schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108717",
"label": "benign",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-07T01:17:00Z",
"trace_id": "541526ce-da4d-fca7-88bd-31677eca0f74"
} | {
"account_age_days": 1038,
"account_id": "ACCT-87E2CF92DC6E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.819
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 311,
"timestamp": "2026-01-06T16:47:00Z",
"transaction_amount_usd": 22.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2329.67,
"financial_exposure_usd": 3363.04,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107012",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-05T20:52:00Z",
"trace_id": "5456c125-55d1-c550-987a-7630a245b3ad"
} | {
"account_age_days": 1324,
"account_id": "ACCT-E59D365B21A1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.111
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1086,
"timestamp": "2026-01-05T20:52:00Z",
"transaction_amount_usd": 11481.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2206.44,
"financial_exposure_usd": 4084.37,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109766",
"label": "benign",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-07T18:46:00Z",
"trace_id": "918356e8-925f-08d7-61ef-df8797100dec"
} | {
"account_age_days": 1673,
"account_id": "ACCT-671F8FC51B9D",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.55
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 276,
"timestamp": "2026-01-07T10:22:00Z",
"transaction_amount_usd": 8.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2316.68,
"financial_exposure_usd": 3942.49,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101504",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-02T01:04:00Z",
"trace_id": "1454bf5a-bc0a-a7c6-9662-e499b4425bca"
} | {
"account_age_days": 898,
"account_id": "ACCT-B2611AF24CAA",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_1",
"session_entropy": 0.858
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 564,
"timestamp": "2026-01-02T01:04:00Z",
"transaction_amount_usd": 12497.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 510829.67,
"financial_exposure_usd": 650815.48,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100368",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-01T06:08:00Z",
"trace_id": "1794dbed-c63e-e24d-d5b8-056b679ebc27"
} | {
"account_age_days": 1771,
"account_id": "ACCT-281A7DD114F0",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_3",
"session_entropy": 0.645
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 760,
"timestamp": "2026-01-01T06:08:00Z",
"transaction_amount_usd": 119674.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.921,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 601491.69,
"financial_exposure_usd": 1011949.66,
"recoverable_pct": 0.181
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100326",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-01T05:26:00Z",
"trace_id": "979f5b27-3bf5-337a-224c-eee61936059c"
} | {
"account_age_days": 788,
"account_id": "ACCT-758240A7B4A7",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 850,
"timestamp": "2026-01-01T05:26:00Z",
"transaction_amount_usd": 59981.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 593187.74,
"financial_exposure_usd": 1067391.05,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109028",
"label": "benign",
"label_confidence": 0.524,
"severity": "medium",
"timestamp": "2026-01-07T06:28:00Z",
"trace_id": "754d6e08-ceb7-2f6e-c066-97718853b443"
} | {
"account_age_days": 1308,
"account_id": "ACCT-1F26AA90F3A1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.263
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 144,
"timestamp": "2026-01-07T03:56:00Z",
"transaction_amount_usd": 15.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3534.27,
"financial_exposure_usd": 3675.42,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105378",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-04T17:38:00Z",
"trace_id": "d1d6db92-7d58-39c4-c2ae-b2154ac5b407"
} | {
"account_age_days": 392,
"account_id": "ACCT-2E5D7694AACB",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_1",
"session_entropy": 0.311
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1090,
"timestamp": "2026-01-04T17:38:00Z",
"transaction_amount_usd": 1762002.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1685349.42,
"financial_exposure_usd": 2762690.9,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107197",
"label": "benign",
"label_confidence": 0.534,
"severity": "high",
"timestamp": "2026-01-05T23:57:00Z",
"trace_id": "a399d2c8-0d75-0e30-8c32-1c1f7b912fbe"
} | {
"account_age_days": 1470,
"account_id": "ACCT-008E04238773",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.258
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1045,
"timestamp": "2026-01-05T23:57:00Z",
"transaction_amount_usd": 3677.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 996.41,
"financial_exposure_usd": 1421.18,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106801",
"label": "benign",
"label_confidence": 0.655,
"severity": "medium",
"timestamp": "2026-01-05T17:21:00Z",
"trace_id": "e944cf18-900a-458e-9887-4f1a6f71bf87"
} | {
"account_age_days": 1984,
"account_id": "ACCT-620006F67C46",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.197
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 400,
"timestamp": "2026-01-05T14:06:00Z",
"transaction_amount_usd": 23.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4135.54,
"financial_exposure_usd": 4988.77,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107999",
"label": "benign",
"label_confidence": 0.712,
"severity": "low",
"timestamp": "2026-01-06T13:19:00Z",
"trace_id": "14e3d0de-123a-33d4-897b-75a0cd8129af"
} | {
"account_age_days": 1092,
"account_id": "ACCT-A54661B07E5D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.176
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 459,
"timestamp": "2026-01-06T13:19:00Z",
"transaction_amount_usd": 11087.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 440.97,
"financial_exposure_usd": 450.87,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103136",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-03T04:16:00Z",
"trace_id": "33c947f8-72f2-344a-852a-9cabdc804d6d"
} | {
"account_age_days": 1752,
"account_id": "ACCT-3CE2433EF0F8",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_2",
"session_entropy": 0.498
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 354,
"timestamp": "2026-01-03T04:16:00Z",
"transaction_amount_usd": 87423.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.398,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 736217.93,
"financial_exposure_usd": 814998.51,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105789",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-05T00:29:00Z",
"trace_id": "873b9f13-9faa-da27-0815-be363c41d0fc"
} | {
"account_age_days": 100,
"account_id": "ACCT-7FEC2BEF00D5",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1136,
"timestamp": "2026-01-05T00:29:00Z",
"transaction_amount_usd": 2565726.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3384431.04,
