schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105395",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "critical",
"timestamp": "2026-01-04T17:55:00Z",
"trace_id": "a0b98eb6-36e5-11e3-8c74-37bb16452f1f"
} | {
"account_age_days": 642,
"account_id": "ACCT-D03563921A2A",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.787
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1200,
"timestamp": "2026-01-04T17:55:00Z",
"transaction_amount_usd": 1555509.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.629,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4128815.05,
"financial_exposure_usd": 6673884.04,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106054",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "medium",
"timestamp": "2026-01-05T04:54:00Z",
"trace_id": "9230bea3-381b-ab13-defd-09e90ff76d58"
} | {
"account_age_days": 1966,
"account_id": "ACCT-BAF77B0F51BA",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.708
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 209,
"timestamp": "2026-01-04T19:56:00Z",
"transaction_amount_usd": 21.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3562207.11,
"financial_exposure_usd": 4191035.77,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105224",
"label": "fraudulent",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-04T15:04:00Z",
"trace_id": "12b40460-54c1-0c3b-9f6d-42ce4a806629"
} | {
"account_age_days": 92,
"account_id": "ACCT-60092123FD21",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 90,
"timestamp": "2026-01-04T10:17:00Z",
"transaction_amount_usd": 22.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5734885.27,
"financial_exposure_usd": 6325154.01,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101150",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-01T19:10:00Z",
"trace_id": "7f2e4e39-b97d-20d5-ed51-e557dec71b3f"
} | {
"account_age_days": 1008,
"account_id": "ACCT-5B4554CB54DE",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_1",
"session_entropy": 0.186
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 918,
"timestamp": "2026-01-01T19:10:00Z",
"transaction_amount_usd": 78732.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.464,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 449562.16,
"financial_exposure_usd": 731774.37,
"recoverable_pct": 0.354
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108131",
"label": "benign",
"label_confidence": 0.745,
"severity": "low",
"timestamp": "2026-01-06T15:31:00Z",
"trace_id": "edd7743c-e820-ac8f-ad52-ab18d95613fa"
} | {
"account_age_days": 448,
"account_id": "ACCT-8D05A30FA378",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.852
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1128,
"timestamp": "2026-01-06T15:31:00Z",
"transaction_amount_usd": 4182.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1193.14,
"financial_exposure_usd": 1617.91,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103799",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "medium",
"timestamp": "2026-01-03T15:19:00Z",
"trace_id": "9c0203ef-130e-6cd8-7a9d-f8874281c1b6"
} | {
"account_age_days": 362,
"account_id": "ACCT-1E969DEA6F9E",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_2",
"session_entropy": 0.233
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 789,
"timestamp": "2026-01-03T15:19:00Z",
"transaction_amount_usd": 1978391.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1106134.51,
"financial_exposure_usd": 2366547.07,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100006",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-01T00:06:00Z",
"trace_id": "abae4f43-bcae-8081-bdf0-70aaf0b5156b"
} | {
"account_age_days": 305,
"account_id": "ACCT-7E8F8095624C",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.44
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 335,
"timestamp": "2026-01-01T00:06:00Z",
"transaction_amount_usd": 8861.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.886,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 549139.19,
"financial_exposure_usd": 633340.37,
"recoverable_pct": 0.186
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100821",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-01T13:41:00Z",
"trace_id": "7b8104c5-518a-19e4-29b9-aa24f833c0a2"
} | {
"account_age_days": 1709,
"account_id": "ACCT-2F4AEA4774D6",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1158,
"timestamp": "2026-01-01T13:41:00Z",
"transaction_amount_usd": 8740.76
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 417113.3,
"financial_exposure_usd": 586122.99,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101937",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-02T08:17:00Z",
"trace_id": "83e26ad2-d049-1449-ccab-aff386a5076e"
} | {
"account_age_days": 185,
"account_id": "ACCT-347013641033",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_2",
"session_entropy": 0.909
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 159,
"timestamp": "2026-01-02T03:58:00Z",
"transaction_amount_usd": 11.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 335383.8,
"financial_exposure_usd": 799048.93,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106200",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-05T07:20:00Z",
"trace_id": "79e96784-d2b0-2ab0-915f-d76e14297ee8"
} | {
"account_age_days": 1773,
"account_id": "ACCT-317F45D6F962",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.142
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 952,
"timestamp": "2026-01-05T07:20:00Z",
"transaction_amount_usd": 812243.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.846,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1453990.59,
"financial_exposure_usd": 2377837.31,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102772",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "low",
"timestamp": "2026-01-02T22:12:00Z",
"trace_id": "b145beb9-5a11-f6ea-c57f-9b7e6d572d86"
} | {
"account_age_days": 994,
"account_id": "ACCT-FE2A42CFBFD8",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_2",
"session_entropy": 0.219
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 719,
"timestamp": "2026-01-02T22:12:00Z",
"transaction_amount_usd": 114005.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 624981.68,
"financial_exposure_usd": 1222650.97,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101805",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "low",
"timestamp": "2026-01-02T06:05:00Z",
"trace_id": "33b5001c-2058-f28d-4d91-007078eb7164"
} | {
"account_age_days": 704,
"account_id": "ACCT-35F5C15839D3",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_3",
"session_entropy": 0.925
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 620,
"timestamp": "2026-01-02T06:05:00Z",
"transaction_amount_usd": 16269.21
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.67,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 683877.19,
"financial_exposure_usd": 859144.27,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103091",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-03T03:31:00Z",
"trace_id": "d36e7a94-7019-00f2-9f8d-fd6ea028838d"
} | {
