schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108401",
"label": "benign",
"label_confidence": 0.721,
"severity": "high",
"timestamp": "2026-01-06T20:01:00Z",
"trace_id": "8a3f8f93-1a34-dce3-07a4-5ec1aace99ab"
} | {
"account_age_days": 1376,
"account_id": "ACCT-B9B2DD4E77A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.107
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 313,
"timestamp": "2026-01-06T10:48:00Z",
"transaction_amount_usd": 3.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1599.81,
"financial_exposure_usd": 2462.99,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105170",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-04T14:10:00Z",
"trace_id": "73e9774d-15e0-5191-ea37-369d0403574e"
} | {
"account_age_days": 1291,
"account_id": "ACCT-1C0E91092DA3",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_2",
"session_entropy": 0.621
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1019,
"timestamp": "2026-01-04T14:10:00Z",
"transaction_amount_usd": 2748321.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3791862.58,
"financial_exposure_usd": 4848988.26,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108421",
"label": "benign",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-06T20:21:00Z",
"trace_id": "b23098a0-a720-5b10-0842-41731204f418"
} | {
"account_age_days": 1815,
"account_id": "ACCT-11B132DB008C",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.4
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 396,
"timestamp": "2026-01-06T07:33:00Z",
"transaction_amount_usd": 13.42
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2233.81,
"financial_exposure_usd": 4293.48,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108423",
"label": "benign",
"label_confidence": 0.494,
"severity": "medium",
"timestamp": "2026-01-06T20:23:00Z",
"trace_id": "14337fed-1102-29e5-14cd-9a7da0ca04f2"
} | {
"account_age_days": 266,
"account_id": "ACCT-0B623A25FEAA",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.268
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 324,
"timestamp": "2026-01-06T15:10:00Z",
"transaction_amount_usd": 11.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.748,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2514.03,
"financial_exposure_usd": 3667.89,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109427",
"label": "benign",
"label_confidence": 0.561,
"severity": "high",
"timestamp": "2026-01-07T13:07:00Z",
"trace_id": "83d1dc17-e38b-acda-1450-f6c363e0d923"
} | {
"account_age_days": 1410,
"account_id": "ACCT-530BB08095C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.263
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 915,
"timestamp": "2026-01-07T13:07:00Z",
"transaction_amount_usd": 1517.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3771.59,
"financial_exposure_usd": 6588.83,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105006",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-04T11:26:00Z",
"trace_id": "2428ddf8-cc76-689c-e751-6573695d9fb0"
} | {
"account_age_days": 1741,
"account_id": "ACCT-4EAC8020C7B6",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.905
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 263,
"timestamp": "2026-01-04T08:28:00Z",
"transaction_amount_usd": 5.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4724156.62,
"financial_exposure_usd": 5768095.09,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106490",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "low",
"timestamp": "2026-01-05T12:10:00Z",
"trace_id": "fd34be7d-e2d8-3639-9dc3-9256593d8ec0"
} | {
"account_age_days": 1680,
"account_id": "ACCT-DDECDB44FD3D",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.431
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 216,
"timestamp": "2026-01-05T01:42:00Z",
"transaction_amount_usd": 9.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4254594.65,
"financial_exposure_usd": 5112724.25,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107520",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-06T05:20:00Z",
"trace_id": "77c0f9e3-daaa-2825-fc12-5b603622fa64"
} | {
"account_age_days": 1471,
"account_id": "ACCT-BC8951F5FD6A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.615
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 575,
"timestamp": "2026-01-06T05:20:00Z",
"transaction_amount_usd": 8935.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 61.39,
"financial_exposure_usd": 88.95,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104208",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-03T22:08:00Z",
"trace_id": "98cce522-66b3-b34f-06eb-2a333d1b34ed"
} | {
"account_age_days": 1314,
"account_id": "ACCT-46C15E2C54FA",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_3",
"session_entropy": 0.504
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 85,
"timestamp": "2026-01-03T19:44:00Z",
"transaction_amount_usd": 7.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.582,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4154536.96,
"financial_exposure_usd": 5958117.88,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106213",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "critical",
"timestamp": "2026-01-05T07:33:00Z",
"trace_id": "fb6757b0-653a-9c74-3c05-c4e6edc086db"
} | {
"account_age_days": 232,
"account_id": "ACCT-066FF6E151B4",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.157
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 901,
"timestamp": "2026-01-05T07:33:00Z",
"transaction_amount_usd": 869956.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.555,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2125714.04,
"financial_exposure_usd": 3856977.73,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104255",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "medium",
"timestamp": "2026-01-03T22:55:00Z",
"trace_id": "46c90d04-4bd1-3e18-5476-765be03ef51a"
} | {
"account_age_days": 1430,
"account_id": "ACCT-C4221BF52518",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.801
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 353,
"timestamp": "2026-01-03T12:38:00Z",
"transaction_amount_usd": 7.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3790025.83,
"financial_exposure_usd": 5238906.57,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106215",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "medium",
"timestamp": "2026-01-05T07:35:00Z",
"trace_id": "ea484b7e-2031-bea9-06f8-0a1576ce9657"
} | {
"account_age_days": 1658,
"account_id": "ACCT-81FEBF510471",
"baseline_risk_score": 0.207,
"kyc_tier": "tier_3",
"session_entropy": 0.176
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 723,
"timestamp": "2026-01-05T07:35:00Z",
"transaction_amount_usd": 2835500.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1830231.66,
"financial_exposure_usd": 2877812.77,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106929",
"label": "benign",
"label_confidence": 0.633,
"severity": "medium",
"timestamp": "2026-01-05T19:29:00Z",
"trace_id": "85ef64ce-1cd3-a7d3-21f0-273e1bf613de"
} | {
"account_age_days": 123,
"account_id": "ACCT-487641300F0E",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_2",