"financial_exposure_usd": 4600110.52,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105840",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "low",
"timestamp": "2026-01-05T01:20:00Z",
"trace_id": "243d25a8-87e3-eb30-a048-538a15530316"
} | {
"account_age_days": 1236,
"account_id": "ACCT-7BEE3359797E",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_3",
"session_entropy": 0.784
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 688,
"timestamp": "2026-01-05T01:20:00Z",
"transaction_amount_usd": 364194.57
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.891,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2202642.71,
"financial_exposure_usd": 2959426.41,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108687",
"label": "benign",
"label_confidence": 0.476,
"severity": "medium",
"timestamp": "2026-01-07T00:47:00Z",
"trace_id": "b255693a-2d72-38a4-ad9b-d994795625bc"
} | {
"account_age_days": 1398,
"account_id": "ACCT-8019583263E0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 427,
"timestamp": "2026-01-07T00:47:00Z",
"transaction_amount_usd": 440.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2015.39,
"financial_exposure_usd": 3078.59,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100082",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "medium",
"timestamp": "2026-01-01T01:22:00Z",
"trace_id": "318cd979-fab0-a15d-4a5d-6ceab565f64e"
} | {
"account_age_days": 800,
"account_id": "ACCT-2A7CF9E9D7A7",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.585
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 395,
"timestamp": "2026-01-01T00:51:00Z",
"transaction_amount_usd": 18.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.42,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 678472.63,
"financial_exposure_usd": 824229.64,
"recoverable_pct": 0.267
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104668",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-04T05:48:00Z",
"trace_id": "9afa4b75-f5fc-40ac-8b23-d917498dde12"
} | {
"account_age_days": 1676,
"account_id": "ACCT-BAB1FCC0E474",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 440,
"timestamp": "2026-01-04T05:48:00Z",
"transaction_amount_usd": 1633257.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.645,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2916994.95,
"financial_exposure_usd": 5645113.85,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108178",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-06T16:18:00Z",
"trace_id": "a90187b9-4c77-8534-453d-ffc6335befea"
} | {
"account_age_days": 1018,
"account_id": "ACCT-61B3BB1961F7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.568
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 253,
"timestamp": "2026-01-06T14:57:00Z",
"transaction_amount_usd": 22.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4044.62,
"financial_exposure_usd": 9969.69,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105357",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "high",
"timestamp": "2026-01-04T17:17:00Z",
"trace_id": "f6e574ce-4612-4a7b-2029-8bede86a6e09"
} | {
"account_age_days": 544,
"account_id": "ACCT-878BB8682F0A",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_2",
"session_entropy": 0.161
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 329,
"timestamp": "2026-01-04T17:17:00Z",
"transaction_amount_usd": 1944896.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3358719.17,
"financial_exposure_usd": 5268056.3,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100239",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-01T03:59:00Z",
"trace_id": "e872c557-3d90-49bb-205d-8635cc87858c"
} | {
"account_age_days": 55,
"account_id": "ACCT-BF9BD810A17F",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_3",
"session_entropy": 0.923
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 251,
"timestamp": "2026-01-01T03:59:00Z",
"transaction_amount_usd": 73024.72
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 574881.85,
"financial_exposure_usd": 916252.91,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107844",
"label": "benign",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-06T10:44:00Z",
"trace_id": "17c73492-46eb-296f-1479-3088ae17c345"
} | {
"account_age_days": 265,
"account_id": "ACCT-2D3DA9934460",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_1",
"session_entropy": 0.836
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 109,
"timestamp": "2026-01-06T10:44:00Z",
"transaction_amount_usd": 10439.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1466.83,
"financial_exposure_usd": 2158.15,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100171",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "high",
"timestamp": "2026-01-01T02:51:00Z",
"trace_id": "be88f8e4-143d-bd6c-cdbb-6c1f5a8d785e"
} | {
"account_age_days": 1006,
"account_id": "ACCT-4AC81BDAE002",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1130,
"timestamp": "2026-01-01T02:51:00Z",
"transaction_amount_usd": 39590.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.709,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 521042.86,
"financial_exposure_usd": 902628.94,
"recoverable_pct": 0.186
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109637",
"label": "benign",
"label_confidence": 0.521,
"severity": "high",
"timestamp": "2026-01-07T16:37:00Z",
"trace_id": "7b580df3-df61-8754-7644-822b5c9c0155"
} | {
"account_age_days": 990,
"account_id": "ACCT-31C56E2E0D0E",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 576,
"timestamp": "2026-01-07T16:37:00Z",
"transaction_amount_usd": 8316.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2037.36,
"financial_exposure_usd": 2405.78,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101047",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "medium",
"timestamp": "2026-01-01T17:27:00Z",
"trace_id": "ecc071b4-7bea-a8ea-6908-843f46bede46"
} | {
"account_age_days": 1964,
"account_id": "ACCT-66F922933547",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.865
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 992,
"timestamp": "2026-01-01T17:27:00Z",
"transaction_amount_usd": 75105.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 830841.07,
"financial_exposure_usd": 1179544.9,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100301",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-01T05:01:00Z",
"trace_id": "68ea0d22-6c18-7782-6e96-f611e00c04a3"
} | {
"account_age_days": 1038,
"account_id": "ACCT-E66ECEC56852",
"baseline_risk_score": 0.603,
"kyc_tier": "tier_2",
"session_entropy": 0.735
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 482,
"timestamp": "2026-01-01T05:01:00Z",
"transaction_amount_usd": 89542.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 314411.16,
"financial_exposure_usd": 621096.03,
"recoverable_pct": 0.387
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101068",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "high",
"timestamp": "2026-01-01T17:48:00Z",
"trace_id": "f5facb11-e17f-9fa7-3339-f168dfe52c65"
} | {
