schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109522",
"label": "benign",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-07T14:42:00Z",
"trace_id": "04c7fa73-5d17-eb20-9b9b-61dfd63feaf6"
} | {
"account_age_days": 1833,
"account_id": "ACCT-A0B203360A80",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.847
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 254,
"timestamp": "2026-01-07T12:07:00Z",
"transaction_amount_usd": 17.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 454.85,
"financial_exposure_usd": 458.91,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106705",
"label": "benign",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-05T15:45:00Z",
"trace_id": "bc7eb10c-d710-97b8-f41b-764478a2fd20"
} | {
"account_age_days": 1777,
"account_id": "ACCT-7915A2B8C5F5",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 216,
"timestamp": "2026-01-05T10:04:00Z",
"transaction_amount_usd": 10.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1248.55,
"financial_exposure_usd": 1389.56,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103745",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "low",
"timestamp": "2026-01-03T14:25:00Z",
"trace_id": "893e474e-47e1-0693-eed1-e54754aeb3bb"
} | {
"account_age_days": 1219,
"account_id": "ACCT-D68799821AD1",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_1",
"session_entropy": 0.253
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 664,
"timestamp": "2026-01-03T14:25:00Z",
"transaction_amount_usd": 333521.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5186535.64,
"financial_exposure_usd": 6487784.9,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102078",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-02T10:38:00Z",
"trace_id": "66231b61-63c9-e6ef-1879-675dd11899c9"
} | {
"account_age_days": 1522,
"account_id": "ACCT-050A47FDBB36",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_3",
"session_entropy": 0.712
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1086,
"timestamp": "2026-01-02T10:38:00Z",
"transaction_amount_usd": 45330.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 809700.06,
"financial_exposure_usd": 1050592.52,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100060",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-01T01:00:00Z",
"trace_id": "dd664071-8fd7-b1a1-bd4f-6118acef45c4"
} | {
"account_age_days": 379,
"account_id": "ACCT-86804A8A515F",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_3",
"session_entropy": 0.287
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 669,
"timestamp": "2026-01-01T01:00:00Z",
"transaction_amount_usd": 67571.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 380551.37,
"financial_exposure_usd": 585861.36,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108315",
"label": "benign",
"label_confidence": 0.525,
"severity": "low",
"timestamp": "2026-01-06T18:35:00Z",
"trace_id": "c927ba8e-f892-bc04-d21b-944ffb143f3e"
} | {
"account_age_days": 1394,
"account_id": "ACCT-3AEEB06FFC75",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.18
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 347,
"timestamp": "2026-01-06T18:35:00Z",
"transaction_amount_usd": 8389.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2303.04,
"financial_exposure_usd": 3390.27,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108072",
"label": "benign",
"label_confidence": 0.548,
"severity": "medium",
"timestamp": "2026-01-06T14:32:00Z",
"trace_id": "a65063dd-35b0-e23d-e0ac-4e3143bb0ae4"
} | {
"account_age_days": 817,
"account_id": "ACCT-68269F67DB29",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.234
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 108,
"timestamp": "2026-01-06T14:32:00Z",
"transaction_amount_usd": 9963.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1109.4,
"financial_exposure_usd": 1884.37,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106608",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-05T14:08:00Z",
"trace_id": "407dbbff-c5c4-eb95-9e73-de628979576b"
} | {
"account_age_days": 1259,
"account_id": "ACCT-132164EA95AF",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.708
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 955,
"timestamp": "2026-01-05T14:08:00Z",
"transaction_amount_usd": 1927922.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1301095.01,
"financial_exposure_usd": 1921456.09,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100553",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-01T09:13:00Z",
"trace_id": "6722c765-7fb3-25a4-c063-e60c4b47624a"
} | {
"account_age_days": 496,
"account_id": "ACCT-C7ECD24E3143",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_2",
"session_entropy": 0.671
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 716,
"timestamp": "2026-01-01T09:13:00Z",
"transaction_amount_usd": 3373.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.875,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 557468.71,
"financial_exposure_usd": 858023.62,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104594",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "medium",
"timestamp": "2026-01-04T04:34:00Z",
"trace_id": "434b2f8f-afbc-d3a1-67c1-621101038d22"
} | {
"account_age_days": 476,
"account_id": "ACCT-FBE9887F017A",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.64
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 898,
"timestamp": "2026-01-04T04:34:00Z",
"transaction_amount_usd": 2658712.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.796,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3606987.37,
