you see in the order book is real. Some orders are placed to deceive, others are hidden entirely. Distinguishing genuine liquidity from manipulation is a survival skill in crypto markets.


The Manipulation Landscape

Crypto order books are a battleground of information. Large participants use their capital not only to execute trades but to influence the behavior of other traders. Three common tactics -- spoofing, stacking, and iceberg orders -- exploit the visibility of the order book to create false impressions of supply and demand.

Understanding these tactics does not require you to trade against them. It requires you to stop being fooled by them.


Spoofing: The Phantom Wall

Spoofing is the act of placing a large limit order with no intention of it being filled. The order creates the appearance of significant demand or supply at a price level, influencing other participants to act on that false information. The spoofer then cancels the order before it can be executed.

How Spoofing Works

  1. A trader places a 200 BTC buy wall at $93,000 while BTC trades at $93,300
  2. Other market participants see the wall and interpret it as strong support
  3. Some traders buy BTC expecting the wall to hold, pushing price up slightly
  4. The spoofer sells into the buying pressure at $93,400
  5. The 200 BTC bid at $93,000 is canceled -- it was never meant to be filled

Identifying Spoofing in Real Time

Red FlagWhat You See
Sudden appearanceLarge order materializes out of nowhere at a level with no prior interest
Distance from priceOrder sits 5-15 ticks away from current price, close enough to be visible but far enough to avoid fills
Cancellation patternOrder is pulled or reduced as price approaches within 2-3 ticks
ReappearanceAfter cancellation, a similar-sized order appears at a new level further away
Size mismatchThe order is 10-50x larger than anything else on the book at surrounding levels
Do Not Trade the Wall

Never enter a trade solely because you see a large resting order. The order may not be there when price arrives. Wait for actual trade prints at that level to confirm the order is genuine. Absorption visible on the tape is the only reliable confirmation.


Stacking: Layered Deception

Stacking (also called layering) is a more sophisticated version of spoofing. Instead of placing one large order, the manipulator places multiple smaller orders across several price levels to create the illusion of deep, broad liquidity.

How Stacking Differs From Genuine Depth

Genuine depth builds gradually over time as multiple independent participants place orders. It tends to be uneven -- some levels have more, some less -- reflecting organic market interest.

Stacked orders appear suddenly across multiple consecutive levels, often in suspiciously uniform sizes. They create a wall that looks like broad consensus but is actually one participant.

Stacking Example on BTC/USDT

BTC trades at $94,000. Within a 10-second window, the following sell orders appear:

PriceSize (BTC)
$94,20025.0
$94,25025.0
$94,30025.0
$94,35025.0
$94,40025.0

Five levels, identical size, placed simultaneously. This pattern is almost certainly a single participant layering offers to create the impression of heavy overhead supply. The goal is to discourage buying and push price down so the stacker can accumulate at lower prices.

Speed of Placement

The key tell for stacking is the speed and uniformity of order placement. If five levels of similar size appear within seconds, that is not five independent sellers arriving at the same time. Cross-reference with the time and sales -- if no trades are printing at those levels, the orders are likely decorative.


Interactive: Order Book Depth

Watch how the bid-ask depth display changes as large orders appear and disappear. In live markets, this shifting is constant -- the static snapshot you see is always a momentary view.

Order Book Depth
2.02.96.05.67.48.08.88.29.210.812.912.112.413.714.13.34.15.97.37.17.09.88.58.711.510.511.113.813.014.5Mid PriceBidsAsks
Bid/Ask Ratio: 50% / 50%Neutral

Iceberg Orders: Hidden Size

An iceberg order is the opposite of spoofing. Instead of displaying false size, an iceberg hides real size. Only a small portion of the total order is visible on the book at any time. As the visible portion is filled, a new slice automatically appears.

How Iceberg Orders Work

A large buyer wants to accumulate 500 BTC at $93,200. Displaying the full 500 BTC would signal their intent to the market and cause price to run away. Instead, they place an iceberg order that shows only 5 BTC at a time. Each time those 5 BTC are filled, another 5 BTC appears.

Identifying Iceberg Orders

SignalWhat You See
Refilling ordersA modest-sized order at a price level gets filled, and an identical order instantly reappears
Persistent levelPrice hits a level repeatedly but cannot break through despite the visible order being small
Tape evidenceContinuous trade prints at the same price, total traded volume far exceeds what was visible on the book
Disproportionate absorptionThe footprint shows enormous volume at a level that appeared to have only a few BTC of resting orders

BTC/USDT example: BTC drops to $93,200. The book shows only 3 BTC of bids at that level. Price touches $93,200 and 3 BTC trade, but immediately another 3 BTC appears. This happens 15 times over two minutes. The tape shows 45 BTC was bought at $93,200, but the book never showed more than 3 BTC. That is an iceberg bid -- a large buyer hiding their true size.

Icebergs Are Bullish or Bearish Signals

Unlike spoofing, iceberg orders represent real capital with real intent. An iceberg bid is a strong bullish signal -- someone is committed to accumulating at that price and is willing to absorb all selling. An iceberg ask is a strong bearish signal for the same reason. Finding icebergs is finding genuine institutional activity.


Protecting Yourself

Navigating a manipulated order book requires a disciplined approach. Follow these principles:

1. Trust the Tape Over the Book

The order book shows intent, which can be faked. The tape (time and sales) shows completed transactions, which cannot be faked. When the book and the tape disagree, trust the tape.

2. Verify Walls Before Trading Them

If you see a large bid wall and want to go long expecting support, wait for price to actually touch the wall and for trade prints to confirm the order is being filled. A wall that pulls before contact is a spoof.

3. Watch for Iceberg Footprints

When a level repeatedly refills after being filled, you have likely found an iceberg. These are among the most reliable order flow signals because they represent committed, hidden capital.

4. Use Volume Profile for Confirmation

If a price level shows heavy DOM activity and historical volume profile interest, the signal is stronger. Manipulation is harder to sustain at levels where many independent participants have historical interest.

5. Reduce Size in Thin Books

Spoofing and manipulation are most effective in thin order books where a single participant can represent a large share of total depth. During off-hours or low-volume periods, treat all large orders with extra skepticism.


Common Manipulation Sequences

Manipulation tactics are often chained together in sequences:

  1. Stack asks above current price to create the impression of overhead supply
  2. Spoof bids below to create false support, drawing in longs
  3. Pull the bids once longs are committed, letting price fall through
  4. Accumulate with icebergs at the lower price while retail panics

This sequence is common around key psychological levels and liquidation zones in BTC/USDT.


Key Takeaways

  • Spoofing uses visible but fake orders to create false impressions of supply or demand -- these orders are canceled before they can be filled
  • Stacking layers multiple orders across levels for the same deceptive purpose, distinguished by simultaneous placement and uniform sizing
  • Iceberg orders hide real size, showing only small slices that refill automatically -- finding an iceberg means finding genuine institutional commitment
  • The tape (actual executed trades) is always more reliable than the book (resting orders that may be canceled)
  • Thin order books are more susceptible to manipulation; increase skepticism during low-volume periods
  • Combine DOM readings with tape, footprint, and volume profile for a manipulation-resistant view of the market