"account_age_days": 43,
"account_id": "ACCT-234721A47B89",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_3",
"session_entropy": 0.351
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 616,
"timestamp": "2026-01-01T17:48:00Z",
"transaction_amount_usd": 40902.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.492,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 963221.54,
"financial_exposure_usd": 1061260.91,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101168",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-01T19:28:00Z",
"trace_id": "e27a7451-d536-719d-19e8-4e217968e593"
} | {
"account_age_days": 1137,
"account_id": "ACCT-E66ACCA407EE",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_2",
"session_entropy": 0.634
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 173,
"timestamp": "2026-01-01T19:28:00Z",
"transaction_amount_usd": 104051.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 289946.47,
"financial_exposure_usd": 399562.69,
"recoverable_pct": 0.225
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103501",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "medium",
"timestamp": "2026-01-03T10:21:00Z",
"trace_id": "fd1cc022-d740-9b62-d649-ea8cde0c5e94"
} | {
"account_age_days": 952,
"account_id": "ACCT-D30CEC4B9749",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_2",
"session_entropy": 0.938
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 247,
"timestamp": "2026-01-03T02:03:00Z",
"transaction_amount_usd": 20.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7196692.23,
"financial_exposure_usd": 7220578.98,
"recoverable_pct": 0.703
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100144",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "medium",
"timestamp": "2026-01-01T02:24:00Z",
"trace_id": "1e4c3fdf-556e-fce4-9d9e-4da21387bcda"
} | {
"account_age_days": 1011,
"account_id": "ACCT-7F4218898CA1",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_3",
"session_entropy": 0.558
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 957,
"timestamp": "2026-01-01T02:24:00Z",
"transaction_amount_usd": 110424.9
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.843,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 87014.01,
"financial_exposure_usd": 193291.18,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108488",
"label": "benign",
"label_confidence": 0.58,
"severity": "high",
"timestamp": "2026-01-06T21:28:00Z",
"trace_id": "31a636bf-91c0-564a-927c-d9eca9b322e9"
} | {
"account_age_days": 1201,
"account_id": "ACCT-5EF28538D650",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.775
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 821,
"timestamp": "2026-01-06T21:28:00Z",
"transaction_amount_usd": 3795.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 389.1,
"financial_exposure_usd": 837.72,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104812",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "high",
"timestamp": "2026-01-04T08:12:00Z",
"trace_id": "effd0ce2-c6e9-bd7d-e137-ceca10f47709"
} | {
"account_age_days": 96,
"account_id": "ACCT-34DAA189FE9D",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_3",
"session_entropy": 0.158
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 722,
"timestamp": "2026-01-04T08:12:00Z",
"transaction_amount_usd": 2609665.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 3308170.35,
"financial_exposure_usd": 3815161.27,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104187",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "critical",
"timestamp": "2026-01-03T21:47:00Z",
"trace_id": "3b1bf91d-6ff0-b85f-135f-73639a474726"
} | {
"account_age_days": 1183,
"account_id": "ACCT-9CF8E5E3CF33",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 98,
"timestamp": "2026-01-03T14:49:00Z",
"transaction_amount_usd": 23.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4029153.2,
"financial_exposure_usd": 6784345.54,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100503",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-01T08:23:00Z",
"trace_id": "40d0e9a7-2134-928b-a376-72abb786d4cd"
} | {
"account_age_days": 1514,
"account_id": "ACCT-1A75C9285071",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 638,
"timestamp": "2026-01-01T08:23:00Z",
"transaction_amount_usd": 29339.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.567,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 584668.89,
"financial_exposure_usd": 634399.75,
"recoverable_pct": 0.384
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106887",
"label": "benign",
"label_confidence": 0.721,
"severity": "low",
"timestamp": "2026-01-05T18:47:00Z",
"trace_id": "95864f99-6d67-f3f1-af97-851dd8d203f8"
} | {
"account_age_days": 467,
"account_id": "ACCT-7D2923959E3F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.693
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 604,
"timestamp": "2026-01-05T18:47:00Z",
"transaction_amount_usd": 6998
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1686,
"financial_exposure_usd": 2040.88,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105428",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-04T18:28:00Z",
"trace_id": "35041de9-4ab0-da15-7b70-5efb28491716"
} | {
"account_age_days": 1010,
"account_id": "ACCT-1C3F72A39D81",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.885
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1073,
"timestamp": "2026-01-04T18:28:00Z",
"transaction_amount_usd": 185753.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4987485.54,
"financial_exposure_usd": 5162960.95,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101784",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-02T05:44:00Z",
"trace_id": "5e113637-9df4-5471-ca02-4f04ec9b7d84"
} | {
"account_age_days": 917,
"account_id": "ACCT-75E11AD69B69",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.845
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 357,
"timestamp": "2026-01-01T22:39:00Z",
"transaction_amount_usd": 5.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.782,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 835047.82,
"financial_exposure_usd": 1148041.65,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103983",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-03T18:23:00Z",
"trace_id": "3a23e454-347a-3d5a-2c3a-f14c2a6804c7"
} | {
"account_age_days": 1740,
"account_id": "ACCT-7B75FD74A964",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.196
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 463,
"timestamp": "2026-01-03T18:23:00Z",
"transaction_amount_usd": 2528872.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.499,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4513397.85,
"financial_exposure_usd": 5309474.39,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105869",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-05T01:49:00Z",
"trace_id": "71e6456e-8e63-d02d-48ad-413d80694988"
} | {
"account_age_days": 545,
"account_id": "ACCT-EA0CBF82E318",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.738
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 324,