"financial_exposure_usd": 3776312.29,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101684",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "high",
"timestamp": "2026-01-02T04:04:00Z",
"trace_id": "94603fe4-6f54-7965-535c-5899c9f0d6d4"
} | {
"account_age_days": 1113,
"account_id": "ACCT-241688C9BDD7",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.598
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1003,
"timestamp": "2026-01-02T04:04:00Z",
"transaction_amount_usd": 53635.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 603818.46,
"financial_exposure_usd": 765911.26,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101735",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-02T04:55:00Z",
"trace_id": "957c2f99-b096-d2fd-ff4a-80cd2af2105c"
} | {
"account_age_days": 1803,
"account_id": "ACCT-E2731A295F07",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_2",
"session_entropy": 0.808
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1131,
"timestamp": "2026-01-02T04:55:00Z",
"transaction_amount_usd": 46992.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.548,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 770099.31,
"financial_exposure_usd": 1172318.27,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102944",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-03T01:04:00Z",
"trace_id": "ef8d364c-f3cb-943b-dc40-ccca1545960b"
} | {
"account_age_days": 789,
"account_id": "ACCT-5F48F3D15954",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 379,
"timestamp": "2026-01-03T01:04:00Z",
"transaction_amount_usd": 37919.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.792,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 278103.21,
"financial_exposure_usd": 363809.36,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106397",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-05T10:37:00Z",
"trace_id": "5b6eba97-3684-e767-5be3-ac77d77eb93d"
} | {
"account_age_days": 1394,
"account_id": "ACCT-6FDD0FBF7F3F",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_2",
"session_entropy": 0.569
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 200,
"timestamp": "2026-01-05T10:37:00Z",
"transaction_amount_usd": 1339437.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.655,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1944037.52,
"financial_exposure_usd": 4388706.71,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107472",
"label": "benign",
"label_confidence": 0.542,
"severity": "medium",
"timestamp": "2026-01-06T04:32:00Z",
"trace_id": "182ff946-f4aa-1dd2-4e4c-df66fe24345e"
} | {
"account_age_days": 1080,
"account_id": "ACCT-9928B96DC820",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.878
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 782,
"timestamp": "2026-01-06T04:32:00Z",
"transaction_amount_usd": 13061.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1894.65,
"financial_exposure_usd": 2272.14,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104138",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-03T20:58:00Z",
"trace_id": "f18c4b60-530f-0580-4754-0b89625711ff"
} | {
"account_age_days": 34,
"account_id": "ACCT-9550C8FCE440",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_3",
"session_entropy": 0.748
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 235,
"timestamp": "2026-01-03T11:23:00Z",
"transaction_amount_usd": 16.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.793,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4050252.44,
"financial_exposure_usd": 4936428.42,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106827",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-05T17:47:00Z",
"trace_id": "6afc2a0e-38f9-761d-1a1d-e566a4abc220"
} | {
"account_age_days": 1042,
"account_id": "ACCT-886078BA01FD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1073,
"timestamp": "2026-01-05T17:47:00Z",
"transaction_amount_usd": 6930.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1654.17,
"financial_exposure_usd": 2808.55,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105035",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "critical",
"timestamp": "2026-01-04T11:55:00Z",
"trace_id": "8feae5cb-2964-bd08-8d20-875c7e41ecff"
} | {
"account_age_days": 1506,
"account_id": "ACCT-FC583C2D9BC9",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_1",
"session_entropy": 0.348
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 162,
"timestamp": "2026-01-03T23:47:00Z",
"transaction_amount_usd": 5.7
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.61,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4004061.99,
"financial_exposure_usd": 4226562.78,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109781",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-07T19:01:00Z",
"trace_id": "a441e714-d226-a9ae-f37b-be16b622e69d"
} | {
"account_age_days": 349,
"account_id": "ACCT-B4F68AB07CE8",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 419,
"timestamp": "2026-01-07T19:01:00Z",
"transaction_amount_usd": 6779.44
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.523,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6093.62,
"financial_exposure_usd": 6165.98,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109510",
"label": "benign",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-07T14:30:00Z",
"trace_id": "3b97fa9c-8927-2b8d-4fdc-1daffaabeb91"
} | {
"account_age_days": 1269,
"account_id": "ACCT-9F9DCFF5DFEC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.834
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 324,