"session_entropy": 0.203
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 385,
"timestamp": "2026-01-05T19:29:00Z",
"transaction_amount_usd": 1334.95
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1535.89,
"financial_exposure_usd": 3324.97,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104616",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "medium",
"timestamp": "2026-01-04T04:56:00Z",
"trace_id": "1db9cd68-645c-93f5-4003-ea6088620981"
} | {
"account_age_days": 1892,
"account_id": "ACCT-513E473D4510",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 264,
"timestamp": "2026-01-04T03:42:00Z",
"transaction_amount_usd": 3.72
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.842,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106283",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-05T08:43:00Z",
"trace_id": "f053a23d-7495-fe01-3937-e623d0a193ea"
} | {
"account_age_days": 1783,
"account_id": "ACCT-2821F770A09E",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_2",
"session_entropy": 0.761
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1075,
"timestamp": "2026-01-05T08:43:00Z",
"transaction_amount_usd": 1320981.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.921,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1789177.02,
"financial_exposure_usd": 3114854.86,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102921",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-03T00:41:00Z",
"trace_id": "9f9ddd79-b005-c664-549a-285abc2d615a"
} | {
"account_age_days": 359,
"account_id": "ACCT-7EF1B266BAAB",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.93
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 632,
"timestamp": "2026-01-03T00:41:00Z",
"transaction_amount_usd": 77739.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.53,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 637520.47,
"financial_exposure_usd": 725767.44,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106085",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "critical",
"timestamp": "2026-01-05T05:25:00Z",
"trace_id": "2378e54e-bfa1-4e52-c345-67b8fb6e3d6d"
} | {
"account_age_days": 585,
"account_id": "ACCT-F81CD7D555DD",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 171,
"timestamp": "2026-01-05T05:25:00Z",
"transaction_amount_usd": 2231815.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2641853.55,
"financial_exposure_usd": 4731204.34,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100136",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "low",
"timestamp": "2026-01-01T02:16:00Z",
"trace_id": "6c4d1774-2bee-2fff-8b5f-93fef75ddff4"
} | {
"account_age_days": 746,
"account_id": "ACCT-5450C61F10E2",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_2",
"session_entropy": 0.644
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 353,
"timestamp": "2025-12-31T13:55:00Z",
"transaction_amount_usd": 12.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.438,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 495248.04,
"financial_exposure_usd": 877806.64,
"recoverable_pct": 0.083
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109774",
"label": "benign",
"label_confidence": 0.484,
"severity": "medium",
"timestamp": "2026-01-07T18:54:00Z",
"trace_id": "adec9376-7b3d-a0c2-8a7b-e0e863d827de"
} | {
"account_age_days": 1804,
"account_id": "ACCT-DC50868098CD",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.51
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 139,
"timestamp": "2026-01-07T18:54:00Z",
"transaction_amount_usd": 5020.53
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 444.35,
"financial_exposure_usd": 501.68,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107862",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-06T11:02:00Z",
"trace_id": "a642f6be-da71-6cb7-55d4-f1282540ae67"
} | {
"account_age_days": 577,
"account_id": "ACCT-CD196BE98A7C",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 671,
"timestamp": "2026-01-06T11:02:00Z",
"transaction_amount_usd": 10337.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5065.12,
"financial_exposure_usd": 6169.16,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108538",
"label": "benign",
"label_confidence": 0.453,
"severity": "high",
"timestamp": "2026-01-06T22:18:00Z",
"trace_id": "5af197e8-1536-be78-0ec1-f17dc1f8c021"
} | {
"account_age_days": 648,
"account_id": "ACCT-C01739761D2C",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_3",
"session_entropy": 0.869
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 147,
"timestamp": "2026-01-06T16:29:00Z",
"transaction_amount_usd": 8.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7148.81,
"financial_exposure_usd": 7397.72,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109153",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-07T08:33:00Z",
"trace_id": "b6ff6d35-a888-1fba-3ba1-b6893457d422"
} | {
"account_age_days": 1804,
"account_id": "ACCT-BEF8EB0BD0E2",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_3",
"session_entropy": 0.342
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 145,
"timestamp": "2026-01-07T08:33:00Z",
"transaction_amount_usd": 12782.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1153,
"financial_exposure_usd": 2074.82,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101709",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "low",
"timestamp": "2026-01-02T04:29:00Z",
"trace_id": "9cd9cfb8-25c1-6121-22d1-40047deff287"
} | {
"account_age_days": 1101,
"account_id": "ACCT-CF86EAF63C8F",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 765,
"timestamp": "2026-01-02T04:29:00Z",
"transaction_amount_usd": 24665.2
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.754,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 413232.54,
"financial_exposure_usd": 630157.59,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101851",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-02T06:51:00Z",
"trace_id": "6c270a84-ad44-f474-3e49-aa4aedfe5c58"
} | {
"account_age_days": 473,
"account_id": "ACCT-C9BA3A2236A6",
"baseline_risk_score": 0.612,
"kyc_tier": "tier_3",
"session_entropy": 0.171
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 386,
"timestamp": "2026-01-02T05:39:00Z",
"transaction_amount_usd": 10.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.805,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 363757.76,
"financial_exposure_usd": 876689.58,
"recoverable_pct": 0.089
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100714",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-01T11:54:00Z",
"trace_id": "b486ae6d-c5e6-1a9c-f1a4-a98a192fe865"
} | {
"account_age_days": 1510,
"account_id": "ACCT-45662281D1B6",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 417,
"timestamp": "2026-01-01T11:54:00Z",
"transaction_amount_usd": 3575.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 891607.92,
"financial_exposure_usd": 1117396.94,
"recoverable_pct": 0.387
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108155",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-06T15:55:00Z",
"trace_id": "16ba7777-8cfd-878d-fed3-15ef0f4f69f5"