"timestamp": "2026-01-05T01:49:00Z",
"transaction_amount_usd": 1462730.62
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1506913.35,
"financial_exposure_usd": 2898776.93,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108992",
"label": "benign",
"label_confidence": 0.517,
"severity": "high",
"timestamp": "2026-01-07T05:52:00Z",
"trace_id": "53d31408-352c-50be-3af7-d0e7f02859f2"
} | {
"account_age_days": 658,
"account_id": "ACCT-5EEA88CF836E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.383
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 589,
"timestamp": "2026-01-07T05:52:00Z",
"transaction_amount_usd": 10454.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2480.01,
"financial_exposure_usd": 3248.8,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103214",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-03T05:34:00Z",
"trace_id": "d5611645-440e-5a40-ceb5-702ce011d109"
} | {
"account_age_days": 604,
"account_id": "ACCT-FB23E0B2FA3A",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_1",
"session_entropy": 0.73
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 509,
"timestamp": "2026-01-03T05:34:00Z",
"transaction_amount_usd": 21624.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.785,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 766403.8,
"financial_exposure_usd": 1011249.29,
"recoverable_pct": 0.138
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107825",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T10:25:00Z",
"trace_id": "d6cfa14a-84a0-65e9-5a08-4bf1faa7968b"
} | {
"account_age_days": 174,
"account_id": "ACCT-19256680CF6B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 251,
"timestamp": "2026-01-06T05:59:00Z",
"transaction_amount_usd": 13.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3670.95,
"financial_exposure_usd": 4133.64,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106622",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-05T14:22:00Z",
"trace_id": "90b142f2-9d4b-2bf1-d981-043b3da5c129"
} | {
"account_age_days": 1438,
"account_id": "ACCT-C74997C7D9B1",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 166,
"timestamp": "2026-01-05T04:54:00Z",
"transaction_amount_usd": 3.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5404881.8,
"financial_exposure_usd": 7037344.13,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104547",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-04T03:47:00Z",
"trace_id": "bf918934-2691-400a-3e3b-082d65859531"
} | {
"account_age_days": 921,
"account_id": "ACCT-D5E29F7D4159",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_1",
"session_entropy": 0.806
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 981,
"timestamp": "2026-01-04T03:47:00Z",
"transaction_amount_usd": 2499398.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.883,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1866124.07,
"financial_exposure_usd": 3286406.47,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108898",
"label": "benign",
"label_confidence": 0.645,
"severity": "high",
"timestamp": "2026-01-07T04:18:00Z",
"trace_id": "45cce3dd-8631-ac73-07fc-f50504354b45"
} | {
"account_age_days": 825,
"account_id": "ACCT-E47D62B4C6B5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.205
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 605,
"timestamp": "2026-01-07T04:18:00Z",
"transaction_amount_usd": 505.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3547.29,
"financial_exposure_usd": 4724.21,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106877",
"label": "benign",
"label_confidence": 0.48,
"severity": "low",
"timestamp": "2026-01-05T18:37:00Z",
"trace_id": "fb485cbe-49cb-61ae-8352-64ec3b6d179d"
} | {
"account_age_days": 572,
"account_id": "ACCT-E4A5E3A332A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.58
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 401,
"timestamp": "2026-01-05T18:37:00Z",
"transaction_amount_usd": 2357.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4172.05,
"financial_exposure_usd": 6531.41,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100205",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-01T03:25:00Z",
"trace_id": "fae9df3f-585b-8128-4002-c5eb9cd3e931"
} | {
"account_age_days": 1114,
"account_id": "ACCT-242E4CFF6490",
"baseline_risk_score": 0.567,
"kyc_tier": "tier_3",
"session_entropy": 0.5
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 538,
"timestamp": "2026-01-01T03:25:00Z",
"transaction_amount_usd": 110371.47
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.53,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 278546.26,
"financial_exposure_usd": 646982.42,
"recoverable_pct": 0.185
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108632",
"label": "benign",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-06T23:52:00Z",
"trace_id": "6cd77a48-640e-cc6c-580b-d7714c1101f2"
} | {
"account_age_days": 1948,
"account_id": "ACCT-8A38D3350AC8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.525
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 371,
"timestamp": "2026-01-06T23:52:00Z",
"transaction_amount_usd": 8494.55
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1832.24,
"financial_exposure_usd": 3259.2,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100246",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-01T04:06:00Z",
"trace_id": "c6b98ce2-242b-ba10-c7d0-b0d14b5fdf70"
} | {
"account_age_days": 836,
"account_id": "ACCT-92AA71D561E7",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.422
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 127,
"timestamp": "2026-01-01T04:06:00Z",
"transaction_amount_usd": 67401.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.904,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 443737.4,
"financial_exposure_usd": 1085039,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104293",
"label": "fraudulent",
"label_confidence": 0.743,
"severity": "critical",
"timestamp": "2026-01-03T23:33:00Z",
"trace_id": "51645f6b-3709-5c06-e33b-fac4ceaa252b"
} | {
"account_age_days": 695,
"account_id": "ACCT-A1342ABB0233",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_1",
"session_entropy": 0.598
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 548,
"timestamp": "2026-01-03T23:33:00Z",
"transaction_amount_usd": 1296499.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.394,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4420451.36,
"financial_exposure_usd": 4433964.48,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102649",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "medium",
"timestamp": "2026-01-02T20:09:00Z",
"trace_id": "263e0065-0cd6-a39e-b702-317dedb9c08a"
} | {
"account_age_days": 871,
"account_id": "ACCT-F8C369453F61",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_1",
"session_entropy": 0.889
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1110,
"timestamp": "2026-01-02T20:09:00Z",
"transaction_amount_usd": 102483.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 874789.99,