"account_age_days": 1925,
"account_id": "ACCT-9E59DAA05AFA",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 225,
"timestamp": "2026-01-03T03:31:00Z",
"transaction_amount_usd": 91727.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.701,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 378160.38,
"financial_exposure_usd": 694542.5,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101710",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-02T04:30:00Z",
"trace_id": "f8350cf9-7ead-9060-3f09-906320674287"
} | {
"account_age_days": 1872,
"account_id": "ACCT-C51CE03238E6",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_3",
"session_entropy": 0.523
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 466,
"timestamp": "2026-01-02T04:30:00Z",
"transaction_amount_usd": 63753.62
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.727,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 398181.85,
"financial_exposure_usd": 443397.55,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109375",
"label": "benign",
"label_confidence": 0.646,
"severity": "low",
"timestamp": "2026-01-07T12:15:00Z",
"trace_id": "3869ed7c-0d60-aacf-2224-c76395065e39"
} | {
"account_age_days": 625,
"account_id": "ACCT-84EB84CE4291",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 614,
"timestamp": "2026-01-07T12:15:00Z",
"transaction_amount_usd": 12571.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2212.19,
"financial_exposure_usd": 5034.01,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103657",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "high",
"timestamp": "2026-01-03T12:57:00Z",
"trace_id": "1bca235c-f327-d945-7c82-8e9bf7b91f8d"
} | {
"account_age_days": 755,
"account_id": "ACCT-8952EF9B457B",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 230,
"timestamp": "2026-01-03T09:04:00Z",
"transaction_amount_usd": 0.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.359,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4350341.27,
"financial_exposure_usd": 7515036.7,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103436",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "low",
"timestamp": "2026-01-03T09:16:00Z",
"trace_id": "62dd7ed7-a9d8-90a4-683f-1c0f393ed9f4"
} | {
"account_age_days": 567,
"account_id": "ACCT-613416E728B7",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.359
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 276,
"timestamp": "2026-01-03T09:16:00Z",
"transaction_amount_usd": 987931.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2247328.1,
"financial_exposure_usd": 4383374.48,
"recoverable_pct": 0.854
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105648",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-04T22:08:00Z",
"trace_id": "34c37164-b0f8-0902-ef83-eabf3409f5be"
} | {
"account_age_days": 858,
"account_id": "ACCT-B70038593572",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.178
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 868,
"timestamp": "2026-01-04T22:08:00Z",
"transaction_amount_usd": 51757.59
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5992010.83,
"financial_exposure_usd": 7301757.23,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108517",
"label": "benign",
"label_confidence": 0.488,
"severity": "medium",
"timestamp": "2026-01-06T21:57:00Z",
"trace_id": "c6645234-4a2f-c5e5-dabf-89641e58a329"
} | {
"account_age_days": 220,
"account_id": "ACCT-436992E59C89",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.653
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 583,
"timestamp": "2026-01-06T21:57:00Z",
"transaction_amount_usd": 13909.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2119.73,
"financial_exposure_usd": 3003.78,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108934",
"label": "benign",
"label_confidence": 0.653,
"severity": "low",
"timestamp": "2026-01-07T04:54:00Z",
"trace_id": "ead5ffc3-fd35-3098-93ce-49e2abfd15e0"
} | {
"account_age_days": 101,
"account_id": "ACCT-8CD1C6C9C29E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.809
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 366,
"timestamp": "2026-01-07T04:12:00Z",
"transaction_amount_usd": 7.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 619.82,
"financial_exposure_usd": 626.02,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103355",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-03T07:55:00Z",
"trace_id": "0a267ac8-f92b-3515-7ae3-b45aeb1dde3b"
} | {
"account_age_days": 663,
"account_id": "ACCT-F804BB852AE4",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_1",
"session_entropy": 0.567
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 395,
"timestamp": "2026-01-03T06:03:00Z",
"transaction_amount_usd": 24.13
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.447,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1905886.65,
"financial_exposure_usd": 3880606.2,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105064",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "low",
"timestamp": "2026-01-04T12:24:00Z",
"trace_id": "be42801c-e9f5-7361-7047-0cf36d7fcfeb"
} | {
"account_age_days": 369,
"account_id": "ACCT-96419E0A5E7E",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 190,
"timestamp": "2026-01-04T09:51:00Z",
"transaction_amount_usd": 3.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2946918.74,
"financial_exposure_usd": 5271384.6,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109875",
"label": "benign",
"label_confidence": 0.544,
"severity": "medium",
"timestamp": "2026-01-07T20:35:00Z",
"trace_id": "1b724567-7689-b190-d493-8800901a8b02"
} | {
"account_age_days": 1413,
"account_id": "ACCT-F356BDE04054",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.561
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 121,
"timestamp": "2026-01-07T11:17:00Z",
"transaction_amount_usd": 22.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.727,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3967.83,
"financial_exposure_usd": 7208.59,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101821",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "critical",
"timestamp": "2026-01-02T06:21:00Z",
"trace_id": "647cee40-5f02-b5ab-5ea5-2b8124c9d330"
} | {
"account_age_days": 391,
"account_id": "ACCT-EA8C71BD2953",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_1",
"session_entropy": 0.199
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 258,
"timestamp": "2026-01-01T19:10:00Z",
"transaction_amount_usd": 0.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.695,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 665774.66,
"financial_exposure_usd": 1035496.27,
"recoverable_pct": 0.377
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105497",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-04T19:37:00Z",
"trace_id": "3c98d5e9-9fb2-6a79-dee9-ea7b3077c52f"
} | {
"account_age_days": 1651,
"account_id": "ACCT-3CBFA27EBA8C",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_1",
"session_entropy": 0.772
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 613,
"timestamp": "2026-01-04T19:37:00Z",
"transaction_amount_usd": 1459818.86
