schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104074",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "high",
"timestamp": "2026-01-03T19:54:00Z",
"trace_id": "1ef17338-7b1d-be9e-85d9-f2c4938e5025"
} | {
"account_age_days": 1400,
"account_id": "ACCT-442DEFEF6BAA",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.747
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 949,
"timestamp": "2026-01-03T19:54:00Z",
"transaction_amount_usd": 1114294.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.7,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 313139.25,
"financial_exposure_usd": 315899.01,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105005",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-04T11:25:00Z",
"trace_id": "c0141788-eb14-a4b7-3a02-e05832cde6f9"
} | {
"account_age_days": 1320,
"account_id": "ACCT-BB6B341E91E3",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_1",
"session_entropy": 0.412
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 418,
"timestamp": "2026-01-04T11:25:00Z",
"transaction_amount_usd": 2749578.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.83,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1096285.27,
"financial_exposure_usd": 1107574.37,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107922",
"label": "benign",
"label_confidence": 0.592,
"severity": "high",
"timestamp": "2026-01-06T12:02:00Z",
"trace_id": "099b6bc2-0148-ef21-d08d-90f007fccc1c"
} | {
"account_age_days": 1307,
"account_id": "ACCT-18C135820262",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.603
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 960,
"timestamp": "2026-01-06T12:02:00Z",
"transaction_amount_usd": 3037.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.561,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3656.83,
"financial_exposure_usd": 4780.76,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109683",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-07T17:23:00Z",
"trace_id": "012e38af-a129-63ec-74d2-7058b51e0552"
} | {
"account_age_days": 618,
"account_id": "ACCT-AFB944006F79",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.536
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 282,
"timestamp": "2026-01-07T17:23:00Z",
"transaction_amount_usd": 13646.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1074.12,
"financial_exposure_usd": 2492.24,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104168",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-03T21:28:00Z",
"trace_id": "e5f62f1e-8cc1-2d6b-127d-df5a403587f2"
} | {
"account_age_days": 1785,
"account_id": "ACCT-19B6AC5AE911",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_2",
"session_entropy": 0.184
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 106,
"timestamp": "2026-01-03T21:28:00Z",
"transaction_amount_usd": 1066105.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.559,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2008805.09,
"financial_exposure_usd": 2560565.43,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102579",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "high",
"timestamp": "2026-01-02T18:59:00Z",
"trace_id": "572451b9-ba5a-6f89-5c0f-b26cd5027181"
} | {
"account_age_days": 958,
"account_id": "ACCT-E382E84FD57E",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.867
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 324,
"timestamp": "2026-01-02T09:34:00Z",
"transaction_amount_usd": 0.17
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.419,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 667142.52,
"financial_exposure_usd": 1002917.86,
"recoverable_pct": 0.05
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104932",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "low",
"timestamp": "2026-01-04T10:12:00Z",
"trace_id": "2e36b3ca-32bc-ee87-c492-e92c3fc84161"
} | {
"account_age_days": 965,
"account_id": "ACCT-95ADD8CF0223",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_3",
"session_entropy": 0.641
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 269,
"timestamp": "2026-01-04T03:23:00Z",
"transaction_amount_usd": 13.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.436,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3312825.57,
"financial_exposure_usd": 3455103.57,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109583",
"label": "benign",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-07T15:43:00Z",
"trace_id": "0dec51db-8b9d-3684-90d8-89a3e85aa605"
} | {
"account_age_days": 1268,
"account_id": "ACCT-8369CBF3AD9F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.126
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 313,
"timestamp": "2026-01-07T09:07:00Z",
"transaction_amount_usd": 0.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3716.15,
"financial_exposure_usd": 5123.07,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100912",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "medium",
"timestamp": "2026-01-01T15:12:00Z",
"trace_id": "b780e78c-bad4-af4d-f837-b71d323ab634"
} | {
"account_age_days": 690,
"account_id": "ACCT-8A6D942542DF",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.54
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 275,
"timestamp": "2026-01-01T15:12:00Z",
"transaction_amount_usd": 53217.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 699792.68,
"financial_exposure_usd": 1106929.08,
"recoverable_pct": 0.043
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103818",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-03T15:38:00Z",
"trace_id": "14dd358f-0138-efc9-5c63-569f05c97399"
} | {
"account_age_days": 700,
"account_id": "ACCT-32FDB86C74ED",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 147,
"timestamp": "2026-01-03T13:43:00Z",
"transaction_amount_usd": 19.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.591,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2683434.62,
"financial_exposure_usd": 6457189.18,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102928",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-03T00:48:00Z",
"trace_id": "9347a8ef-0e50-4b85-1e71-ba9126c650eb"
} | {
"account_age_days": 745,
"account_id": "ACCT-1D1A45F41613",
"baseline_risk_score": 0.537,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 313,
"timestamp": "2026-01-03T00:48:00Z",
"transaction_amount_usd": 27227
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 128873.98,
"financial_exposure_usd": 216877.14,
"recoverable_pct": 0.091
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100356",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "critical",
"timestamp": "2026-01-01T05:56:00Z",
"trace_id": "aeec5022-4a8a-2052-21fe-af01db181333"
} | {
"account_age_days": 1689,
"account_id": "ACCT-6EEA050DC529",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_3",
"session_entropy": 0.642
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 438,
"timestamp": "2026-01-01T05:56:00Z",
"transaction_amount_usd": 50059.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.708,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 15143.21,
"financial_exposure_usd": 31485.53,
"recoverable_pct": 0.232
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106817",
"label": "benign",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-05T17:37:00Z",