} | {
"account_age_days": 1710,
"account_id": "ACCT-4C06CE57B74F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.37
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 580,
"timestamp": "2026-01-06T15:55:00Z",
"transaction_amount_usd": 4893.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1402.63,
"financial_exposure_usd": 2284.97,
"recoverable_pct": 0.925
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103814",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-03T15:34:00Z",
"trace_id": "b4459339-5ebb-f408-30b9-dd0b99add3c9"
} | {
"account_age_days": 307,
"account_id": "ACCT-DB0049743977",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_2",
"session_entropy": 0.505
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 141,
"timestamp": "2026-01-03T06:21:00Z",
"transaction_amount_usd": 8.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3203788.72,
"financial_exposure_usd": 4031798.66,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103176",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-03T04:56:00Z",
"trace_id": "2f962916-5710-e255-371a-748241d0ddc5"
} | {
"account_age_days": 131,
"account_id": "ACCT-B8B486219724",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_1",
"session_entropy": 0.212
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 139,
"timestamp": "2026-01-02T19:48:00Z",
"transaction_amount_usd": 20.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 507396.47,
"financial_exposure_usd": 864561.98,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102490",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-02T17:30:00Z",
"trace_id": "6e9fe90e-c851-be71-1aa0-26c10dacb8f6"
} | {
"account_age_days": 1581,
"account_id": "ACCT-2243325D1A84",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_1",
"session_entropy": 0.369
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 110,
"timestamp": "2026-01-02T13:49:00Z",
"transaction_amount_usd": 19.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 41913.15,
"financial_exposure_usd": 51813.99,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104596",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-04T04:36:00Z",
"trace_id": "2ab4cc79-d3a1-4899-1156-f8a8142985c5"
} | {
"account_age_days": 1179,
"account_id": "ACCT-6FFFDA9EFD54",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.389
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 811,
"timestamp": "2026-01-04T04:36:00Z",
"transaction_amount_usd": 2137012.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2710755.36,
"financial_exposure_usd": 3978750.67,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105600",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "medium",
"timestamp": "2026-01-04T21:20:00Z",
"trace_id": "432e8d16-bd75-8126-df93-589a11683464"
} | {
"account_age_days": 1635,
"account_id": "ACCT-0290532D4886",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_3",
"session_entropy": 0.473
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 136,
"timestamp": "2026-01-04T14:34:00Z",
"transaction_amount_usd": 0.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.38,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3313778.69,
"financial_exposure_usd": 3677328.16,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103855",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "high",
"timestamp": "2026-01-03T16:15:00Z",
"trace_id": "cb3b1423-0329-675b-c17e-4389cd3648f6"
} | {
"account_age_days": 1130,
"account_id": "ACCT-43236DE7747D",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 376,
"timestamp": "2026-01-03T10:48:00Z",
"transaction_amount_usd": 11.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 845313.33,
"financial_exposure_usd": 1083768.47,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103078",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-03T03:18:00Z",
"trace_id": "1656bdc3-3f05-c471-6aa1-cc4b114401f1"
} | {
"account_age_days": 196,
"account_id": "ACCT-1687C9AE9916",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.261
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 135,
"timestamp": "2026-01-03T00:42:00Z",
"transaction_amount_usd": 22.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 445545.5,
"financial_exposure_usd": 616997.24,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100570",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-01T09:30:00Z",
"trace_id": "aaa8e791-ebed-4765-b62d-6b6880b9fc90"
} | {
"account_age_days": 1946,
"account_id": "ACCT-97ECEC56113F",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_1",
"session_entropy": 0.209
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1108,
"timestamp": "2026-01-01T09:30:00Z",
"transaction_amount_usd": 91353.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.892,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 513576.38,
"financial_exposure_usd": 565987.48,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104058",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "critical",
"timestamp": "2026-01-03T19:38:00Z",
"trace_id": "6bdb60af-a1ad-2267-bb8a-4fb4ac17ca9e"
} | {
"account_age_days": 1430,
"account_id": "ACCT-5BAD73E702F6",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.828
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 153,
"timestamp": "2026-01-03T12:35:00Z",
"transaction_amount_usd": 7.44
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.401,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1293357.2,
"financial_exposure_usd": 2141148.37,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102314",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-02T14:34:00Z",
"trace_id": "02324601-067e-a4b4-3188-c40932c6a287"
} | {
"account_age_days": 912,
"account_id": "ACCT-9E6FFD62BA03",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_2",
"session_entropy": 0.709
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 358,
"timestamp": "2026-01-02T12:09:00Z",
"transaction_amount_usd": 10.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 677059.42,
"financial_exposure_usd": 911627.22,
"recoverable_pct": 0.049
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109476",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-07T13:56:00Z",
"trace_id": "12512bea-0317-498d-8d56-f91315107d2a"
} | {
"account_age_days": 1115,
"account_id": "ACCT-8F52FF27443C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.371
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 726,
"timestamp": "2026-01-07T13:56:00Z",
"transaction_amount_usd": 7224.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4718.1,
"financial_exposure_usd": 6000.26,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107111",
"label": "benign",
"label_confidence": 0.648,
"severity": "high",
"timestamp": "2026-01-05T22:31:00Z",
"trace_id": "d7de3bb2-d1fe-0d58-fcf3-be088eaf8db1"
} | {
"account_age_days": 1793,
"account_id": "ACCT-A94316BDE7B1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.259
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 871,
"timestamp": "2026-01-05T22:31:00Z",
"transaction_amount_usd": 7141.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1096.94,