"financial_exposure_usd": 1172632.28,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103706",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-03T13:46:00Z",
"trace_id": "8b638da5-fd63-7813-6b95-d3bd410e9f9c"
} | {
"account_age_days": 509,
"account_id": "ACCT-14FC2FE0ED8F",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.903
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 921,
"timestamp": "2026-01-03T13:46:00Z",
"transaction_amount_usd": 1684093.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.697,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2865115.21,
"financial_exposure_usd": 2905086.84,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108321",
"label": "benign",
"label_confidence": 0.544,
"severity": "low",
"timestamp": "2026-01-06T18:41:00Z",
"trace_id": "085415df-66b3-48f7-cb73-5f3680537db1"
} | {
"account_age_days": 346,
"account_id": "ACCT-744AB9DD516B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.623
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 157,
"timestamp": "2026-01-06T18:06:00Z",
"transaction_amount_usd": 3.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.624,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 6549.24,
"financial_exposure_usd": 6918.19,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103093",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "high",
"timestamp": "2026-01-03T03:33:00Z",
"trace_id": "ba684e6c-ae72-6c4c-816d-ced8a60b07b8"
} | {
"account_age_days": 177,
"account_id": "ACCT-9E9FB584BA7F",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.942
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 146,
"timestamp": "2026-01-02T19:51:00Z",
"transaction_amount_usd": 22.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.693,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 586202.03,
"financial_exposure_usd": 603590.5,
"recoverable_pct": 0.155
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103563",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "high",
"timestamp": "2026-01-03T11:23:00Z",
"trace_id": "28d7ee6a-b282-b99a-08d1-42654b84d826"
} | {
"account_age_days": 851,
"account_id": "ACCT-1225C41DDEB4",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.291
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 895,
"timestamp": "2026-01-03T11:23:00Z",
"transaction_amount_usd": 2128532.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.432,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3996077.03,
"financial_exposure_usd": 6475285.45,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108270",
"label": "benign",
"label_confidence": 0.503,
"severity": "medium",
"timestamp": "2026-01-06T17:50:00Z",
"trace_id": "69c4b7a9-0eca-6cd8-5ad1-a3a3249d4bbb"
} | {
"account_age_days": 1656,
"account_id": "ACCT-498BE33FD7D8",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.133
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 826,
"timestamp": "2026-01-06T17:50:00Z",
"transaction_amount_usd": 2632.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 853.38,
"financial_exposure_usd": 1613.53,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104947",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-04T10:27:00Z",
"trace_id": "59da4631-f1d0-05da-0a74-7024b3f98741"
} | {
"account_age_days": 1622,
"account_id": "ACCT-6FB4354DB829",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 310,
"timestamp": "2026-01-03T23:41:00Z",
"transaction_amount_usd": 20.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2303769.16,
"financial_exposure_usd": 4904881.55,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106124",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-05T06:04:00Z",
"trace_id": "8f4de981-7de2-fda0-dfe8-157e1d98f7f1"
} | {
"account_age_days": 1317,
"account_id": "ACCT-7836EC47E800",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 442,
"timestamp": "2026-01-05T06:04:00Z",
"transaction_amount_usd": 1145184.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.771,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1874690.43,
"financial_exposure_usd": 3856876.38,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105350",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "medium",
"timestamp": "2026-01-04T17:10:00Z",
"trace_id": "44397235-51a4-52f9-c9c4-3d63e8b610f2"
} | {
"account_age_days": 638,
"account_id": "ACCT-011C4208A2DD",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 211,
"timestamp": "2026-01-04T14:46:00Z",
"transaction_amount_usd": 21.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.364,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 848174.57,
"financial_exposure_usd": 1611109.97,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109033",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T06:33:00Z",
"trace_id": "325c13d8-237b-4ed6-44f6-01de1dff8bc0"
} | {
"account_age_days": 972,
"account_id": "ACCT-29EECFA38E28",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.557
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 304,
"timestamp": "2026-01-07T02:08:00Z",
"transaction_amount_usd": 19.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1218.94,
"financial_exposure_usd": 2142.58,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108056",
"label": "benign",
"label_confidence": 0.604,
"severity": "low",
"timestamp": "2026-01-06T14:16:00Z",
"trace_id": "04701015-457e-8f77-5d4f-1c7fc5d3f2c7"
} | {
"account_age_days": 1676,
"account_id": "ACCT-A97FC863E10E",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 260,
"timestamp": "2026-01-06T13:29:00Z",
"transaction_amount_usd": 7.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2293.9,
"financial_exposure_usd": 3231.97,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108025",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T13:45:00Z",
"trace_id": "34ca55c8-c4e2-5b39-0262-f4a3e03cf04b"
} | {
"account_age_days": 670,
"account_id": "ACCT-B81AFD3E8C48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.926
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 871,
"timestamp": "2026-01-06T13:45:00Z",
"transaction_amount_usd": 10204.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2922.65,
"financial_exposure_usd": 3595.72,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103905",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-03T17:05:00Z",
"trace_id": "d35ccd23-e320-b76b-a28e-4b46061bd27e"
} | {
"account_age_days": 240,
"account_id": "ACCT-1494232E90C5",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_3",
"session_entropy": 0.833
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 405,
"timestamp": "2026-01-03T17:05:00Z",
"transaction_amount_usd": 2810624.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3224554.16,
"financial_exposure_usd": 7900789.65,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106758",
"label": "benign",
"label_confidence": 0.458,
"severity": "medium",
"timestamp": "2026-01-05T16:38:00Z",
"trace_id": "68936534-5ac6-5eb6-d323-f62552b62d53"
} | {
"account_age_days": 824,
"account_id": "ACCT-82E8F2F7A441",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.153
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 626,
"timestamp": "2026-01-05T16:38:00Z",