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.379,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3148172.48,
"financial_exposure_usd": 3251110.98,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108661",
"label": "benign",
"label_confidence": 0.478,
"severity": "medium",
"timestamp": "2026-01-07T00:21:00Z",
"trace_id": "ea8829ed-09f0-1902-1e8e-140389d3f3b6"
} | {
"account_age_days": 257,
"account_id": "ACCT-E30C99CB7C49",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.371
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 232,
"timestamp": "2026-01-06T16:01:00Z",
"transaction_amount_usd": 9.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3467.72,
"financial_exposure_usd": 3629.93,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108590",
"label": "benign",
"label_confidence": 0.525,
"severity": "low",
"timestamp": "2026-01-06T23:10:00Z",
"trace_id": "59492eda-d8c7-8b25-312f-72fa36a6a85f"
} | {
"account_age_days": 1189,
"account_id": "ACCT-36CBD4582D64",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 306,
"timestamp": "2026-01-06T17:12:00Z",
"transaction_amount_usd": 21.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 6649.91,
"financial_exposure_usd": 7966.96,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103011",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "medium",
"timestamp": "2026-01-03T02:11:00Z",
"trace_id": "40a32a45-7d97-2947-7dd6-0ae0e26805c0"
} | {
"account_age_days": 911,
"account_id": "ACCT-51915D8902D4",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 662,
"timestamp": "2026-01-03T02:11:00Z",
"transaction_amount_usd": 49056.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 661386.27,
"financial_exposure_usd": 935934.5,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104365",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-04T00:45:00Z",
"trace_id": "5213671c-a966-5da9-a8fe-8a524250fd47"
} | {
"account_age_days": 1840,
"account_id": "ACCT-C6A4EA3A539F",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.304
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 990,
"timestamp": "2026-01-04T00:45:00Z",
"transaction_amount_usd": 1912952.94
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3155393.19,
"financial_exposure_usd": 3743360.02,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108474",
"label": "benign",
"label_confidence": 0.487,
"severity": "medium",
"timestamp": "2026-01-06T21:14:00Z",
"trace_id": "3f461c3d-d176-7294-19a1-d520b8700e72"
} | {
"account_age_days": 1378,
"account_id": "ACCT-7AD6E8E8A4A9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.798
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 264,
"timestamp": "2026-01-06T21:14:00Z",
"transaction_amount_usd": 4915.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.5,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 1276.2,
"financial_exposure_usd": 1689.54,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102381",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "critical",
"timestamp": "2026-01-02T15:41:00Z",
"trace_id": "8d19df57-a6cc-9064-cf8b-4b7f2c4c4c5c"
} | {
"account_age_days": 1533,
"account_id": "ACCT-CF7705C0267E",
"baseline_risk_score": 0.552,
"kyc_tier": "tier_1",
"session_entropy": 0.495
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 548,
"timestamp": "2026-01-02T15:41:00Z",
"transaction_amount_usd": 25035.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 927582.04,
"financial_exposure_usd": 1015931.34,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107464",
"label": "benign",
"label_confidence": 0.672,
"severity": "critical",
"timestamp": "2026-01-06T04:24:00Z",
"trace_id": "63845a1e-6e16-6825-3d56-3a4bf36cef30"
} | {
"account_age_days": 1631,
"account_id": "ACCT-10898952272E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.238
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 564,
"timestamp": "2026-01-06T04:24:00Z",
"transaction_amount_usd": 10736.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2082.06,
"financial_exposure_usd": 5169.28,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107259",
"label": "benign",
"label_confidence": 0.63,
"severity": "low",
"timestamp": "2026-01-06T00:59:00Z",
"trace_id": "2341c252-6718-1257-76f3-c0c4b1df4b1f"
} | {
"account_age_days": 1824,
"account_id": "ACCT-8BA00C188370",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.527
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1127,
"timestamp": "2026-01-06T00:59:00Z",
"transaction_amount_usd": 9526.13
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1629.05,
"financial_exposure_usd": 3447.52,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104758",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "medium",
"timestamp": "2026-01-04T07:18:00Z",
"trace_id": "101841af-3e3d-dff4-d60b-c44626eea20d"
} | {
"account_age_days": 1778,
"account_id": "ACCT-A2058C835ED4",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_3",
"session_entropy": 0.453
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 270,
"timestamp": "2026-01-04T05:51:00Z",
"transaction_amount_usd": 6.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3898989.64,
"financial_exposure_usd": 4787385.72,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106790",
"label": "benign",
"label_confidence": 0.571,
"severity": "low",
"timestamp": "2026-01-05T17:10:00Z",
"trace_id": "052599f8-0e54-224c-fd6e-a3d108b5c4ab"
} | {
"account_age_days": 1878,
"account_id": "ACCT-116844B1BDAE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.949
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 740,
"timestamp": "2026-01-05T17:10:00Z",
"transaction_amount_usd": 2529
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1550.18,
"financial_exposure_usd": 1733.27,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104985",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-04T11:05:00Z",
"trace_id": "ea38aeb8-f433-28d7-fea5-0f9bf70379ea"
} | {
"account_age_days": 1212,
"account_id": "ACCT-5BCA78B6B51A",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.599
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 543,
"timestamp": "2026-01-04T11:05:00Z",
"transaction_amount_usd": 2207084.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2833502.29,
"financial_exposure_usd": 5080549.2,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104313",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "high",
"timestamp": "2026-01-03T23:53:00Z",
"trace_id": "5d6352df-9e4b-0203-2baa-96b5ab97b6e0"
} | {
"account_age_days": 530,
"account_id": "ACCT-8DF56981F249",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 921,
"timestamp": "2026-01-03T23:53:00Z",
"transaction_amount_usd": 2285234.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.895,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6662336.51,
"financial_exposure_usd": 7372953.21,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109076",
"label": "benign",
"label_confidence": 0.554,
"severity": "medium",
"timestamp": "2026-01-07T07:16:00Z",
"trace_id": "d487ec20-53cf-cc79-432c-47536b942934"
} | {
"account_age_days": 1896,