"financial_exposure_usd": 2388.39,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106151",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-05T06:31:00Z",
"trace_id": "0b7f2c3f-25da-f81d-c5a8-0b97d46be9a7"
} | {
"account_age_days": 543,
"account_id": "ACCT-79064697BDD0",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_2",
"session_entropy": 0.664
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 95,
"timestamp": "2026-01-04T19:42:00Z",
"transaction_amount_usd": 20.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.52,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1590602.98,
"financial_exposure_usd": 3424087.69,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106019",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "critical",
"timestamp": "2026-01-05T04:19:00Z",
"trace_id": "3545cb73-e9ec-7664-b28d-afda2b34ab4b"
} | {
"account_age_days": 1387,
"account_id": "ACCT-3A84D8CE75F4",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.23
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 849,
"timestamp": "2026-01-05T04:19:00Z",
"transaction_amount_usd": 1159702.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.842,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3085823.02,
"financial_exposure_usd": 3450662.77,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102620",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-02T19:40:00Z",
"trace_id": "8dc6c4dc-c974-80a5-1323-5d3b2e41479e"
} | {
"account_age_days": 994,
"account_id": "ACCT-8C77D61FF8D7",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 785,
"timestamp": "2026-01-02T19:40:00Z",
"transaction_amount_usd": 48151.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.702,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 593300.57,
"financial_exposure_usd": 1058146.4,
"recoverable_pct": 0.25
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101789",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-02T05:49:00Z",
"trace_id": "677f812c-74e5-4851-e086-5d82c222a735"
} | {
"account_age_days": 1927,
"account_id": "ACCT-DFD61104C945",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_2",
"session_entropy": 0.625
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 264,
"timestamp": "2026-01-02T05:49:00Z",
"transaction_amount_usd": 57572.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.842,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1049348.52,
"financial_exposure_usd": 1094753.4,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105866",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-05T01:46:00Z",
"trace_id": "fa97a5cd-50a2-8afa-c9c2-a5b8428cc6aa"
} | {
"account_age_days": 243,
"account_id": "ACCT-30683F2CB8AE",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_3",
"session_entropy": 0.319
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 176,
"timestamp": "2026-01-05T01:46:00Z",
"transaction_amount_usd": 116286.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.547,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1375311.69,
"financial_exposure_usd": 1382846.39,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105044",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-04T12:04:00Z",
"trace_id": "000d725b-b149-54f6-7d23-1f5883b556ae"
} | {
"account_age_days": 1230,
"account_id": "ACCT-8CCAF7C6A462",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1173,
"timestamp": "2026-01-04T12:04:00Z",
"transaction_amount_usd": 2880431.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6066699.58,
"financial_exposure_usd": 9021559.86,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105255",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "medium",
"timestamp": "2026-01-04T15:35:00Z",
"trace_id": "2c70196e-af3d-936c-addd-e0880578cd66"
} | {
"account_age_days": 1902,
"account_id": "ACCT-FFD86D6FFBF8",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_1",
"session_entropy": 0.198
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 341,
"timestamp": "2026-01-04T06:59:00Z",
"transaction_amount_usd": 24.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.541,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2573205.71,
"financial_exposure_usd": 3853066.97,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106899",
"label": "benign",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-05T18:59:00Z",
"trace_id": "b8328a79-82b6-f796-683e-c406b006ede1"
} | {
"account_age_days": 1796,
"account_id": "ACCT-F5E644DC2A5C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.614
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 126,
"timestamp": "2026-01-05T11:10:00Z",
"transaction_amount_usd": 10.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1203.14,
"financial_exposure_usd": 1364.9,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109553",
"label": "benign",
"label_confidence": 0.748,
"severity": "low",
"timestamp": "2026-01-07T15:13:00Z",
"trace_id": "9b2f21f6-1526-1e4f-6082-db6b6d25fcad"
} | {
"account_age_days": 592,
"account_id": "ACCT-CC583ACAAC36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 216,
"timestamp": "2026-01-07T15:13:00Z",
"transaction_amount_usd": 11500.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 572.77,
"financial_exposure_usd": 1351.49,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109381",
"label": "benign",
"label_confidence": 0.597,
"severity": "low",
"timestamp": "2026-01-07T12:21:00Z",
"trace_id": "2041d705-5617-c18d-090f-b7bf3db3ff4a"
} | {
"account_age_days": 1920,
"account_id": "ACCT-8CBCB4355471",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_3",
"session_entropy": 0.165
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 904,
"timestamp": "2026-01-07T12:21:00Z",
"transaction_amount_usd": 4438.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4346.82,
"financial_exposure_usd": 4756.88,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101420",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-01T23:40:00Z",
"trace_id": "0f1b91e3-1a10-08b5-0c86-a17eff4ae9cb"
} | {
"account_age_days": 1412,
"account_id": "ACCT-02C4C2D42C74",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.364
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 220,
"timestamp": "2026-01-01T20:54:00Z",
"transaction_amount_usd": 23.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.782,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 293471.56,
"financial_exposure_usd": 558939.7,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100651",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "low",
"timestamp": "2026-01-01T10:51:00Z",
"trace_id": "56fe5897-4f14-7098-52b5-0d5cdf7d51c2"
} | {
"account_age_days": 941,
"account_id": "ACCT-2D17C0D1450D",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_2",
"session_entropy": 0.226
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 630,
"timestamp": "2026-01-01T10:51:00Z",
"transaction_amount_usd": 30209.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 650140.95,
"financial_exposure_usd": 758030.12,
"recoverable_pct": 0.352
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104019",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-03T18:59:00Z",
"trace_id": "e76e4a97-b525-83e1-f8e5-705dad62a4b8"
} | {