"transaction_amount_usd": 434.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 846.26,
"financial_exposure_usd": 1410.22,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100399",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "high",
"timestamp": "2026-01-01T06:39:00Z",
"trace_id": "b38fda15-f03b-bd44-a604-efc616010fdd"
} | {
"account_age_days": 241,
"account_id": "ACCT-BBFF1E4B7236",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.682
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 707,
"timestamp": "2026-01-01T06:39:00Z",
"transaction_amount_usd": 88724.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.65,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 88912.17,
"financial_exposure_usd": 97934.44,
"recoverable_pct": 0.204
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101631",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "critical",
"timestamp": "2026-01-02T03:11:00Z",
"trace_id": "2165d436-d037-c5e3-3183-1b8a98b95626"
} | {
"account_age_days": 24,
"account_id": "ACCT-68C6E99012E5",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.592
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 97,
"timestamp": "2026-01-02T03:11:00Z",
"transaction_amount_usd": 25427.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 429924.77,
"financial_exposure_usd": 932395.53,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106197",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-05T07:17:00Z",
"trace_id": "e79ab6ec-78e5-2cb6-80bf-8a3452115cd9"
} | {
"account_age_days": 1477,
"account_id": "ACCT-D40604135CB8",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.476
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 393,
"timestamp": "2026-01-04T19:42:00Z",
"transaction_amount_usd": 14.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1707939.62,
"financial_exposure_usd": 3262606.34,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109354",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-07T11:54:00Z",
"trace_id": "1196663f-2e03-c8ac-3881-857b96ab6bd4"
} | {
"account_age_days": 826,
"account_id": "ACCT-07930CE9D0B0",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_1",
"session_entropy": 0.4
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 227,
"timestamp": "2026-01-07T04:03:00Z",
"transaction_amount_usd": 3.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2183.84,
"financial_exposure_usd": 3229.58,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105878",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "low",
"timestamp": "2026-01-05T01:58:00Z",
"trace_id": "24097576-1b1f-416b-04b4-b5db4ce28ee2"
} | {
"account_age_days": 182,
"account_id": "ACCT-C6A0EC4DC4BA",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_2",
"session_entropy": 0.25
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 886,
"timestamp": "2026-01-05T01:58:00Z",
"transaction_amount_usd": 1073645.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.723,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2085591.79,
"financial_exposure_usd": 3628020.74,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107471",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-06T04:31:00Z",
"trace_id": "5b7e6870-2efb-b225-5ae6-dcb985b1c7a8"
} | {
"account_age_days": 1681,
"account_id": "ACCT-A2B0DC67917A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.681
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 969,
"timestamp": "2026-01-06T04:31:00Z",
"transaction_amount_usd": 12243.9
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1753.23,
"financial_exposure_usd": 2241.13,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100225",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "critical",
"timestamp": "2026-01-01T03:45:00Z",
"trace_id": "112bc360-0ad2-7057-c127-cdfd9b23854f"
} | {
"account_age_days": 1341,
"account_id": "ACCT-E8CDEA8A7710",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_2",
"session_entropy": 0.429
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 361,
"timestamp": "2025-12-31T20:38:00Z",
"transaction_amount_usd": 12.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.709,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 538575.97,
"financial_exposure_usd": 603340.65,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105279",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-04T15:59:00Z",
"trace_id": "c6e1e162-780a-07be-46fa-dc60538a293b"
} | {
"account_age_days": 896,
"account_id": "ACCT-E0F9099D89E8",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_3",
"session_entropy": 0.32
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 404,
"timestamp": "2026-01-04T15:59:00Z",
"transaction_amount_usd": 1272972.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.663,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4507826.6,
"financial_exposure_usd": 6118731.17,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108927",
"label": "benign",
"label_confidence": 0.541,
"severity": "high",
"timestamp": "2026-01-07T04:47:00Z",
"trace_id": "b219422d-12f9-d3ec-7ca3-c452f45b88e6"
} | {
"account_age_days": 479,
"account_id": "ACCT-117CF4111884",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.792
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 123,
"timestamp": "2026-01-07T04:47:00Z",
"transaction_amount_usd": 12487.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3941.36,
"financial_exposure_usd": 6687.28,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101212",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "medium",
"timestamp": "2026-01-01T20:12:00Z",
"trace_id": "feff6711-927c-b7d0-e6fd-e7a53d5e4c16"
} | {
"account_age_days": 1264,
"account_id": "ACCT-41B9FAFCBA68",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.727
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 96,
"timestamp": "2026-01-01T18:12:00Z",
"transaction_amount_usd": 4.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 863459.36,
"financial_exposure_usd": 1106384.03,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108883",
"label": "benign",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-07T04:03:00Z",
"trace_id": "9058524f-daca-b362-6894-c655566bc823"
} | {
"account_age_days": 108,
"account_id": "ACCT-1413015F622F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.102
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 804,
"timestamp": "2026-01-07T04:03:00Z",
"transaction_amount_usd": 11363.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3732.92,
"financial_exposure_usd": 6156.65,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103361",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-03T08:01:00Z",
"trace_id": "fd55fe91-d369-2210-f929-3516daf25d84"
} | {
"account_age_days": 221,
"account_id": "ACCT-4D041B03CEF9",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.766
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 158,
"timestamp": "2026-01-03T08:01:00Z",
"transaction_amount_usd": 2902800.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3209150.97,