"trace_id": "663cadd9-a330-2c85-a265-367582372aee"
} | {
"account_age_days": 1351,
"account_id": "ACCT-27EEDEBDFA92",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.577
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 244,
"timestamp": "2026-01-05T14:27:00Z",
"transaction_amount_usd": 20.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2808.54,
"financial_exposure_usd": 2848.7,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105715",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-04T23:15:00Z",
"trace_id": "02e1eb5a-e428-575f-3376-e8b0ee9e88d8"
} | {
"account_age_days": 1350,
"account_id": "ACCT-781EE199582D",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 484,
"timestamp": "2026-01-04T23:15:00Z",
"transaction_amount_usd": 1503245.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.441,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3090476.86,
"financial_exposure_usd": 5115569.17,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105057",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-04T12:17:00Z",
"trace_id": "2fc8a9f2-32e9-0965-a9da-0b5a5b564a57"
} | {
"account_age_days": 1943,
"account_id": "ACCT-DE7227DA1BAD",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_2",
"session_entropy": 0.54
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 112,
"timestamp": "2026-01-04T10:16:00Z",
"transaction_amount_usd": 20.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1609390.43,
"financial_exposure_usd": 1823972.35,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105362",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "critical",
"timestamp": "2026-01-04T17:22:00Z",
"trace_id": "0d153fa1-ddc2-61d0-b90b-5f35e8f5fd3b"
} | {
"account_age_days": 433,
"account_id": "ACCT-52D4DDC4482A",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.774
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 170,
"timestamp": "2026-01-04T13:07:00Z",
"transaction_amount_usd": 21.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.481,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7398249.43,
"financial_exposure_usd": 8152201.99,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101426",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-01T23:46:00Z",
"trace_id": "20d0d7a4-9101-0ea3-6a97-593c700c0df7"
} | {
"account_age_days": 1802,
"account_id": "ACCT-3DC25C01BE16",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_1",
"session_entropy": 0.506
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 759,
"timestamp": "2026-01-01T23:46:00Z",
"transaction_amount_usd": 39412.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 541227.86,
"financial_exposure_usd": 647403.23,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101337",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-01T22:17:00Z",
"trace_id": "31b5302e-8dc2-5101-e994-1e410b29cdf6"
} | {
"account_age_days": 1152,
"account_id": "ACCT-83650D7235AB",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_2",
"session_entropy": 0.873
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 344,
"timestamp": "2026-01-01T22:17:00Z",
"transaction_amount_usd": 8672.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.571,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 242031.54,
"financial_exposure_usd": 319905.93,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109002",
"label": "benign",
"label_confidence": 0.625,
"severity": "low",
"timestamp": "2026-01-07T06:02:00Z",
"trace_id": "fec34a3a-32a0-e65a-bcd6-91e1423c2a2b"
} | {
"account_age_days": 973,
"account_id": "ACCT-EE06150E3D77",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.832
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 393,
"timestamp": "2026-01-07T03:55:00Z",
"transaction_amount_usd": 23.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2315.04,
"financial_exposure_usd": 4454.06,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103762",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-03T14:42:00Z",
"trace_id": "668cf25e-941b-30fb-ff7f-70529bf343a9"
} | {
"account_age_days": 701,
"account_id": "ACCT-FAFC6ACFFE70",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_3",
"session_entropy": 0.842
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 467,
"timestamp": "2026-01-03T14:42:00Z",
"transaction_amount_usd": 945145.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.61,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 836229.52,
"financial_exposure_usd": 1049462.56,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106629",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-05T14:29:00Z",
"trace_id": "1615707e-40c4-56b6-ff84-bcd50420b02e"
} | {
"account_age_days": 784,
"account_id": "ACCT-9B454865E141",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_3",
"session_entropy": 0.69
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 251,
"timestamp": "2026-01-05T08:55:00Z",
"transaction_amount_usd": 11.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.488,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4709477.47,
"financial_exposure_usd": 5278930.23,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102946",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-03T01:06:00Z",
"trace_id": "300d372f-de4a-1bb5-c3bf-d9ebee767c5d"
} | {
"account_age_days": 1839,
"account_id": "ACCT-F440C0D229D1",
"baseline_risk_score": 0.457,
"kyc_tier": "tier_2",
"session_entropy": 0.133
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 259,
"timestamp": "2026-01-03T01:06:00Z",
"transaction_amount_usd": 119139.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1052564.14,
"financial_exposure_usd": 1073954.9,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105233",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-04T15:13:00Z",
"trace_id": "a317d4d2-8882-3df5-0f87-dc3e26bcb46c"
} | {
"account_age_days": 780,
"account_id": "ACCT-B04B43BB18CF",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.433
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 708,
"timestamp": "2026-01-04T15:13:00Z",
"transaction_amount_usd": 916238.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4457071.1,
"financial_exposure_usd": 4706581.04,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101446",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-02T00:06:00Z",
"trace_id": "4554b93f-97fa-1eb7-dfad-bf644afd1cec"
} | {
"account_age_days": 243,
"account_id": "ACCT-9B400B572BE7",
"baseline_risk_score": 0.507,
"kyc_tier": "tier_3",
"session_entropy": 0.226
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 99,
"timestamp": "2026-01-02T00:06:00Z",
"transaction_amount_usd": 96038.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 451673.01,
"financial_exposure_usd": 704675.96,
"recoverable_pct": 0.376
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106418",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "critical",
"timestamp": "2026-01-05T10:58:00Z",
"trace_id": "95d60879-0367-291d-d870-e811653872d0"
} | {
"account_age_days": 162,
"account_id": "ACCT-F5BBCF0E1D4B",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.26
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 174,
"timestamp": "2026-01-05T07:28:00Z",
"transaction_amount_usd": 1.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.851,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4811052.68,