"account_age_days": 1046,
"account_id": "ACCT-7D5298358174",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 123,
"timestamp": "2026-01-03T17:04:00Z",
"transaction_amount_usd": 20.62
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4373052.22,
"financial_exposure_usd": 6676017.54,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104086",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-03T20:06:00Z",
"trace_id": "5e15747a-46a3-3a9b-b310-71a9154b2707"
} | {
"account_age_days": 1972,
"account_id": "ACCT-30CD0D9969B7",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.896
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1149,
"timestamp": "2026-01-03T20:06:00Z",
"transaction_amount_usd": 1511142.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.611,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4789829.45,
"financial_exposure_usd": 5281741.53,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103815",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-03T15:35:00Z",
"trace_id": "7e1894ef-3a24-067b-22ed-597b148d616c"
} | {
"account_age_days": 1387,
"account_id": "ACCT-C39258901CA7",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_3",
"session_entropy": 0.635
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 744,
"timestamp": "2026-01-03T15:35:00Z",
"transaction_amount_usd": 1980674.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.565,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1260991.67,
"financial_exposure_usd": 1335129.77,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100313",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "low",
"timestamp": "2026-01-01T05:13:00Z",
"trace_id": "b8892faf-c691-a1ad-455f-8af7d21d637a"
} | {
"account_age_days": 329,
"account_id": "ACCT-198640A145A9",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_2",
"session_entropy": 0.58
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 339,
"timestamp": "2026-01-01T04:05:00Z",
"transaction_amount_usd": 13.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 561507.06,
"financial_exposure_usd": 621058.35,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102584",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-02T19:04:00Z",
"trace_id": "42748f77-f9a3-851b-c057-33092c7bf16a"
} | {
"account_age_days": 426,
"account_id": "ACCT-1E22C7EEB3CF",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_3",
"session_entropy": 0.919
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 108,
"timestamp": "2026-01-02T12:07:00Z",
"transaction_amount_usd": 10.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.478,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 756531.99,
"financial_exposure_usd": 1279838.7,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107339",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-06T02:19:00Z",
"trace_id": "5cb94d63-dcff-1eea-0ff8-37c46800ce8b"
} | {
"account_age_days": 1116,
"account_id": "ACCT-2E414D1E177C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.134
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 493,
"timestamp": "2026-01-06T02:19:00Z",
"transaction_amount_usd": 11841.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3756.48,
"financial_exposure_usd": 3958.77,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109752",
"label": "benign",
"label_confidence": 0.536,
"severity": "medium",
"timestamp": "2026-01-07T18:32:00Z",
"trace_id": "774c7234-5ea3-f9af-a03a-b8a6f25e086d"
} | {
"account_age_days": 1833,
"account_id": "ACCT-E55A63811572",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.817
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 414,
"timestamp": "2026-01-07T18:32:00Z",
"transaction_amount_usd": 10449.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 228.33,
"financial_exposure_usd": 283.97,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108361",
"label": "benign",
"label_confidence": 0.638,
"severity": "medium",
"timestamp": "2026-01-06T19:21:00Z",
"trace_id": "654499cc-e03f-8d81-4fa3-3a8a2a8c3359"
} | {
"account_age_days": 426,
"account_id": "ACCT-E0DFF8B1550D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.241
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 690,
"timestamp": "2026-01-06T19:21:00Z",
"transaction_amount_usd": 10860.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.716,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1955.28,
"financial_exposure_usd": 4303.77,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101807",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "high",
"timestamp": "2026-01-02T06:07:00Z",
"trace_id": "e0f55f25-9c37-8178-96b4-5964f4aac7be"
} | {
"account_age_days": 817,
"account_id": "ACCT-F04FF390C0CB",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_1",
"session_entropy": 0.457
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 798,
"timestamp": "2026-01-02T06:07:00Z",
"transaction_amount_usd": 16916.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.846,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 320075.63,
"financial_exposure_usd": 666690.66,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104242",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-03T22:42:00Z",
"trace_id": "c5c90305-1e41-3643-a288-40203754c971"
} | {
"account_age_days": 194,
"account_id": "ACCT-81B65D63633F",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_3",
"session_entropy": 0.697
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 406,
"timestamp": "2026-01-03T22:42:00Z",
"transaction_amount_usd": 1599449.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.64,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4239920.31,
"financial_exposure_usd": 6137150.15,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104452",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-04T02:12:00Z",
"trace_id": "f3d2f486-cd5c-a6e6-6e4c-e8688f1918ba"
} | {
"account_age_days": 333,
"account_id": "ACCT-7B084B90914D",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.276
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 333,
"timestamp": "2026-01-04T02:12:00Z",
"transaction_amount_usd": 2185968.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3170662.36,
"financial_exposure_usd": 3438310.33,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106982",
"label": "benign",
"label_confidence": 0.544,
"severity": "medium",
"timestamp": "2026-01-05T20:22:00Z",
"trace_id": "219d7629-d475-6afd-a04e-71314f0986e9"
} | {
"account_age_days": 810,
"account_id": "ACCT-86D17D7A8EE2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.899
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 132,
"timestamp": "2026-01-05T10:30:00Z",
"transaction_amount_usd": 11.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3826.73,
"financial_exposure_usd": 5051.1,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105026",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-04T11:46:00Z",
"trace_id": "d76514c5-85d3-5bc2-9035-acec5bb19b77"
} | {
"account_age_days": 1608,
"account_id": "ACCT-794373D5985F",
"baseline_risk_score": 0.249,
"kyc_tier": "tier_2",
"session_entropy": 0.729
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 542,
"timestamp": "2026-01-04T11:46:00Z",