"financial_exposure_usd": 6834046.29,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104146",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "medium",
"timestamp": "2026-01-03T21:06:00Z",
"trace_id": "36fa034e-6079-45ab-2a19-818c6af78f74"
} | {
"account_age_days": 1977,
"account_id": "ACCT-67DDEAB25253",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 705,
"timestamp": "2026-01-03T21:06:00Z",
"transaction_amount_usd": 2558176.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6343270.17,
"financial_exposure_usd": 6804696.17,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106464",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-05T11:44:00Z",
"trace_id": "023919f7-76a4-276b-a29b-8ba48c8d9712"
} | {
"account_age_days": 263,
"account_id": "ACCT-76CADF19321A",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_2",
"session_entropy": 0.199
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1126,
"timestamp": "2026-01-05T11:44:00Z",
"transaction_amount_usd": 2630984.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3662727.93,
"financial_exposure_usd": 6243562.24,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100427",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "high",
"timestamp": "2026-01-01T07:07:00Z",
"trace_id": "2f40e722-1c7d-a3b3-18f2-3779e63f174d"
} | {
"account_age_days": 1609,
"account_id": "ACCT-AE85E8619BF6",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_2",
"session_entropy": 0.117
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 282,
"timestamp": "2025-12-31T22:48:00Z",
"transaction_amount_usd": 0.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.37,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 322077.4,
"financial_exposure_usd": 409193.07,
"recoverable_pct": 0.195
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100934",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "critical",
"timestamp": "2026-01-01T15:34:00Z",
"trace_id": "2242b585-a859-a15a-92e0-0998a1719b1d"
} | {
"account_age_days": 1705,
"account_id": "ACCT-3F58FA585DB0",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_1",
"session_entropy": 0.733
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 117,
"timestamp": "2026-01-01T13:10:00Z",
"transaction_amount_usd": 6.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 652155.81,
"financial_exposure_usd": 862886.03,
"recoverable_pct": 0.01
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106425",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "medium",
"timestamp": "2026-01-05T11:05:00Z",
"trace_id": "1d9e6692-12b5-82df-f7ac-f49d0a88ee79"
} | {
"account_age_days": 1237,
"account_id": "ACCT-B956B8A0D16E",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.519
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1077,
"timestamp": "2026-01-05T11:05:00Z",
"transaction_amount_usd": 1221266.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4393560.22,
"financial_exposure_usd": 6488194.76,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104289",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-03T23:29:00Z",
"trace_id": "cb75abf0-6a52-ca6b-a806-5be575bd4697"
} | {
"account_age_days": 774,
"account_id": "ACCT-C2516A355696",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 162,
"timestamp": "2026-01-03T11:34:00Z",
"transaction_amount_usd": 19.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 54675.18,
"financial_exposure_usd": 79331.73,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102957",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-03T01:17:00Z",
"trace_id": "614e7c57-d05f-9492-087b-124e86793e3d"
} | {
"account_age_days": 1082,
"account_id": "ACCT-D90CC11390D8",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.845
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 570,
"timestamp": "2026-01-03T01:17:00Z",
"transaction_amount_usd": 97110.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.887,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 349467.11,
"financial_exposure_usd": 682952.92,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107321",
"label": "benign",
"label_confidence": 0.595,
"severity": "low",
"timestamp": "2026-01-06T02:01:00Z",
"trace_id": "e2446827-1dde-2d16-5d86-989c8c693fe4"
} | {
"account_age_days": 498,
"account_id": "ACCT-708E0E104027",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.777
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 630,
"timestamp": "2026-01-06T02:01:00Z",
"transaction_amount_usd": 13606.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2224.54,
"financial_exposure_usd": 3003.33,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101483",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-02T00:43:00Z",
"trace_id": "76fe043c-2630-e6b0-07ff-bb9249019e00"
} | {
"account_age_days": 1799,
"account_id": "ACCT-E1310F0E000B",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.784
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 166,
"timestamp": "2026-01-01T15:02:00Z",
"transaction_amount_usd": 4.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.402,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 345084.11,
"financial_exposure_usd": 553910.2,
"recoverable_pct": 0.025
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103302",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-03T07:02:00Z",
"trace_id": "b19e0762-988b-f72d-e4a1-37f7c8bc883f"
} | {
"account_age_days": 63,
"account_id": "ACCT-F892C8A03E50",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_3",
"session_entropy": 0.129
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 702,
"timestamp": "2026-01-03T07:02:00Z",
"transaction_amount_usd": 97153.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 725979.88,
"financial_exposure_usd": 1668773.4,
"recoverable_pct": 0.303
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101536",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "critical",
"timestamp": "2026-01-02T01:36:00Z",
"trace_id": "007ef8b4-ebfb-9cde-8ba1-6fbfe626f225"
} | {
"account_age_days": 1520,
"account_id": "ACCT-223425143869",
"baseline_risk_score": 0.584,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 779,
"timestamp": "2026-01-02T01:36:00Z",
"transaction_amount_usd": 98148.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 713648.25,
"financial_exposure_usd": 1024841.36,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102101",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-02T11:01:00Z",
"trace_id": "b4917408-58f0-407f-8edf-4c003f83542e"
} | {
"account_age_days": 1087,
"account_id": "ACCT-4B96C644E406",
"baseline_risk_score": 0.603,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 121,
"timestamp": "2026-01-02T07:26:00Z",
"transaction_amount_usd": 19.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.778,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 234634.32,
"financial_exposure_usd": 306954.35,
"recoverable_pct": 0.302
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106209",
"label": "fraudulent",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-05T07:29:00Z",
"trace_id": "0b2ba6f2-3e8d-9484-3f8b-cb4776cb6025"
} | {
"account_age_days": 1593,
"account_id": "ACCT-BD569F36879C",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 337,