"account_id": "ACCT-56AE685FB815",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.629
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 193,
"timestamp": "2026-01-07T00:09:00Z",
"transaction_amount_usd": 11.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 556.28,
"financial_exposure_usd": 1346.62,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109301",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-07T11:01:00Z",
"trace_id": "fcbf3222-7cf4-d489-0a59-6f722d7f29b6"
} | {
"account_age_days": 1481,
"account_id": "ACCT-D209FF22D1F4",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.468
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 292,
"timestamp": "2026-01-07T00:35:00Z",
"transaction_amount_usd": 12.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3833.83,
"financial_exposure_usd": 6437.31,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104591",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "critical",
"timestamp": "2026-01-04T04:31:00Z",
"trace_id": "aba14598-d699-8895-f903-0d7fa496b5d6"
} | {
"account_age_days": 405,
"account_id": "ACCT-6172FD5569C1",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.745
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 294,
"timestamp": "2026-01-03T21:22:00Z",
"transaction_amount_usd": 4.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1777832.76,
"financial_exposure_usd": 3700136.16,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103058",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "critical",
"timestamp": "2026-01-03T02:58:00Z",
"trace_id": "6cce70c6-4425-2ed6-48bf-c0cfc41c65e4"
} | {
"account_age_days": 1780,
"account_id": "ACCT-D2371C14B1A9",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.539
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 690,
"timestamp": "2026-01-03T02:58:00Z",
"transaction_amount_usd": 48741.1
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.886,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 834494.92,
"financial_exposure_usd": 1205735.84,
"recoverable_pct": 0.305
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102546",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-02T18:26:00Z",
"trace_id": "77666893-8519-9b2f-310a-d1fefefef7c0"
} | {
"account_age_days": 964,
"account_id": "ACCT-DEC999C58731",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_1",
"session_entropy": 0.859
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 255,
"timestamp": "2026-01-02T09:23:00Z",
"transaction_amount_usd": 18.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 369691.91,
"financial_exposure_usd": 690986.63,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107975",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-06T12:55:00Z",
"trace_id": "aee53b8a-07b7-e750-4755-7fe6ab034af9"
} | {
"account_age_days": 158,
"account_id": "ACCT-39E09DF26C9B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.434
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 107,
"timestamp": "2026-01-06T12:55:00Z",
"transaction_amount_usd": 11385.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5834.14,
"financial_exposure_usd": 6362.09,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104545",
"label": "fraudulent",
"label_confidence": 0.653,
"severity": "high",
"timestamp": "2026-01-04T03:45:00Z",
"trace_id": "a2b667b2-53fe-879b-c02d-7dcc42d7e56a"
} | {
"account_age_days": 1925,
"account_id": "ACCT-91B4DD428B24",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 810,
"timestamp": "2026-01-04T03:45:00Z",
"transaction_amount_usd": 1577514.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3811099.7,
"financial_exposure_usd": 7201061.98,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108237",
"label": "benign",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-06T17:17:00Z",
"trace_id": "e6b8d8aa-0b31-095a-123c-5f476da712c0"
} | {
"account_age_days": 1953,
"account_id": "ACCT-54D29B029C59",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.92
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 173,
"timestamp": "2026-01-06T06:35:00Z",
"transaction_amount_usd": 8.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2334.8,
"financial_exposure_usd": 5004.88,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106340",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "low",
"timestamp": "2026-01-05T09:40:00Z",
"trace_id": "af19dd97-7bc3-eba5-6d2a-c0580249e808"
} | {
"account_age_days": 1228,
"account_id": "ACCT-8550902BDBDA",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_1",
"session_entropy": 0.793
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 685,
"timestamp": "2026-01-05T09:40:00Z",
"transaction_amount_usd": 2642156.83
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6087132.58,
"financial_exposure_usd": 6651489.02,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109492",
"label": "benign",
"label_confidence": 0.562,
"severity": "low",
"timestamp": "2026-01-07T14:12:00Z",
"trace_id": "eb03c7c0-e557-cb1d-0d11-8252ed2df896"
} | {
"account_age_days": 1980,
"account_id": "ACCT-C2CF4D30B6D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.492
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 159,
"timestamp": "2026-01-07T14:12:00Z",
"transaction_amount_usd": 8713.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1920.49,
"financial_exposure_usd": 2251.05,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109393",
"label": "benign",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-07T12:33:00Z",
"trace_id": "6886ea09-799a-5559-f87f-350c94e9c8a9"
} | {
"account_age_days": 1267,
"account_id": "ACCT-DCCD99E1A0F0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.356
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 581,
"timestamp": "2026-01-07T12:33:00Z",
"transaction_amount_usd": 6861.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3565.23,
"financial_exposure_usd": 4166.52,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101076",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-01T17:56:00Z",
"trace_id": "40a97916-c92e-d274-f835-8c78a44e33f2"
} | {
"account_age_days": 999,
"account_id": "ACCT-6284B8DB063F",
"baseline_risk_score": 0.587,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 165,
"timestamp": "2026-01-01T16:39:00Z",
"transaction_amount_usd": 19.71
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.677,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 727040.57,
"financial_exposure_usd": 901976.95,
"recoverable_pct": 0.387
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105490",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "medium",
"timestamp": "2026-01-04T19:30:00Z",
"trace_id": "a04ae759-889e-e82c-33de-1cef4376b6e2"
} | {
"account_age_days": 80,
"account_id": "ACCT-D7F3234A2FCF",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.608
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 309,
"timestamp": "2026-01-04T18:14:00Z",
"transaction_amount_usd": 6.62
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5512566.11,
"financial_exposure_usd": 6885648.88,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101279",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-01T21:19:00Z",