"transaction_amount_usd": 2405443.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2329613.69,
"financial_exposure_usd": 4255070.2,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109385",
"label": "benign",
"label_confidence": 0.598,
"severity": "medium",
"timestamp": "2026-01-07T12:25:00Z",
"trace_id": "2c1d4f1e-59fb-0521-ea80-b5f442101523"
} | {
"account_age_days": 875,
"account_id": "ACCT-2FE1D66F4A12",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.23
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 378,
"timestamp": "2026-01-07T12:25:00Z",
"transaction_amount_usd": 8037.49
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 509.05,
"financial_exposure_usd": 973.94,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106791",
"label": "benign",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-05T17:11:00Z",
"trace_id": "276b07c9-aefd-59fb-97cd-f53b04ecdaa5"
} | {
"account_age_days": 1159,
"account_id": "ACCT-B08C0867D891",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.366
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 685,
"timestamp": "2026-01-05T17:11:00Z",
"transaction_amount_usd": 9166.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1699.05,
"financial_exposure_usd": 4107.74,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107077",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-05T21:57:00Z",
"trace_id": "e03fc216-59b7-c472-1d4d-907550a0b0d7"
} | {
"account_age_days": 1060,
"account_id": "ACCT-B0C35828BA98",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.702
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 88,
"timestamp": "2026-01-05T20:52:00Z",
"transaction_amount_usd": 21.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3121.72,
"financial_exposure_usd": 6303.16,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101656",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-02T03:36:00Z",
"trace_id": "5b7fad10-79b1-40c1-7614-036fb41d3a64"
} | {
"account_age_days": 724,
"account_id": "ACCT-EA5C8B8A09E1",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.384
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 250,
"timestamp": "2026-01-02T03:36:00Z",
"transaction_amount_usd": 45185.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 614154.36,
"financial_exposure_usd": 698739.3,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108642",
"label": "benign",
"label_confidence": 0.617,
"severity": "high",
"timestamp": "2026-01-07T00:02:00Z",
"trace_id": "6e4773d5-7127-35db-11e0-6e66dc50af56"
} | {
"account_age_days": 715,
"account_id": "ACCT-1263C1CD17B1",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_2",
"session_entropy": 0.767
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 897,
"timestamp": "2026-01-07T00:02:00Z",
"transaction_amount_usd": 9230.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 496.48,
"financial_exposure_usd": 634.6,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100029",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "high",
"timestamp": "2026-01-01T00:29:00Z",
"trace_id": "f1053252-3990-e2c9-4c6a-70f48edec44d"
} | {
"account_age_days": 186,
"account_id": "ACCT-0F25477DA559",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_3",
"session_entropy": 0.872
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 794,
"timestamp": "2026-01-01T00:29:00Z",
"transaction_amount_usd": 84735.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.489,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 232691.9,
"financial_exposure_usd": 245471.69,
"recoverable_pct": 0.149
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100037",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "high",
"timestamp": "2026-01-01T00:37:00Z",
"trace_id": "cdd7f460-6140-77d3-9ec4-ea48d773f98d"
} | {
"account_age_days": 1986,
"account_id": "ACCT-8B2C550A6B15",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_2",
"session_entropy": 0.131
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 736,
"timestamp": "2026-01-01T00:37:00Z",
"transaction_amount_usd": 51958.64
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 272783.54,
"financial_exposure_usd": 585848.05,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105557",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "high",
"timestamp": "2026-01-04T20:37:00Z",
"trace_id": "8f357dc3-f4d1-5941-3d7e-ef8e3b4032d9"
} | {
"account_age_days": 642,
"account_id": "ACCT-C4FF2B7C4685",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_1",
"session_entropy": 0.427
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 738,
"timestamp": "2026-01-04T20:37:00Z",
"transaction_amount_usd": 2624004.55
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4821549.72,
"financial_exposure_usd": 9359933.17,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108668",
"label": "benign",
"label_confidence": 0.574,
"severity": "medium",
"timestamp": "2026-01-07T00:28:00Z",
"trace_id": "4c5a4300-54f7-831c-0d09-7a71a0113935"
} | {
"account_age_days": 1954,
"account_id": "ACCT-8C087F9B1F40",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.93
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 364,
"timestamp": "2026-01-06T18:42:00Z",
"transaction_amount_usd": 16.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2182.55,
"financial_exposure_usd": 5280.87,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100149",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "low",
"timestamp": "2026-01-01T02:29:00Z",
"trace_id": "a3e53892-2540-647b-784f-cb14f2d31a65"
} | {
"account_age_days": 1524,
"account_id": "ACCT-D2D12566FC82",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_3",
"session_entropy": 0.898
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 820,
"timestamp": "2026-01-01T02:29:00Z",
"transaction_amount_usd": 4243.13
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.359,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 765605.2,
"financial_exposure_usd": 797263.21,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108930",
"label": "benign",
"label_confidence": 0.578,
"severity": "medium",
"timestamp": "2026-01-07T04:50:00Z",
"trace_id": "7fd19bbf-3156-f066-a8e8-3c319fc6d8ad"
} | {
"account_age_days": 645,
"account_id": "ACCT-6C9914A019EA",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.485
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 446,
"timestamp": "2026-01-07T04:50:00Z",
"transaction_amount_usd": 2564.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 676.92,
"financial_exposure_usd": 785.24,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109792",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-07T19:12:00Z",
"trace_id": "4543faed-0df9-a7e1-2e20-d3209c2704ec"
} | {
"account_age_days": 586,
"account_id": "ACCT-F6C4793F3886",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.545
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 673,
"timestamp": "2026-01-07T19:12:00Z",
"transaction_amount_usd": 11332.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.484,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2247.1,
"financial_exposure_usd": 3901.59,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107759",