"financial_exposure_usd": 6190266.85,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106839",
"label": "benign",
"label_confidence": 0.664,
"severity": "low",
"timestamp": "2026-01-05T17:59:00Z",
"trace_id": "8cc8b867-0f07-8b0d-ff5c-ea3854e20ffc"
} | {
"account_age_days": 1778,
"account_id": "ACCT-E2EF6B724628",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.818
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 234,
"timestamp": "2026-01-05T07:06:00Z",
"transaction_amount_usd": 8.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.8,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 2597.28,
"financial_exposure_usd": 5106.19,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103209",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-03T05:29:00Z",
"trace_id": "ea842011-7ae0-69f5-9160-ebec29ac34a2"
} | {
"account_age_days": 1907,
"account_id": "ACCT-365D98650194",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_1",
"session_entropy": 0.312
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 523,
"timestamp": "2026-01-03T05:29:00Z",
"transaction_amount_usd": 19946.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.722,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 746027.35,
"financial_exposure_usd": 787009.23,
"recoverable_pct": 0.213
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102879",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-02T23:59:00Z",
"trace_id": "345096f1-4d1d-cf2a-5e63-51b09c862610"
} | {
"account_age_days": 843,
"account_id": "ACCT-B693076C690E",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_3",
"session_entropy": 0.505
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 806,
"timestamp": "2026-01-02T23:59:00Z",
"transaction_amount_usd": 113831.97
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.801,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 531762.87,
"financial_exposure_usd": 810309.16,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107672",
"label": "benign",
"label_confidence": 0.493,
"severity": "low",
"timestamp": "2026-01-06T07:52:00Z",
"trace_id": "d794d1b1-7783-2837-7d97-45e57cc2e637"
} | {
"account_age_days": 1578,
"account_id": "ACCT-1411C895E42B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.556
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 888,
"timestamp": "2026-01-06T07:52:00Z",
"transaction_amount_usd": 13773.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 64.02,
"financial_exposure_usd": 64.46,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107981",
"label": "benign",
"label_confidence": 0.522,
"severity": "medium",
"timestamp": "2026-01-06T13:01:00Z",
"trace_id": "54934cc9-dde5-fd53-f937-0eb3352ca254"
} | {
"account_age_days": 1613,
"account_id": "ACCT-BDEFEB2CD2BE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 258,
"timestamp": "2026-01-06T06:20:00Z",
"transaction_amount_usd": 1.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.523,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2873.27,
"financial_exposure_usd": 4180.64,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109224",
"label": "benign",
"label_confidence": 0.731,
"severity": "low",
"timestamp": "2026-01-07T09:44:00Z",
"trace_id": "4636d35a-3b96-c657-05b3-fd30962cab8a"
} | {
"account_age_days": 1723,
"account_id": "ACCT-E75DB7629977",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.477
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 808,
"timestamp": "2026-01-07T09:44:00Z",
"transaction_amount_usd": 6085.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1721.67,
"financial_exposure_usd": 2897.42,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104228",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-03T22:28:00Z",
"trace_id": "e52b321e-5546-d113-0ac6-9618da261582"
} | {
"account_age_days": 1809,
"account_id": "ACCT-2A572DB45CCF",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 587,
"timestamp": "2026-01-03T22:28:00Z",
"transaction_amount_usd": 1789463.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.458,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3556372.5,
"financial_exposure_usd": 4282186.08,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106797",
"label": "benign",
"label_confidence": 0.488,
"severity": "medium",
"timestamp": "2026-01-05T17:17:00Z",
"trace_id": "f26a58c2-5641-327a-6928-5b7e17c72d86"
} | {
"account_age_days": 1460,
"account_id": "ACCT-B6DEC3971E53",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.802
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 435,
"timestamp": "2026-01-05T17:17:00Z",
"transaction_amount_usd": 7570.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1973.47,
"financial_exposure_usd": 2424.9,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105800",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-05T00:40:00Z",
"trace_id": "b1c52f6d-df30-0a55-7aa4-ebcd9e254296"
} | {
"account_age_days": 1448,
"account_id": "ACCT-F299EF0E72B8",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.903
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1014,
"timestamp": "2026-01-05T00:40:00Z",
"transaction_amount_usd": 1484159.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2639378.13,
"financial_exposure_usd": 5543878.42,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105841",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "low",
"timestamp": "2026-01-05T01:21:00Z",
"trace_id": "f1421407-963e-26b4-dca7-b94521d43f11"
} | {
"account_age_days": 605,
"account_id": "ACCT-FF4250AAD7C5",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.168
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1058,
"timestamp": "2026-01-05T01:21:00Z",
"transaction_amount_usd": 2430216.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4473272.69,
"financial_exposure_usd": 5246291.96,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105671",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-04T22:31:00Z",
"trace_id": "691a91a4-d991-2d4b-20d7-a6bd95e4fb60"
} | {
"account_age_days": 1286,
"account_id": "ACCT-816C8191DD97",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 243,
"timestamp": "2026-01-04T11:52:00Z",
"transaction_amount_usd": 13.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.682,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2238794.51,
"financial_exposure_usd": 3843005.18,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103447",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "low",
"timestamp": "2026-01-03T09:27:00Z",
"trace_id": "04575184-0e13-cceb-edea-a00db6a807ad"
} | {
"account_age_days": 612,
"account_id": "ACCT-3FEE4D4D44D3",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_2",
"session_entropy": 0.669
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 610,
"timestamp": "2026-01-03T09:27:00Z",
"transaction_amount_usd": 1122506.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.741,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2179742.78,
"financial_exposure_usd": 3660006.46,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107297",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-06T01:37:00Z",
"trace_id": "cc9a6399-7109-dfe6-78d4-f834bd41d790"
} | {
"account_age_days": 1978,