"trace_id": "9aac7ac7-2ff4-fa8a-7f9a-c76e330739d1"
} | {
"account_age_days": 1160,
"account_id": "ACCT-5B2DA8BD52CE",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_3",
"session_entropy": 0.231
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 360,
"timestamp": "2026-01-01T21:19:00Z",
"transaction_amount_usd": 92810.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.809,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 932824.64,
"financial_exposure_usd": 997289.13,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101955",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "high",
"timestamp": "2026-01-02T08:35:00Z",
"trace_id": "09ba054c-e2a4-9ab3-e195-57b3b6f3b4ad"
} | {
"account_age_days": 1614,
"account_id": "ACCT-2DCA1357819B",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 154,
"timestamp": "2026-01-02T08:35:00Z",
"transaction_amount_usd": 34964.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 451763.48,
"financial_exposure_usd": 950419.93,
"recoverable_pct": 0.26
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102104",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-02T11:04:00Z",
"trace_id": "4ae26fe1-d40b-e6bb-091e-02b593f33dd8"
} | {
"account_age_days": 1352,
"account_id": "ACCT-3D91EBAA1513",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_1",
"session_entropy": 0.919
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 308,
"timestamp": "2026-01-01T23:00:00Z",
"transaction_amount_usd": 19.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.502,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 826283.28,
"financial_exposure_usd": 1264586.39,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104721",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "critical",
"timestamp": "2026-01-04T06:41:00Z",
"trace_id": "20886bfe-c903-ad66-d18d-af89109e13f9"
} | {
"account_age_days": 127,
"account_id": "ACCT-144A519B13DE",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.609
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 90,
"timestamp": "2026-01-03T21:20:00Z",
"transaction_amount_usd": 15.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 962774.7,
"financial_exposure_usd": 2177742.69,
"recoverable_pct": 0.932
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106852",
"label": "benign",
"label_confidence": 0.53,
"severity": "medium",
"timestamp": "2026-01-05T18:12:00Z",
"trace_id": "a102e74c-c72f-2b42-7de8-f8035d962dd0"
} | {
"account_age_days": 817,
"account_id": "ACCT-230F2BBDA63B",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 391,
"timestamp": "2026-01-05T16:15:00Z",
"transaction_amount_usd": 0.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2955.74,
"financial_exposure_usd": 6133.71,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108529",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-06T22:09:00Z",
"trace_id": "75ae4c40-b6b5-ef43-f5d9-3aff6deed83d"
} | {
"account_age_days": 1106,
"account_id": "ACCT-F65F5B1ADF71",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_1",
"session_entropy": 0.808
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 172,
"timestamp": "2026-01-06T21:51:00Z",
"transaction_amount_usd": 14.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4786.44,
"financial_exposure_usd": 6171.3,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104115",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "low",
"timestamp": "2026-01-03T20:35:00Z",
"trace_id": "d0760a0d-e28a-a888-4f86-99e0721699ca"
} | {
"account_age_days": 1900,
"account_id": "ACCT-C463E53F47DB",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.836
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 626,
"timestamp": "2026-01-03T20:35:00Z",
"transaction_amount_usd": 2076774.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 9235840.96,
"financial_exposure_usd": 9254233.94,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109883",
"label": "benign",
"label_confidence": 0.629,
"severity": "critical",
"timestamp": "2026-01-07T20:43:00Z",
"trace_id": "124d7c86-f651-b57f-144a-29cdc866df16"
} | {
"account_age_days": 953,
"account_id": "ACCT-95608166B5A9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.686
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 321,
"timestamp": "2026-01-07T15:35:00Z",
"transaction_amount_usd": 19.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1674.18,
"financial_exposure_usd": 3649.11,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102058",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-02T10:18:00Z",
"trace_id": "8861a752-5dcd-c3e2-aac9-c65e255d96e8"
} | {
"account_age_days": 212,
"account_id": "ACCT-5974041E87B6",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 223,
"timestamp": "2026-01-02T01:22:00Z",
"transaction_amount_usd": 9.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.369,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 526685.68,
"financial_exposure_usd": 1036051.99,
"recoverable_pct": 0.195
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109544",
"label": "benign",
"label_confidence": 0.67,
"severity": "medium",
"timestamp": "2026-01-07T15:04:00Z",
"trace_id": "9f98f8f5-e5e6-839f-440b-6191c22f3fa3"
} | {
"account_age_days": 1766,
"account_id": "ACCT-87F374D20A91",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.839
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 99,
"timestamp": "2026-01-07T10:06:00Z",
"transaction_amount_usd": 8.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 9947.07,
"financial_exposure_usd": 10227.57,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104796",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-04T07:56:00Z",
"trace_id": "dd8af7c5-9ad2-fff2-32e2-511331ec72a5"
} | {
"account_age_days": 1129,
"account_id": "ACCT-095566155A4C",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.642
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 360,
"timestamp": "2026-01-04T07:56:00Z",
"transaction_amount_usd": 1048723.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.844,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 535860.69,
"financial_exposure_usd": 1126561.32,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106348",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "medium",
"timestamp": "2026-01-05T09:48:00Z",
"trace_id": "ad6e5a8e-ae47-45e1-8493-c95b7f20c3a9"
} | {
"account_age_days": 168,
"account_id": "ACCT-DA5ED679848D",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_1",
"session_entropy": 0.615
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1172,
"timestamp": "2026-01-05T09:48:00Z",
"transaction_amount_usd": 2797368.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.914,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3571449.03,
"financial_exposure_usd": 5900494.01,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106934",
"label": "benign",
"label_confidence": 0.482,
"severity": "medium",
"timestamp": "2026-01-05T19:34:00Z",
"trace_id": "895c8bc9-236d-fde6-5fe1-5d3e76f438b7"
} | {
"account_age_days": 800,
"account_id": "ACCT-D99EFCF4D5F6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.714
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1174,