"label": "benign",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-06T09:19:00Z",
"trace_id": "03c4402e-a618-c91c-287b-dc07e2834f70"
} | {
"account_age_days": 1791,
"account_id": "ACCT-1F5FFE8D9D10",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.801
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1064,
"timestamp": "2026-01-06T09:19:00Z",
"transaction_amount_usd": 1394.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5411.76,
"financial_exposure_usd": 5941.04,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107059",
"label": "benign",
"label_confidence": 0.576,
"severity": "low",
"timestamp": "2026-01-05T21:39:00Z",
"trace_id": "2538ec4d-07fd-e92b-0a38-24b9e808862e"
} | {
"account_age_days": 119,
"account_id": "ACCT-4B9271998CB5",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_1",
"session_entropy": 0.579
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 189,
"timestamp": "2026-01-05T15:26:00Z",
"transaction_amount_usd": 15.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1098.98,
"financial_exposure_usd": 1671.08,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109504",
"label": "benign",
"label_confidence": 0.455,
"severity": "medium",
"timestamp": "2026-01-07T14:24:00Z",
"trace_id": "2ff89e61-943f-e955-4091-6b405cca8ee9"
} | {
"account_age_days": 1499,
"account_id": "ACCT-66126C77BEF4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.282
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 274,
"timestamp": "2026-01-07T04:23:00Z",
"transaction_amount_usd": 12.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4074.52,
"financial_exposure_usd": 4821.81,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105514",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "low",
"timestamp": "2026-01-04T19:54:00Z",
"trace_id": "a5f64d0f-e2f8-3b3d-25d0-fc29e0564d31"
} | {
"account_age_days": 331,
"account_id": "ACCT-54213E912364",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_2",
"session_entropy": 0.236
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1199,
"timestamp": "2026-01-04T19:54:00Z",
"transaction_amount_usd": 980895.32
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 895353.56,
"financial_exposure_usd": 921155.43,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109045",
"label": "benign",
"label_confidence": 0.461,
"severity": "medium",
"timestamp": "2026-01-07T06:45:00Z",
"trace_id": "3ea82edb-4df1-8249-c960-04f0a1e97687"
} | {
"account_age_days": 318,
"account_id": "ACCT-F7B9A218CCD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.861
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 239,
"timestamp": "2026-01-06T20:35:00Z",
"transaction_amount_usd": 11.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 437.66,
"financial_exposure_usd": 1079.37,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101697",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-02T04:17:00Z",
"trace_id": "760a8899-15e6-9b2f-3f04-abdc3a976813"
} | {
"account_age_days": 1030,
"account_id": "ACCT-948460D39D31",
"baseline_risk_score": 0.507,
"kyc_tier": "tier_3",
"session_entropy": 0.618
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 450,
"timestamp": "2026-01-02T04:17:00Z",
"transaction_amount_usd": 89092.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 578654.43,
"financial_exposure_usd": 778174.49,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106518",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "high",
"timestamp": "2026-01-05T12:38:00Z",
"trace_id": "b17b029f-f080-a2a2-4390-09c4f73f6327"
} | {
"account_age_days": 500,
"account_id": "ACCT-2873402C842D",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_3",
"session_entropy": 0.382
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 422,
"timestamp": "2026-01-05T12:38:00Z",
"transaction_amount_usd": 964721.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.427,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5506637.52,
"financial_exposure_usd": 5963589.37,
"recoverable_pct": 0.48
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104987",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-04T11:07:00Z",
"trace_id": "5556155a-4c7d-7899-8f54-6d301bccf244"
} | {
"account_age_days": 1707,
"account_id": "ACCT-AA16B1EB979E",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.902
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1144,
"timestamp": "2026-01-04T11:07:00Z",
"transaction_amount_usd": 2064914.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.938,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2233898.3,
"financial_exposure_usd": 3408441.21,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106933",
"label": "benign",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-05T19:33:00Z",
"trace_id": "bd2bf787-99b5-8797-84e9-652b62c00f99"
} | {
"account_age_days": 1019,
"account_id": "ACCT-3887BD28C8F1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 814,
"timestamp": "2026-01-05T19:33:00Z",
"transaction_amount_usd": 12041.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2539.96,
"financial_exposure_usd": 3577.03,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106386",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "critical",
"timestamp": "2026-01-05T10:26:00Z",
"trace_id": "b4f026f9-0085-ee61-fb16-08ae9aa12082"
} | {
"account_age_days": 1964,
"account_id": "ACCT-72B6B043E7E7",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1091,
"timestamp": "2026-01-05T10:26:00Z",
"transaction_amount_usd": 856949.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.667,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5018404.53,
"financial_exposure_usd": 6198695.33,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107028",
"label": "benign",
"label_confidence": 0.497,
"severity": "low",
"timestamp": "2026-01-05T21:08:00Z",
"trace_id": "28b1ea13-f2b5-2183-429a-cce9c508418c"
} | {
"account_age_days": 545,
"account_id": "ACCT-B9D386680374",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.749
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 325,
"timestamp": "2026-01-05T10:30:00Z",
"transaction_amount_usd": 5.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2084.74,
"financial_exposure_usd": 4718.67,
"recoverable_pct": 0.67
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102625",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "medium",
"timestamp": "2026-01-02T19:45:00Z",
"trace_id": "1f0f6516-716e-84c4-fb98-f1b57483adc7"
} | {
"account_age_days": 115,
"account_id": "ACCT-24461B81A739",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_2",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 233,
"timestamp": "2026-01-02T19:45:00Z",
"transaction_amount_usd": 75086.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.529,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 81592.28,
"financial_exposure_usd": 195509.64,
"recoverable_pct": 0.294
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109524",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-07T14:44:00Z",
"trace_id": "510fe4cd-f92a-4c55-b400-6aaccfb41dc2"
} | {
"account_age_days": 1527,
"account_id": "ACCT-274987F47324",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_2",