"account_id": "ACCT-3FF3AC95C727",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.49
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 370,
"timestamp": "2026-01-06T01:37:00Z",
"transaction_amount_usd": 13155.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 625.21,
"financial_exposure_usd": 1438.34,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102223",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-02T13:03:00Z",
"trace_id": "7ca8e1ae-1f4a-482f-3297-03c45880ac39"
} | {
"account_age_days": 490,
"account_id": "ACCT-C2CA0E310B4F",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_2",
"session_entropy": 0.523
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 157,
"timestamp": "2026-01-02T13:03:00Z",
"transaction_amount_usd": 41265.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.533,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 532692.68,
"financial_exposure_usd": 828055.8,
"recoverable_pct": 0.267
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105203",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "medium",
"timestamp": "2026-01-04T14:43:00Z",
"trace_id": "58ba9361-fe10-27b6-6162-c583a0c532cc"
} | {
"account_age_days": 1684,
"account_id": "ACCT-A8F0D58AF133",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 576,
"timestamp": "2026-01-04T14:43:00Z",
"transaction_amount_usd": 1548285.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3933634.74,
"financial_exposure_usd": 6973328.73,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107454",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-06T04:14:00Z",
"trace_id": "1a2692af-4b3d-4c27-66e7-978fb01f90a8"
} | {
"account_age_days": 1510,
"account_id": "ACCT-B3D2CAF3E714",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 720,
"timestamp": "2026-01-06T04:14:00Z",
"transaction_amount_usd": 3877.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.519,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5443.04,
"financial_exposure_usd": 5567.01,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106840",
"label": "benign",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-05T18:00:00Z",
"trace_id": "ec110553-f742-4cac-bd45-b3fe43778a7d"
} | {
"account_age_days": 1339,
"account_id": "ACCT-D03272447593",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.365
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 678,
"timestamp": "2026-01-05T18:00:00Z",
"transaction_amount_usd": 10951.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1061.84,
"financial_exposure_usd": 1532.98,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108561",
"label": "benign",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-06T22:41:00Z",
"trace_id": "3004190b-7e8a-1992-028a-f05dafec0e25"
} | {
"account_age_days": 153,
"account_id": "ACCT-C3E9609C0D74",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.436
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 194,
"timestamp": "2026-01-06T11:43:00Z",
"transaction_amount_usd": 9.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.732,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 695.13,
"financial_exposure_usd": 850.78,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105765",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "critical",
"timestamp": "2026-01-05T00:05:00Z",
"trace_id": "b93734b8-a16b-b6a0-ef01-b1d3670b7d02"
} | {
"account_age_days": 956,
"account_id": "ACCT-7F76707C088A",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_2",
"session_entropy": 0.447
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 326,
"timestamp": "2026-01-05T00:05:00Z",
"transaction_amount_usd": 1002420.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.482,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 583293.2,
"financial_exposure_usd": 1140414.23,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107920",
"label": "benign",
"label_confidence": 0.519,
"severity": "low",
"timestamp": "2026-01-06T12:00:00Z",
"trace_id": "b1bafb4b-7957-c659-7ce8-7ca6d36c1edb"
} | {
"account_age_days": 741,
"account_id": "ACCT-5D0428C3458D",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.673
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1147,
"timestamp": "2026-01-06T12:00:00Z",
"transaction_amount_usd": 1801.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1434.94,
"financial_exposure_usd": 2445.9,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107559",
"label": "benign",
"label_confidence": 0.546,
"severity": "medium",
"timestamp": "2026-01-06T05:59:00Z",
"trace_id": "4f4e325a-4296-73f2-2a05-47ffaa992893"
} | {
"account_age_days": 604,
"account_id": "ACCT-4EF377FED655",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 823,
"timestamp": "2026-01-06T05:59:00Z",
"transaction_amount_usd": 13222.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2100.36,
"financial_exposure_usd": 2737.41,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102711",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-02T21:11:00Z",
"trace_id": "94b6359c-fe30-912d-f507-38ca2d8f7a62"
} | {
"account_age_days": 1185,
"account_id": "ACCT-0AB4D6D00037",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 652,
"timestamp": "2026-01-02T21:11:00Z",
"transaction_amount_usd": 40826.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.581,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 532071.08,
"financial_exposure_usd": 589823.45,
"recoverable_pct": 0.149
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105891",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-05T02:11:00Z",
"trace_id": "d9eda245-3d93-ec3d-3bcb-a3214e0bb21f"
} | {
"account_age_days": 943,
"account_id": "ACCT-060F58877749",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_1",
"session_entropy": 0.482
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 519,
"timestamp": "2026-01-05T02:11:00Z",
"transaction_amount_usd": 1263484.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.802,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 217367.76,
"financial_exposure_usd": 350819.4,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105243",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-04T15:23:00Z",
"trace_id": "c2194e99-07ee-4c46-3e59-f873aaaa4f7b"
} | {
"account_age_days": 848,
"account_id": "ACCT-5E75EB9476FD",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.585
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1173,
"timestamp": "2026-01-04T15:23:00Z",
"transaction_amount_usd": 2290221.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.745,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3711535.23,
"financial_exposure_usd": 8472450.89,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101907",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "medium",
"timestamp": "2026-01-02T07:47:00Z",
"trace_id": "47e0a22a-33d1-df7a-2328-68499adc4385"
} | {
"account_age_days": 1111,
"account_id": "ACCT-9012A728A01E",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_3",
"session_entropy": 0.472
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 927,
"timestamp": "2026-01-02T07:47:00Z",
"transaction_amount_usd": 24802.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.488,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 427733.18,
"financial_exposure_usd": 511980.73,
"recoverable_pct": 0.379