"timestamp": "2026-01-05T19:34:00Z",
"transaction_amount_usd": 524.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1331.64,
"financial_exposure_usd": 1573.82,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101422",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-01T23:42:00Z",
"trace_id": "e8dc9257-f39f-f1a3-c01c-dde90605124b"
} | {
"account_age_days": 915,
"account_id": "ACCT-DD53BD11C0EC",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_1",
"session_entropy": 0.419
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1198,
"timestamp": "2026-01-01T23:42:00Z",
"transaction_amount_usd": 21921.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.936,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1017008.76,
"financial_exposure_usd": 1026229.56,
"recoverable_pct": 0.144
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105238",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-04T15:18:00Z",
"trace_id": "1b68da04-322f-16f9-7ce0-a9e2be7a59c6"
} | {
"account_age_days": 22,
"account_id": "ACCT-6D88CBE6D79E",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 384,
"timestamp": "2026-01-04T06:41:00Z",
"transaction_amount_usd": 7.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1848985.26,
"financial_exposure_usd": 4228898.25,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109676",
"label": "benign",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-07T17:16:00Z",
"trace_id": "6786fcc8-bc3c-b717-45a7-e29a5f212f58"
} | {
"account_age_days": 1390,
"account_id": "ACCT-93A7A8E82C8E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.29
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 200,
"timestamp": "2026-01-07T05:37:00Z",
"transaction_amount_usd": 22.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3403.83,
"financial_exposure_usd": 5694.54,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101073",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-01T17:53:00Z",
"trace_id": "60d29cbb-8fbe-1864-28fe-9271c5e9f0d9"
} | {
"account_age_days": 1080,
"account_id": "ACCT-2EBD9FFB9CCC",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_2",
"session_entropy": 0.307
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 181,
"timestamp": "2026-01-01T17:53:00Z",
"transaction_amount_usd": 8707.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.491,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 537125.66,
"financial_exposure_usd": 978258.84,
"recoverable_pct": 0.124
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108932",
"label": "benign",
"label_confidence": 0.453,
"severity": "high",
"timestamp": "2026-01-07T04:52:00Z",
"trace_id": "c0b5ba03-7bd8-6f9c-80f2-51d17b80b7e1"
} | {
"account_age_days": 1225,
"account_id": "ACCT-BD02588D6423",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.648
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 958,
"timestamp": "2026-01-07T04:52:00Z",
"transaction_amount_usd": 13658.75
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4059.86,
"financial_exposure_usd": 4709.88,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102018",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-02T09:38:00Z",
"trace_id": "6501b157-ac84-da5f-a67f-b9aa43d41df5"
} | {
"account_age_days": 1333,
"account_id": "ACCT-EFEE599CDE37",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 90,
"timestamp": "2026-01-02T08:28:00Z",
"transaction_amount_usd": 12.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.946,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 545335.97,
"financial_exposure_usd": 702901.74,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105493",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-04T19:33:00Z",
"trace_id": "1fc36d8b-f727-265a-f6eb-88caf829f9cc"
} | {
"account_age_days": 1444,
"account_id": "ACCT-0FC723226F95",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_1",
"session_entropy": 0.593
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 729,
"timestamp": "2026-01-04T19:33:00Z",
"transaction_amount_usd": 138401.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1252353.94,
"financial_exposure_usd": 1494993.2,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107248",
"label": "benign",
"label_confidence": 0.66,
"severity": "critical",
"timestamp": "2026-01-06T00:48:00Z",
"trace_id": "2165151f-5629-ee51-8f79-f3ff6e868215"
} | {
"account_age_days": 1594,
"account_id": "ACCT-A7F3799AC7EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.844
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 106,
"timestamp": "2026-01-05T18:11:00Z",
"transaction_amount_usd": 1.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2277.7,
"financial_exposure_usd": 4599.95,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107565",
"label": "benign",
"label_confidence": 0.736,
"severity": "critical",
"timestamp": "2026-01-06T06:05:00Z",
"trace_id": "2bfa5d8a-8846-5e47-e389-e579b397419b"
} | {
"account_age_days": 1770,
"account_id": "ACCT-36FCD95A6FC4",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.878
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1126,
"timestamp": "2026-01-06T06:05:00Z",
"transaction_amount_usd": 377.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1727.23,
"financial_exposure_usd": 3068.41,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104083",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "critical",
"timestamp": "2026-01-03T20:03:00Z",
"trace_id": "ee787c79-c2f8-ed54-da4d-8801ab45fd94"
} | {
"account_age_days": 1943,
"account_id": "ACCT-0D71230FE9C0",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_3",
"session_entropy": 0.192
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 399,
"timestamp": "2026-01-03T11:28:00Z",
"transaction_amount_usd": 16.55
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.415,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1140737.03,
"financial_exposure_usd": 1699280.24,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104747",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "critical",
"timestamp": "2026-01-04T07:07:00Z",
"trace_id": "1dbd3bcb-0760-1e33-5912-96bfa5016f28"
} | {
"account_age_days": 1688,
"account_id": "ACCT-0B6BFF1E32B8",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_2",
"session_entropy": 0.17
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 199,
"timestamp": "2026-01-04T07:07:00Z",
"transaction_amount_usd": 1475485.82
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.668,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4766234.12,
"financial_exposure_usd": 7023846.15,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102811",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-02T22:51:00Z",
"trace_id": "2ff71e49-9e41-5997-d2d7-cd6c9fbbf7e0"
} | {
"account_age_days": 1984,
"account_id": "ACCT-27A8B6BCC788",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_3",
"session_entropy": 0.632
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 182,
"timestamp": "2026-01-02T22:51:00Z",
"transaction_amount_usd": 107333.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 574871.51,