"timestamp": "2026-01-05T01:10:00Z",
"transaction_amount_usd": 0.36
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 523257.77,
"financial_exposure_usd": 635244.83,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105048",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "medium",
"timestamp": "2026-01-04T12:08:00Z",
"trace_id": "f290ba97-1482-70b6-29aa-e11e351a0b00"
} | {
"account_age_days": 781,
"account_id": "ACCT-EC791652D42A",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 196,
"timestamp": "2026-01-04T00:10:00Z",
"transaction_amount_usd": 9.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.466,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2659771.87,
"financial_exposure_usd": 3264144.69,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100363",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-01T06:03:00Z",
"trace_id": "2a63c44e-e5c6-7b63-295c-1fe4f2c416f1"
} | {
"account_age_days": 644,
"account_id": "ACCT-0062050E13F5",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_3",
"session_entropy": 0.219
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 667,
"timestamp": "2026-01-01T06:03:00Z",
"transaction_amount_usd": 11738.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.899,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 311032.52,
"financial_exposure_usd": 616714.86,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105185",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-04T14:25:00Z",
"trace_id": "9ec92632-244d-8ab2-468c-974588903307"
} | {
"account_age_days": 347,
"account_id": "ACCT-7F2112831FBC",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 339,
"timestamp": "2026-01-04T12:26:00Z",
"transaction_amount_usd": 0.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1613481.09,
"financial_exposure_usd": 2979338.19,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101028",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "high",
"timestamp": "2026-01-01T17:08:00Z",
"trace_id": "c180b76e-b5a4-160b-168c-76faa5298ef2"
} | {
"account_age_days": 1755,
"account_id": "ACCT-23A0C3671962",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_1",
"session_entropy": 0.392
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 484,
"timestamp": "2026-01-01T17:08:00Z",
"transaction_amount_usd": 9839.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 512749.53,
"financial_exposure_usd": 528347.38,
"recoverable_pct": 0.226
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103512",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-03T10:32:00Z",
"trace_id": "491c5fa3-410a-c938-159b-5d9b5dcb3016"
} | {
"account_age_days": 1203,
"account_id": "ACCT-568B81721150",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_2",
"session_entropy": 0.574
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 217,
"timestamp": "2026-01-03T10:32:00Z",
"transaction_amount_usd": 1124641.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2570110.11,
"financial_exposure_usd": 2759416.63,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100217",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-01T03:37:00Z",
"trace_id": "3036781c-c0d9-8272-e52e-1409b1a63ccf"
} | {
"account_age_days": 1405,
"account_id": "ACCT-59DEBC39E171",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_2",
"session_entropy": 0.907
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 227,
"timestamp": "2026-01-01T03:37:00Z",
"transaction_amount_usd": 116329.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.578,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 619156.47,
"financial_exposure_usd": 723795.87,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107591",
"label": "benign",
"label_confidence": 0.599,
"severity": "high",
"timestamp": "2026-01-06T06:31:00Z",
"trace_id": "eac9e41e-7450-d531-6f36-e8b8c388fb59"
} | {
"account_age_days": 1206,
"account_id": "ACCT-980EC33E2467",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.892
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 717,
"timestamp": "2026-01-06T06:31:00Z",
"transaction_amount_usd": 14643.58
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1814.44,
"financial_exposure_usd": 4053.97,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102744",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "critical",
"timestamp": "2026-01-02T21:44:00Z",
"trace_id": "5c9ff859-6a96-f5f6-b76d-d139014a0497"
} | {
"account_age_days": 1207,
"account_id": "ACCT-11245142129F",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_3",
"session_entropy": 0.915
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 474,
"timestamp": "2026-01-02T21:44:00Z",
"transaction_amount_usd": 88521.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 122498.31,
"financial_exposure_usd": 151575.18,
"recoverable_pct": 0.382
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101399",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-01T23:19:00Z",
"trace_id": "38856894-ef33-884b-e5e5-9a96c78cc784"
} | {
"account_age_days": 105,
"account_id": "ACCT-3E00470512CC",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_2",
"session_entropy": 0.651
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 397,
"timestamp": "2026-01-01T23:19:00Z",
"transaction_amount_usd": 75307.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.708,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 453536.81,
"financial_exposure_usd": 531601.63,
"recoverable_pct": 0.155
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103409",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-03T08:49:00Z",
"trace_id": "d879c196-fe57-820b-aec7-7e7ca4ccac14"
} | {
"account_age_days": 1148,
"account_id": "ACCT-081B5CC4D661",
"baseline_risk_score": 0.232,
"kyc_tier": "tier_1",
"session_entropy": 0.924
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 739,
"timestamp": "2026-01-03T08:49:00Z",
"transaction_amount_usd": 802152.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1174759.91,
"financial_exposure_usd": 1246815.18,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108193",
"label": "benign",
"label_confidence": 0.508,
"severity": "low",
"timestamp": "2026-01-06T16:33:00Z",
"trace_id": "df8222ae-32d8-c8ac-13ed-d5a8aaf7cca5"
} | {
"account_age_days": 684,
"account_id": "ACCT-ED383825A448",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.731
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 319,
"timestamp": "2026-01-06T13:14:00Z",
"transaction_amount_usd": 0.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1223.02,
"financial_exposure_usd": 1669.01,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103525",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-03T10:45:00Z",
"trace_id": "67b1a509-f020-6e0a-ea65-e24bb91e0e86"
} | {
"account_age_days": 1028,
"account_id": "ACCT-BF6E70EC0F32",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 91,
"timestamp": "2026-01-03T02:37:00Z",
"transaction_amount_usd": 4.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1582943.75,
"financial_exposure_usd": 2798263.42,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.