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103564",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "medium",
"timestamp": "2026-01-03T11:24:00Z",
"trace_id": "29e98106-47ba-ae28-db01-123e64024538"
} | {
"account_age_days": 8,
"account_id": "ACCT-68717EDF18C7",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.391
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 594,
"timestamp": "2026-01-03T11:24:00Z",
"transaction_amount_usd": 1181274.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.408,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3761438.71,
"financial_exposure_usd": 5091522.76,
"recoverable_pct": 0.857
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107034",
"label": "benign",
"label_confidence": 0.519,
"severity": "medium",
"timestamp": "2026-01-05T21:14:00Z",
"trace_id": "742586ac-9498-3fa7-309c-8b00d7f7ad4c"
} | {
"account_age_days": 371,
"account_id": "ACCT-F5C3B0DAB8E2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.579
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 114,
"timestamp": "2026-01-05T21:14:00Z",
"transaction_amount_usd": 9805.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 968.42,
"financial_exposure_usd": 1275.39,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106160",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-05T06:40:00Z",
"trace_id": "c085559e-ea95-9adc-37f1-8cd6653255bb"
} | {
"account_age_days": 590,
"account_id": "ACCT-7D91CDC395B0",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_2",
"session_entropy": 0.792
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1063,
"timestamp": "2026-01-05T06:40:00Z",
"transaction_amount_usd": 2621902.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3694267.61,
"financial_exposure_usd": 4203712.16,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107983",
"label": "benign",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-06T13:03:00Z",
"trace_id": "db1b4554-1d41-3bdb-d746-9b34b52d4d9a"
} | {
"account_age_days": 758,
"account_id": "ACCT-8C5A866DDB4B",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_1",
"session_entropy": 0.365
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 518,
"timestamp": "2026-01-06T13:03:00Z",
"transaction_amount_usd": 2714.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 893.52,
"financial_exposure_usd": 1933.95,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109306",
"label": "benign",
"label_confidence": 0.709,
"severity": "low",
"timestamp": "2026-01-07T11:06:00Z",
"trace_id": "20242d5a-3a15-6faa-7099-40a88040dc55"
} | {
"account_age_days": 1226,
"account_id": "ACCT-2366F245BC22",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 833,
"timestamp": "2026-01-07T11:06:00Z",
"transaction_amount_usd": 12371.75
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2939.69,
"financial_exposure_usd": 2974.74,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107846",
"label": "benign",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-06T10:46:00Z",
"trace_id": "9b89b0b1-8cf1-40df-b526-df65e039ad91"
} | {
"account_age_days": 1515,
"account_id": "ACCT-4CB2FA075F4B",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_3",
"session_entropy": 0.648
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1165,
"timestamp": "2026-01-06T10:46:00Z",
"transaction_amount_usd": 11985.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1635.88,
"financial_exposure_usd": 3000.56,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105067",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-04T12:27:00Z",
"trace_id": "2a50a882-4b61-587d-c318-dc7bb3ab2106"
} | {
"account_age_days": 1158,
"account_id": "ACCT-B3DEC7F014DD",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.743
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 239,
"timestamp": "2026-01-04T05:16:00Z",
"transaction_amount_usd": 8.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.402,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1720224.51,
"financial_exposure_usd": 4261140.8,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105142",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "critical",
"timestamp": "2026-01-04T13:42:00Z",
"trace_id": "046f04b2-0001-56a3-a45b-6046cba522f9"
} | {
"account_age_days": 1366,
"account_id": "ACCT-2DE4E6FD55BA",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 537,
"timestamp": "2026-01-04T13:42:00Z",
"transaction_amount_usd": 1596217.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.776,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2702329.54,
"financial_exposure_usd": 4537995.27,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102019",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T09:39:00Z",
"trace_id": "7f0a1e21-5ab9-1f97-4ffd-fafc77c1154e"
} | {
"account_age_days": 1977,
"account_id": "ACCT-EC2F50DE8646",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_1",
"session_entropy": 0.591
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 697,
"timestamp": "2026-01-02T09:39:00Z",
"transaction_amount_usd": 111398.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.371,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 336504,
"financial_exposure_usd": 523242.33,
"recoverable_pct": 0.015
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105060",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-04T12:20:00Z",
"trace_id": "5746bc4d-dc58-211f-fae7-8a8d0335be27"
} | {
"account_age_days": 1911,
"account_id": "ACCT-CA2CDEA32C49",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.683
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 228,
"timestamp": "2026-01-04T04:24:00Z",
"transaction_amount_usd": 13.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2181612.13,
"financial_exposure_usd": 4281338.91,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104241",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "medium",
"timestamp": "2026-01-03T22:41:00Z",
"trace_id": "2eaf005b-12fe-0fc7-3253-91e05b808802"
} | {
"account_age_days": 1306,
"account_id": "ACCT-3C7B06F1613B",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_3",
"session_entropy": 0.82
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 353,
"timestamp": "2026-01-03T22:41:00Z",
"transaction_amount_usd": 1390496.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.717,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 236412.03,
"financial_exposure_usd": 480207.44,
"recoverable_pct": 0.771
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105213",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "low",
"timestamp": "2026-01-04T14:53:00Z",
"trace_id": "cfb51756-1718-c210-bd19-85735641facf"
} | {
"account_age_days": 738,
"account_id": "ACCT-1BD4B09F5053",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.123
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1045,
"timestamp": "2026-01-04T14:53:00Z",
"transaction_amount_usd": 383358.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2244867.28,
"financial_exposure_usd": 3639771.29,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105053",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "critical",
"timestamp": "2026-01-04T12:13:00Z",
"trace_id": "d73b3817-37d4-19ab-8e92-ccb71a01ecb1"
} | {
"account_age_days": 1519,
"account_id": "ACCT-32CDB3186A9E",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_1",