"timestamp": "2026-01-07T14:30:00Z",
"transaction_amount_usd": 8346.4
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2707.3,
"financial_exposure_usd": 4085.48,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108196",
"label": "benign",
"label_confidence": 0.499,
"severity": "low",
"timestamp": "2026-01-06T16:36:00Z",
"trace_id": "e268b1a0-1e99-6ea8-9147-a754891c708d"
} | {
"account_age_days": 1769,
"account_id": "ACCT-D793CFA1D094",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 455,
"timestamp": "2026-01-06T16:36:00Z",
"transaction_amount_usd": 11792.99
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1384.87,
"financial_exposure_usd": 1458.53,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100859",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-01T14:19:00Z",
"trace_id": "3a0f144a-feea-4d3f-9d1f-a85991f3aae2"
} | {
"account_age_days": 1908,
"account_id": "ACCT-C7DBC95302EF",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.63
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 617,
"timestamp": "2026-01-01T14:19:00Z",
"transaction_amount_usd": 57105.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 221353.7,
"financial_exposure_usd": 379771.14,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106578",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "medium",
"timestamp": "2026-01-05T13:38:00Z",
"trace_id": "38900f1d-92f1-979b-dc4b-bac7b975609d"
} | {
"account_age_days": 1464,
"account_id": "ACCT-50BDBF5AF1A3",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_3",
"session_entropy": 0.597
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 419,
"timestamp": "2026-01-05T13:38:00Z",
"transaction_amount_usd": 1277758.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4450706.89,
"financial_exposure_usd": 6424733.87,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105850",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "low",
"timestamp": "2026-01-05T01:30:00Z",
"trace_id": "db25a897-722c-28c3-0d56-ddfb6aa8b514"
} | {
"account_age_days": 468,
"account_id": "ACCT-241736B287B5",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.101
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 317,
"timestamp": "2026-01-04T21:17:00Z",
"transaction_amount_usd": 9.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6048107.13,
"financial_exposure_usd": 6048482.8,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105957",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "medium",
"timestamp": "2026-01-05T03:17:00Z",
"trace_id": "829199b0-3b4b-ea7c-9394-7d7e6e1d8019"
} | {
"account_age_days": 1164,
"account_id": "ACCT-9AFDCDFA737D",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.516
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 271,
"timestamp": "2026-01-05T03:17:00Z",
"transaction_amount_usd": 1334213.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.679,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4172030.19,
"financial_exposure_usd": 5367511.57,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107231",
"label": "benign",
"label_confidence": 0.653,
"severity": "medium",
"timestamp": "2026-01-06T00:31:00Z",
"trace_id": "b3e4dc47-e1c7-9e23-64bf-2ff2064dd05a"
} | {
"account_age_days": 1349,
"account_id": "ACCT-20D73F182799",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.558
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 869,
"timestamp": "2026-01-06T00:31:00Z",
"transaction_amount_usd": 14810.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4520.2,
"financial_exposure_usd": 6892.53,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100407",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-01T06:47:00Z",
"trace_id": "9f18336d-ce94-f92b-85e7-6074ef9a354a"
} | {
"account_age_days": 1556,
"account_id": "ACCT-14AEE34D1500",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 954,
"timestamp": "2026-01-01T06:47:00Z",
"transaction_amount_usd": 105556.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.506,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 362081.22,
"financial_exposure_usd": 784443.09,
"recoverable_pct": 0.333
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104750",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "high",
"timestamp": "2026-01-04T07:10:00Z",
"trace_id": "1e8705be-10ab-0ed7-de67-1367a3992c5c"
} | {
"account_age_days": 1967,
"account_id": "ACCT-D0AC8E4EE983",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 483,
"timestamp": "2026-01-04T07:10:00Z",
"transaction_amount_usd": 1513624.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5936712.78,
"financial_exposure_usd": 5951404.41,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107570",
"label": "benign",
"label_confidence": 0.706,
"severity": "high",
"timestamp": "2026-01-06T06:10:00Z",
"trace_id": "f1ecd11e-1e74-bd10-9f45-8d8deff50227"
} | {
"account_age_days": 608,
"account_id": "ACCT-92E65440F462",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.288
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 409,
"timestamp": "2026-01-06T06:10:00Z",
"transaction_amount_usd": 451.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1919.79,
"financial_exposure_usd": 4164.75,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105633",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "critical",
"timestamp": "2026-01-04T21:53:00Z",
"trace_id": "4d0d2446-5393-1b42-73b5-0e5b5239eaf8"
} | {
"account_age_days": 1910,
"account_id": "ACCT-6849FAAC3CD1",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_3",
"session_entropy": 0.604
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 233,