"financial_exposure_usd": 777218.42,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102468",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-02T17:08:00Z",
"trace_id": "009d2bf8-c160-010f-3052-11083fdeb918"
} | {
"account_age_days": 168,
"account_id": "ACCT-209249F96583",
"baseline_risk_score": 0.603,
"kyc_tier": "tier_3",
"session_entropy": 0.279
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 275,
"timestamp": "2026-01-02T08:14:00Z",
"transaction_amount_usd": 4.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.385,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 452983.93,
"financial_exposure_usd": 1090011.41,
"recoverable_pct": 0.239
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104786",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-04T07:46:00Z",
"trace_id": "7d036cff-1752-7635-c7f5-83e706deb277"
} | {
"account_age_days": 1522,
"account_id": "ACCT-7E6156CD6F86",
"baseline_risk_score": 0.242,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 549,
"timestamp": "2026-01-04T07:46:00Z",
"transaction_amount_usd": 2351446.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.533,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1843982.2,
"financial_exposure_usd": 2058687.83,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109508",
"label": "benign",
"label_confidence": 0.576,
"severity": "medium",
"timestamp": "2026-01-07T14:28:00Z",
"trace_id": "c3d1b938-47f1-39e1-2e5c-f4ef40a21c48"
} | {
"account_age_days": 1025,
"account_id": "ACCT-9D34F5EE431C",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_3",
"session_entropy": 0.16
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 442,
"timestamp": "2026-01-07T14:28:00Z",
"transaction_amount_usd": 12814.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2485.51,
"financial_exposure_usd": 2643.75,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108980",
"label": "benign",
"label_confidence": 0.697,
"severity": "medium",
"timestamp": "2026-01-07T05:40:00Z",
"trace_id": "7698a0d8-b90a-ac3c-2b22-de93923ffd62"
} | {
"account_age_days": 1916,
"account_id": "ACCT-492C09475DDD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.656
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 792,
"timestamp": "2026-01-07T05:40:00Z",
"transaction_amount_usd": 6604.86
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 464.59,
"financial_exposure_usd": 830.1,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108239",
"label": "benign",
"label_confidence": 0.598,
"severity": "low",
"timestamp": "2026-01-06T17:19:00Z",
"trace_id": "28d89c51-eb3e-df6d-af76-1bd3f4dfb445"
} | {
"account_age_days": 316,
"account_id": "ACCT-EE1E8C096C82",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.512
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 696,
"timestamp": "2026-01-06T17:19:00Z",
"transaction_amount_usd": 676.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 859.7,
"financial_exposure_usd": 880.18,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104223",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-03T22:23:00Z",
"trace_id": "84759c7d-9a84-2a6c-484e-32bc0b5968f2"
} | {
"account_age_days": 1789,
"account_id": "ACCT-1E1445BD32AF",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.464
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 347,
"timestamp": "2026-01-03T15:45:00Z",
"transaction_amount_usd": 18.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2875256.44,
"financial_exposure_usd": 4018769.03,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107702",
"label": "benign",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-06T08:22:00Z",
"trace_id": "6db3aa5a-bb80-364c-3f00-b2346365c1ca"
} | {
"account_age_days": 410,
"account_id": "ACCT-DB4B017B5ADE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.432
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 358,
"timestamp": "2026-01-06T04:43:00Z",
"transaction_amount_usd": 3.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 820.12,
"financial_exposure_usd": 1771.66,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105396",
"label": "fraudulent",
"label_confidence": 0.697,
"severity": "high",
"timestamp": "2026-01-04T17:56:00Z",
"trace_id": "41181bf4-6382-997e-7e0a-c3c1b96dcbea"
} | {
"account_age_days": 494,
"account_id": "ACCT-66E5EFE9F1BD",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.871
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 951,
"timestamp": "2026-01-04T17:56:00Z",
"transaction_amount_usd": 1596128.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.36,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5414692.2,
"financial_exposure_usd": 8147225.73,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105515",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "low",
"timestamp": "2026-01-04T19:55:00Z",
"trace_id": "b21ead4d-8f48-1bfc-3997-5d1fd30e9d7c"
} | {
"account_age_days": 289,
"account_id": "ACCT-B130B06FDE6A",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_2",
"session_entropy": 0.283
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 393,
"timestamp": "2026-01-04T12:16:00Z",
"transaction_amount_usd": 22.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3667915.16,
"financial_exposure_usd": 4534847.24,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102192",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "critical",
"timestamp": "2026-01-02T12:32:00Z",
"trace_id": "55808d6f-94f3-2fe5-61f9-622a254d9a5d"
} | {
"account_age_days": 1415,
"account_id": "ACCT-457F8E40BFC4",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_1",
"session_entropy": 0.743
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 543,
"timestamp": "2026-01-02T12:32:00Z",
"transaction_amount_usd": 116813.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 675205.02,
"financial_exposure_usd": 689628.94,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104245",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "medium",
"timestamp": "2026-01-03T22:45:00Z",
"trace_id": "7621d9b4-5174-a334-852f-6eef108c0d3a"
} | {
"account_age_days": 65,
"account_id": "ACCT-3D71E0D1CBA7",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_1",
"session_entropy": 0.715
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 850,
"timestamp": "2026-01-03T22:45:00Z",
"transaction_amount_usd": 2542627.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2134162.84,
"financial_exposure_usd": 4623908.64,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105992",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "high",
"timestamp": "2026-01-05T03:52:00Z",
"trace_id": "0c0ddb59-fea0-98a7-53f4-0eed034ea1ff"
} | {
"account_age_days": 742,
"account_id": "ACCT-7C421CB0B6EA",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_3",
"session_entropy": 0.936
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 964,
"timestamp": "2026-01-05T03:52:00Z",
"transaction_amount_usd": 1820105.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.929,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2023478.11,
"financial_exposure_usd": 4982799.53,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106125",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-05T06:05:00Z",