"session_entropy": 0.92
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 929,
"timestamp": "2026-01-04T12:13:00Z",
"transaction_amount_usd": 1317970.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7251537.91,
"financial_exposure_usd": 8107724.77,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103851",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-03T16:11:00Z",
"trace_id": "93f4576f-7337-c8c8-3223-ed1cfd91e434"
} | {
"account_age_days": 1856,
"account_id": "ACCT-478ED4530BD2",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.362
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 590,
"timestamp": "2026-01-03T16:11:00Z",
"transaction_amount_usd": 403947.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5352381.99,
"financial_exposure_usd": 6122226.14,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105923",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "critical",
"timestamp": "2026-01-05T02:43:00Z",
"trace_id": "2e4507b9-d2f6-e28b-d070-0e5b3d49013b"
} | {
"account_age_days": 1055,
"account_id": "ACCT-B53E858512D4",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.926
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 593,
"timestamp": "2026-01-05T02:43:00Z",
"transaction_amount_usd": 2331758.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2750877.31,
"financial_exposure_usd": 4591019.62,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103927",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "low",
"timestamp": "2026-01-03T17:27:00Z",
"trace_id": "9474580f-75c9-0f41-45ad-0edca452c50f"
} | {
"account_age_days": 1915,
"account_id": "ACCT-B479837DB995",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 651,
"timestamp": "2026-01-03T17:27:00Z",
"transaction_amount_usd": 2308967.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6199896.92,
"financial_exposure_usd": 6459340.06,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106296",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "low",
"timestamp": "2026-01-05T08:56:00Z",
"trace_id": "b2df208a-1fbf-de75-d4ea-6d237a260659"
} | {
"account_age_days": 1307,
"account_id": "ACCT-70CF6AFEF7FD",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_3",
"session_entropy": 0.386
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 447,
"timestamp": "2026-01-05T08:56:00Z",
"transaction_amount_usd": 1061461.11
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.505,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4167647.21,
"financial_exposure_usd": 5989520.06,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104978",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "high",
"timestamp": "2026-01-04T10:58:00Z",
"trace_id": "8d68a8a9-caa1-fbdf-0221-3da49fb6e970"
} | {
"account_age_days": 178,
"account_id": "ACCT-71605DCE2A5E",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_2",
"session_entropy": 0.156
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1011,
"timestamp": "2026-01-04T10:58:00Z",
"transaction_amount_usd": 2739148.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2045248.01,
"financial_exposure_usd": 4595133.09,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107841",
"label": "benign",
"label_confidence": 0.553,
"severity": "medium",
"timestamp": "2026-01-06T10:41:00Z",
"trace_id": "fb526299-f784-0ec4-e433-df13eceb82c4"
} | {
"account_age_days": 338,
"account_id": "ACCT-721EF15553FF",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 245,
"timestamp": "2026-01-06T07:48:00Z",
"transaction_amount_usd": 23.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.732,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1653.46,
"financial_exposure_usd": 3921.16,
"recoverable_pct": 0.854
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102492",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "critical",
"timestamp": "2026-01-02T17:32:00Z",
"trace_id": "2d78e852-b7d4-8f37-d3a4-3b0a0cfece76"
} | {
"account_age_days": 1451,
"account_id": "ACCT-3A745C29D39B",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_3",
"session_entropy": 0.942
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 818,
"timestamp": "2026-01-02T17:32:00Z",
"transaction_amount_usd": 100286.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 667237.23,
"financial_exposure_usd": 1010997.49,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102551",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-02T18:31:00Z",
"trace_id": "8d982d3f-bf42-bf33-d9e7-2766289d2e8d"
} | {
"account_age_days": 1010,
"account_id": "ACCT-EAEBC43C08DF",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_2",
"session_entropy": 0.316
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 647,
"timestamp": "2026-01-02T18:31:00Z",
"transaction_amount_usd": 21986.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.355,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 500911.4,
"financial_exposure_usd": 641070.26,
"recoverable_pct": 0.319
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100850",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-01T14:10:00Z",
"trace_id": "c899c1fd-58df-e32a-e6f7-293aebcb0baf"
} | {
"account_age_days": 567,
"account_id": "ACCT-AF1EC416EAE3",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_3",
"session_entropy": 0.289
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 304,
"timestamp": "2026-01-01T03:47:00Z",
"transaction_amount_usd": 1.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 409383.46,
"financial_exposure_usd": 997902.25,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104501",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "low",
"timestamp": "2026-01-04T03:01:00Z",
"trace_id": "86321e5e-207e-7d53-b6c9-a742e5493e69"
} | {
"account_age_days": 372,
"account_id": "ACCT-0EF8A686F9D7",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_3",
"session_entropy": 0.32
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 352,
"timestamp": "2026-01-04T03:01:00Z",
"transaction_amount_usd": 1134148.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.456,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4580082.67,
"financial_exposure_usd": 5082123.42,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105419",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "critical",
"timestamp": "2026-01-04T18:19:00Z",
"trace_id": "a097b52b-7a99-405c-75e9-626411cb0a40"
} | {
"account_age_days": 1930,
"account_id": "ACCT-234505E3B5CA",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_3",
"session_entropy": 0.766
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1011,
"timestamp": "2026-01-04T18:19:00Z",
"transaction_amount_usd": 2689175.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.75,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5084410.55,
"financial_exposure_usd": 5217576.73,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108523",
"label": "benign",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-06T22:03:00Z",
"trace_id": "e3b04329-df54-f07b-18e5-76533c1cd117"
} | {
"account_age_days": 1961,
"account_id": "ACCT-D0FD2444DFE9",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.683
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 381,
"timestamp": "2026-01-06T13:39:00Z",
"transaction_amount_usd": 0.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3602.01,