"session_entropy": 0.5
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 400,
"timestamp": "2026-01-07T08:32:00Z",
"transaction_amount_usd": 24.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3710.47,
"financial_exposure_usd": 5941.29,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109608",
"label": "benign",
"label_confidence": 0.73,
"severity": "high",
"timestamp": "2026-01-07T16:08:00Z",
"trace_id": "bedc6def-f876-cf5d-0718-f91a8e753618"
} | {
"account_age_days": 1482,
"account_id": "ACCT-43A173FDD042",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.834
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 451,
"timestamp": "2026-01-07T16:08:00Z",
"transaction_amount_usd": 4491.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4212.94,
"financial_exposure_usd": 4921.04,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108223",
"label": "benign",
"label_confidence": 0.47,
"severity": "medium",
"timestamp": "2026-01-06T17:03:00Z",
"trace_id": "d8aa00c2-203c-b765-3495-d9d7a5cc1169"
} | {
"account_age_days": 1362,
"account_id": "ACCT-1B11F1BAB9DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.317
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 784,
"timestamp": "2026-01-06T17:03:00Z",
"transaction_amount_usd": 1932.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 259.04,
"financial_exposure_usd": 377.24,
"recoverable_pct": 0.899
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100681",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-01T11:21:00Z",
"trace_id": "0cd88800-b9d6-dc7a-608d-fe7b66772d17"
} | {
"account_age_days": 784,
"account_id": "ACCT-F043F1F12191",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 735,
"timestamp": "2026-01-01T11:21:00Z",
"transaction_amount_usd": 102665.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.915,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 450204.09,
"financial_exposure_usd": 673910.59,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107244",
"label": "benign",
"label_confidence": 0.527,
"severity": "low",
"timestamp": "2026-01-06T00:44:00Z",
"trace_id": "4779aee7-948e-c44d-510f-734ff7ac996a"
} | {
"account_age_days": 1460,
"account_id": "ACCT-E460D396DEEC",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 694,
"timestamp": "2026-01-06T00:44:00Z",
"transaction_amount_usd": 2055
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2201.72,
"financial_exposure_usd": 2568.19,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100393",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-01T06:33:00Z",
"trace_id": "411f6fa2-3807-da06-5f67-ce49f09314cb"
} | {
"account_age_days": 628,
"account_id": "ACCT-C35E62D80616",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_2",
"session_entropy": 0.715
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 937,
"timestamp": "2026-01-01T06:33:00Z",
"transaction_amount_usd": 34042.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.567,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 464990.48,
"financial_exposure_usd": 613825.78,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100883",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-01T14:43:00Z",
"trace_id": "e0124b22-f87d-3214-fe75-7cec345021df"
} | {
"account_age_days": 790,
"account_id": "ACCT-8E7AD444A656",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_3",
"session_entropy": 0.811
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 653,
"timestamp": "2026-01-01T14:43:00Z",
"transaction_amount_usd": 93128.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.728,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 411790.16,
"financial_exposure_usd": 799402.57,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108875",
"label": "benign",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-07T03:55:00Z",
"trace_id": "fc569d7b-ac74-8c19-d916-39ce6de734c1"
} | {
"account_age_days": 1852,
"account_id": "ACCT-4627C6CFEB11",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_1",
"session_entropy": 0.474
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 690,
"timestamp": "2026-01-07T03:55:00Z",
"transaction_amount_usd": 8092.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 6186.23,
"financial_exposure_usd": 6207.56,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105353",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "medium",
"timestamp": "2026-01-04T17:13:00Z",
"trace_id": "3ca00a73-0fe4-bb69-f84f-4418ab65741a"
} | {
"account_age_days": 1638,
"account_id": "ACCT-567771EDBF46",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.603
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 356,
"timestamp": "2026-01-04T17:13:00Z",
"transaction_amount_usd": 1788700.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1777181.51,
"financial_exposure_usd": 3794179.46,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100087",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-01T01:27:00Z",
"trace_id": "cc502a89-8a08-d40e-a239-5ad5af1f798c"
} | {
"account_age_days": 848,
"account_id": "ACCT-D66DE2A12776",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_2",
"session_entropy": 0.522
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1009,
"timestamp": "2026-01-01T01:27:00Z",
"transaction_amount_usd": 6806.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 601093.35,
"financial_exposure_usd": 1141647.31,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103252",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "medium",
"timestamp": "2026-01-03T06:12:00Z",
"trace_id": "21067ed0-417c-c6a4-8166-6b55298d87ec"
} | {
"account_age_days": 36,
"account_id": "ACCT-39F512EB1F8C",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.12
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1183,
"timestamp": "2026-01-03T06:12:00Z",
"transaction_amount_usd": 115563.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.512,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1068617.02,
"financial_exposure_usd": 1277840,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100379",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "medium",
"timestamp": "2026-01-01T06:19:00Z",
"trace_id": "4a24e243-6078-e100-54dd-07dc48ecd5e0"
} | {
"account_age_days": 321,
"account_id": "ACCT-8A05CE061F83",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.402
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 685,
"timestamp": "2026-01-01T06:19:00Z",
"transaction_amount_usd": 100625.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 755135.89,
"financial_exposure_usd": 957962.49,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101050",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-01T17:30:00Z",
"trace_id": "4b2910bb-1b04-c1f3-abb9-a7ad14052ce5"
} | {
"account_age_days": 341,
"account_id": "ACCT-38BE59822F8E",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_2",
"session_entropy": 0.232
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 467,
"timestamp": "2026-01-01T17:30:00Z",
"transaction_amount_usd": 20050.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 164111.78,
"financial_exposure_usd": 177598.87,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.