"trace_id": "f363482e-ffdb-8c12-2321-d54b65dcb6a2"
} | {
"account_age_days": 88,
"account_id": "ACCT-B424B8260F19",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_2",
"session_entropy": 0.827
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 947,
"timestamp": "2026-01-05T06:05:00Z",
"transaction_amount_usd": 845979.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.466,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 669044.83,
"financial_exposure_usd": 1301349.8,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103075",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-03T03:15:00Z",
"trace_id": "4a485c4c-2ed6-86db-600f-ac8d8c6eb7b4"
} | {
"account_age_days": 718,
"account_id": "ACCT-30148BDCAAC1",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 335,
"timestamp": "2026-01-03T03:15:00Z",
"transaction_amount_usd": 18973.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 298350.01,
"financial_exposure_usd": 601274.46,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107758",
"label": "benign",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-06T09:18:00Z",
"trace_id": "fe0cbffb-b5f1-7f7d-f5b1-f3aa53350bee"
} | {
"account_age_days": 129,
"account_id": "ACCT-E901B88B2232",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 498,
"timestamp": "2026-01-06T09:18:00Z",
"transaction_amount_usd": 472.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5180.48,
"financial_exposure_usd": 7881.38,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107141",
"label": "benign",
"label_confidence": 0.724,
"severity": "low",
"timestamp": "2026-01-05T23:01:00Z",
"trace_id": "a8a628b8-704d-6c87-86f9-6889ca7e72fd"
} | {
"account_age_days": 625,
"account_id": "ACCT-BD505C5C05A9",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.619
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 470,
"timestamp": "2026-01-05T23:01:00Z",
"transaction_amount_usd": 12363.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4693.21,
"financial_exposure_usd": 5167.49,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103847",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "low",
"timestamp": "2026-01-03T16:07:00Z",
"trace_id": "1d6467c8-77a9-907c-47ea-32c261584663"
} | {
"account_age_days": 740,
"account_id": "ACCT-89E9573EEACB",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.178
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 118,
"timestamp": "2026-01-03T03:39:00Z",
"transaction_amount_usd": 22.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 9155993.31,
"financial_exposure_usd": 9530790.54,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102767",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-02T22:07:00Z",
"trace_id": "34ae7115-cef3-57dd-37bc-d1f232ac98ca"
} | {
"account_age_days": 1923,
"account_id": "ACCT-D2AD9FDDF5B5",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 567,
"timestamp": "2026-01-02T22:07:00Z",
"transaction_amount_usd": 29999.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.83,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 983237.78,
"financial_exposure_usd": 1005855.23,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109183",
"label": "benign",
"label_confidence": 0.682,
"severity": "low",
"timestamp": "2026-01-07T09:03:00Z",
"trace_id": "178b96a5-83cc-70ec-be7f-0a66bf96aff6"
} | {
"account_age_days": 92,
"account_id": "ACCT-48EF2B1F2D8E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.196
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 708,
"timestamp": "2026-01-07T09:03:00Z",
"transaction_amount_usd": 10388.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1019,
"financial_exposure_usd": 1782.42,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108181",
"label": "benign",
"label_confidence": 0.721,
"severity": "medium",
"timestamp": "2026-01-06T16:21:00Z",
"trace_id": "ba3886d9-9656-89e6-d331-4b80875f3789"
} | {
"account_age_days": 1160,
"account_id": "ACCT-73B10A0A5720",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.494
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 112,
"timestamp": "2026-01-06T11:20:00Z",
"transaction_amount_usd": 4.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1730.35,
"financial_exposure_usd": 2635.39,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100143",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-01T02:23:00Z",
"trace_id": "3ec8f48e-6d28-3989-1271-c87324bde1a8"
} | {
"account_age_days": 1467,
"account_id": "ACCT-627E91E1AF35",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.684
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 104,
"timestamp": "2026-01-01T02:23:00Z",
"transaction_amount_usd": 116461.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 548573.7,
"financial_exposure_usd": 1025920.84,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109856",
"label": "benign",
"label_confidence": 0.708,
"severity": "low",
"timestamp": "2026-01-07T20:16:00Z",
"trace_id": "4dee9a77-162c-4426-3414-479a018342cf"
} | {
"account_age_days": 574,
"account_id": "ACCT-89C50928B7D2",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 759,
"timestamp": "2026-01-07T20:16:00Z",
"transaction_amount_usd": 7313.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.5,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 3714.84,
"financial_exposure_usd": 4292.21,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105727",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "critical",
"timestamp": "2026-01-04T23:27:00Z",
"trace_id": "4d4ace1a-d7c9-f388-9102-741c4a4f4191"
} | {
"account_age_days": 403,
"account_id": "ACCT-0A539B8C0132",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_2",
"session_entropy": 0.197
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 190,
"timestamp": "2026-01-04T23:27:00Z",
"transaction_amount_usd": 266959.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 8122207.42,
"financial_exposure_usd": 8310836.48,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104880",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "critical",
"timestamp": "2026-01-04T09:20:00Z",
"trace_id": "e8111897-eef9-f5d7-d36d-a24c6c848cf5"
} | {
"account_age_days": 453,
"account_id": "ACCT-41E9A1D52E00",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_3",
"session_entropy": 0.375
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 350,
"timestamp": "2026-01-04T07:00:00Z",
"transaction_amount_usd": 10.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.39,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102072",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "low",
"timestamp": "2026-01-02T10:32:00Z",
"trace_id": "f9b12718-9920-94ff-b2e5-1a89614399fd"
} | {
"account_age_days": 1085,
"account_id": "ACCT-B89FA02BD5D9",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_3",
"session_entropy": 0.313
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 303,
"timestamp": "2026-01-02T10:32:00Z",
"transaction_amount_usd": 119478.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.612,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 232935.76,
"financial_exposure_usd": 455804.21,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.