"financial_exposure_usd": 4244.89,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104811",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "critical",
"timestamp": "2026-01-04T08:11:00Z",
"trace_id": "8d9fb735-a2d5-6a8c-011b-f238e17b35c8"
} | {
"account_age_days": 736,
"account_id": "ACCT-F7711C4615C6",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_3",
"session_entropy": 0.756
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 95,
"timestamp": "2026-01-03T22:15:00Z",
"transaction_amount_usd": 6.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 764939.87,
"financial_exposure_usd": 1014666.61,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102309",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "high",
"timestamp": "2026-01-02T14:29:00Z",
"trace_id": "6c127efd-b44d-9e7b-d6b0-c549160b6442"
} | {
"account_age_days": 1094,
"account_id": "ACCT-60AF793E2514",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_2",
"session_entropy": 0.454
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 81,
"timestamp": "2026-01-02T14:29:00Z",
"transaction_amount_usd": 44061.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 159590.05,
"financial_exposure_usd": 376864.22,
"recoverable_pct": 0.297
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100669",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "high",
"timestamp": "2026-01-01T11:09:00Z",
"trace_id": "cafac4f2-d3b8-242b-efd6-fcccd5bc5ae0"
} | {
"account_age_days": 440,
"account_id": "ACCT-9909C8A2EA34",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.118
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 253,
"timestamp": "2026-01-01T07:56:00Z",
"transaction_amount_usd": 15.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 677923.84,
"financial_exposure_usd": 1463893.68,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107661",
"label": "benign",
"label_confidence": 0.473,
"severity": "high",
"timestamp": "2026-01-06T07:41:00Z",
"trace_id": "9edc2357-e00a-42cc-cc89-1763b8388364"
} | {
"account_age_days": 1137,
"account_id": "ACCT-F358BD7BEB3B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.681
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 295,
"timestamp": "2026-01-06T04:12:00Z",
"transaction_amount_usd": 3.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1184.63,
"financial_exposure_usd": 1825.61,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107854",
"label": "benign",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-06T10:54:00Z",
"trace_id": "33844a80-143c-91a9-bff2-c3172222f823"
} | {
"account_age_days": 1117,
"account_id": "ACCT-95993971FAC8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.158
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 447,
"timestamp": "2026-01-06T10:54:00Z",
"transaction_amount_usd": 4987.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 9829.67,
"financial_exposure_usd": 11454.29,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104388",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-04T01:08:00Z",
"trace_id": "4ad011af-fd25-11ce-1d86-29c78672ec49"
} | {
"account_age_days": 134,
"account_id": "ACCT-D1A1BF5FDAFD",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_3",
"session_entropy": 0.76
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 885,
"timestamp": "2026-01-04T01:08:00Z",
"transaction_amount_usd": 661149.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3824628.39,
"financial_exposure_usd": 3990817.46,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101259",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "low",
"timestamp": "2026-01-01T20:59:00Z",
"trace_id": "f59c0794-8aa2-3eee-c24c-b6bf604695bb"
} | {
"account_age_days": 1101,
"account_id": "ACCT-CB70C89F77B7",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.378
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 934,
"timestamp": "2026-01-01T20:59:00Z",
"transaction_amount_usd": 119543.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 172231.42,
"financial_exposure_usd": 320234.74,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101809",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "high",
"timestamp": "2026-01-02T06:09:00Z",
"trace_id": "f67da43d-09df-85b2-dabe-e210b52dfa8e"
} | {
"account_age_days": 679,
"account_id": "ACCT-76EA9D7BF6AF",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.386
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 837,
"timestamp": "2026-01-02T06:09:00Z",
"transaction_amount_usd": 26846.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.449,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 593586.09,
"financial_exposure_usd": 895961.98,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103014",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "low",
"timestamp": "2026-01-03T02:14:00Z",
"trace_id": "e0014a10-0896-6c61-df01-64d98b55ba13"
} | {
"account_age_days": 789,
"account_id": "ACCT-043B9C102668",
"baseline_risk_score": 0.297,
"kyc_tier": "tier_2",
"session_entropy": 0.518
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 720,
"timestamp": "2026-01-03T02:14:00Z",
"transaction_amount_usd": 45224.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 771049.61,
"financial_exposure_usd": 850934.14,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108622",
"label": "benign",
"label_confidence": 0.615,
"severity": "high",
"timestamp": "2026-01-06T23:42:00Z",
"trace_id": "6b1121ce-434d-8a3d-fd30-14f41608f405"
} | {
"account_age_days": 998,
"account_id": "ACCT-3E6E2029127F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.286
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 131,
"timestamp": "2026-01-06T23:42:00Z",
"transaction_amount_usd": 14364.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 4101.32,
"financial_exposure_usd": 6562.45,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105686",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "low",
"timestamp": "2026-01-04T22:46:00Z",
"trace_id": "a23689fd-330c-1e06-aaf6-a970e5a9e926"
} | {
"account_age_days": 204,
"account_id": "ACCT-AEF727623866",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.429
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1107,
"timestamp": "2026-01-04T22:46:00Z",
"transaction_amount_usd": 1643663.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1127367.33,
"financial_exposure_usd": 1320457.21,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104676",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-04T05:56:00Z",
"trace_id": "9857c3bd-f996-b5b6-5f3c-338f0ce453de"
} | {
"account_age_days": 1224,
"account_id": "ACCT-734585136EC9",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_1",
"session_entropy": 0.797
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 976,
"timestamp": "2026-01-04T05:56:00Z",
"transaction_amount_usd": 1251686.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 809294.74,
"financial_exposure_usd": 990988.48,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103788",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "medium",
"timestamp": "2026-01-03T15:08:00Z",
"trace_id": "a42a8a9a-8420-bd92-7f9d-c1c9648baf76"
} | {
"account_age_days": 1418,
"account_id": "ACCT-2F0FF883E4E3",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_1",
"session_entropy": 0.292
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 409,
"timestamp": "2026-01-03T15:08:00Z",
"transaction_amount_usd": 729447.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.645,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3106953.5,
"financial_exposure_usd": 4891569.73,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101633",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-02T03:13:00Z",
"trace_id": "623d8e1a-f9bf-bd72-7431-a965c7517bdd"
} | {
"account_age_days": 20,
"account_id": "ACCT-E6C9D6A7F84E",
"baseline_risk_score": 0.588,
"kyc_tier": "tier_2",
"session_entropy": 0.768
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 652,
"timestamp": "2026-01-02T03:13:00Z",
"transaction_amount_usd": 4283.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 621682.7,
"financial_exposure_usd": 817806.48,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101351",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-01T22:31:00Z",
"trace_id": "83ee05ce-eb33-08fd-089c-efbc46723ee1"
} | {
"account_age_days": 1489,
"account_id": "ACCT-0F905349BF77",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_1",
"session_entropy": 0.318
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 286,
"timestamp": "2026-01-01T19:48:00Z",
"transaction_amount_usd": 19.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.709,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 423060.75,
"financial_exposure_usd": 562168.97,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103246",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-03T06:06:00Z",
"trace_id": "dcea5ecd-d9c0-fb7f-ccd4-cc309cc3aaad"
} | {
"account_age_days": 327,
"account_id": "ACCT-0A0CDBA0F426",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_1",
"session_entropy": 0.63
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 512,
"timestamp": "2026-01-03T06:06:00Z",
"transaction_amount_usd": 11914.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.508,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 191985.53,
"financial_exposure_usd": 379218.35,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107812",
"label": "benign",
"label_confidence": 0.666,
"severity": "low",
"timestamp": "2026-01-06T10:12:00Z",
"trace_id": "aca7599e-9419-32c7-1265-f4b468272e9c"
} | {
"account_age_days": 1799,
"account_id": "ACCT-28AA4AFAFCB1",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 137,
"timestamp": "2026-01-06T08:32:00Z",
"transaction_amount_usd": 4.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 682.87,
"financial_exposure_usd": 1325.08,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106988",
"label": "benign",
"label_confidence": 0.52,
"severity": "low",
"timestamp": "2026-01-05T20:28:00Z",
"trace_id": "2d7a378e-eb39-5903-1f79-5179a2d16812"
} | {
"account_age_days": 372,
"account_id": "ACCT-4246AB088D8E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.616
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 176,
"timestamp": "2026-01-05T20:28:00Z",
"transaction_amount_usd": 10137.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.536,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 581.82,
"financial_exposure_usd": 1436.96,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105959",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-05T03:19:00Z",
"trace_id": "d2d053ef-24c3-d810-42be-1c8ffc9cac19"
} | {
"account_age_days": 236,
"account_id": "ACCT-66ABD03A3A9B",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_3",
"session_entropy": 0.196
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 176,
"timestamp": "2026-01-05T03:19:00Z",
"transaction_amount_usd": 704241.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2826818.09,
"financial_exposure_usd": 5170211.07,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106345",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-05T09:45:00Z",
"trace_id": "4bc5ac93-0ca7-0ae7-1ea0-502e805adce2"
} | {
"account_age_days": 1663,
"account_id": "ACCT-958D139A9E03",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1091,
"timestamp": "2026-01-05T09:45:00Z",
"transaction_amount_usd": 732586.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.742,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4811935.04,
"financial_exposure_usd": 5243473.77,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107762",
"label": "benign",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-06T09:22:00Z",
"trace_id": "1de58d90-f422-6a11-45c8-e9f64417eed7"
} | {
"account_age_days": 1930,
"account_id": "ACCT-C546FA31D866",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 178,
"timestamp": "2026-01-05T23:28:00Z",
"transaction_amount_usd": 1.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 655.12,
"financial_exposure_usd": 1195.51,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100100",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-01T01:40:00Z",
"trace_id": "0a6552a5-b8dd-f15d-8ea0-35f049cc253f"
} | {
"account_age_days": 934,
"account_id": "ACCT-4765606982EC",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_1",
"session_entropy": 0.225
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 989,
"timestamp": "2026-01-01T01:40:00Z",
"transaction_amount_usd": 14328.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 641918.58,
"financial_exposure_usd": 1192064.69,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101442",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-02T00:02:00Z",
"trace_id": "dda69452-d468-26e2-cd5a-3638d1f680bb"
} | {
"account_age_days": 493,
"account_id": "ACCT-ADF05410BD65",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_2",
"session_entropy": 0.664
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 253,
"timestamp": "2026-01-01T15:50:00Z",
"transaction_amount_usd": 8.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.447,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 715636.52,
"financial_exposure_usd": 1049807.87,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101139",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "low",
"timestamp": "2026-01-01T18:59:00Z",
"trace_id": "d5db0d11-c5cb-9ad3-2acc-1304f655e6be"
} | {
"account_age_days": 28,
"account_id": "ACCT-2EB265F38F6D",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_1",
"session_entropy": 0.316
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 372,
"timestamp": "2026-01-01T11:23:00Z",
"transaction_amount_usd": 22.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.701,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 331505.41,
"financial_exposure_usd": 339503.19,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101482",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "critical",
"timestamp": "2026-01-02T00:42:00Z",
"trace_id": "90e26f97-655c-e5f5-0323-390b932169b6"
} | {
"account_age_days": 1516,
"account_id": "ACCT-32AC82DFF4E0",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.162
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 256,
"timestamp": "2026-01-02T00:42:00Z",
"transaction_amount_usd": 36927.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.668,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 471376.63,
"financial_exposure_usd": 1052691.39,
"recoverable_pct": 0.337
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.