"timestamp": "2026-01-04T21:53:00Z",
"transaction_amount_usd": 1558199.39
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.488,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3554454.64,
"financial_exposure_usd": 3920860.49,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106715",
"label": "benign",
"label_confidence": 0.505,
"severity": "medium",
"timestamp": "2026-01-05T15:55:00Z",
"trace_id": "fc8a8dc1-2d99-6486-3bab-5496c43df8eb"
} | {
"account_age_days": 421,
"account_id": "ACCT-98E100D30E69",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.449
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 772,
"timestamp": "2026-01-05T15:55:00Z",
"transaction_amount_usd": 10212.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1564.12,
"financial_exposure_usd": 1842.44,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108854",
"label": "benign",
"label_confidence": 0.617,
"severity": "medium",
"timestamp": "2026-01-07T03:34:00Z",
"trace_id": "466306cf-5a02-31f9-157a-5cfb4069c918"
} | {
"account_age_days": 1449,
"account_id": "ACCT-B08170A51FA5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.511
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 695,
"timestamp": "2026-01-07T03:34:00Z",
"transaction_amount_usd": 2275.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3277.32,
"financial_exposure_usd": 4114.65,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109607",
"label": "benign",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-07T16:07:00Z",
"trace_id": "36fd8f25-ad91-9876-ab5b-7afa6629f3f8"
} | {
"account_age_days": 1579,
"account_id": "ACCT-5D5E04263355",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.222
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 102,
"timestamp": "2026-01-07T13:01:00Z",
"transaction_amount_usd": 16.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.704,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1118.16,
"financial_exposure_usd": 1807.88,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102308",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "high",
"timestamp": "2026-01-02T14:28:00Z",
"trace_id": "0bfa16e0-bbf4-b33b-ca9f-5cb52d458ec1"
} | {
"account_age_days": 1225,
"account_id": "ACCT-37FE228AD76B",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_1",
"session_entropy": 0.948
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 223,
"timestamp": "2026-01-02T14:28:00Z",
"transaction_amount_usd": 108358.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 608427.7,
"financial_exposure_usd": 646728.25,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100061",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-01T01:01:00Z",
"trace_id": "a9d049dc-369e-5af8-e226-49ee38a06ffe"
} | {
"account_age_days": 182,
"account_id": "ACCT-B784AE08758F",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 98,
"timestamp": "2026-01-01T01:01:00Z",
"transaction_amount_usd": 35582.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.457,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 551969.47,
"financial_exposure_usd": 751131.63,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104258",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-03T22:58:00Z",
"trace_id": "eb57338d-6608-58fc-fc00-d1863ca101b2"
} | {
"account_age_days": 1904,
"account_id": "ACCT-D0D09566EAFE",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.164
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 525,
"timestamp": "2026-01-03T22:58:00Z",
"transaction_amount_usd": 234435.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.745,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1641714.16,
"financial_exposure_usd": 2378988.28,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105983",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-05T03:43:00Z",
"trace_id": "98cccd85-3df6-ebca-7409-a5767d93e25c"
} | {
"account_age_days": 1828,
"account_id": "ACCT-7B0F1958506B",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_1",
"session_entropy": 0.263
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 316,
"timestamp": "2026-01-04T21:54:00Z",
"transaction_amount_usd": 20.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.941,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3184809.67,
"financial_exposure_usd": 3325183.21,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105100",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "low",
"timestamp": "2026-01-04T13:00:00Z",
"trace_id": "4bdcd7e1-8d3a-d871-ad48-1823cf62d3b7"
} | {
"account_age_days": 334,
"account_id": "ACCT-DF7A3D35FB34",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 608,
"timestamp": "2026-01-04T13:00:00Z",
"transaction_amount_usd": 1999037.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2363156.87,
"financial_exposure_usd": 3878794.01,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105681",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-04T22:41:00Z",
"trace_id": "f69894ed-47d3-0e22-aa5a-981b048225f7"
} | {
"account_age_days": 1369,
"account_id": "ACCT-FD14610E208B",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.8
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 228,
"timestamp": "2026-01-04T22:41:00Z",
"transaction_amount_usd": 2083009.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.646,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2581217.32,
"financial_exposure_usd": 3034552.88,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103324",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-03T07:24:00Z",
"trace_id": "e71945aa-18a3-ebd0-10a8-92b0bdd6a30c"
} | {
"account_age_days": 5,
"account_id": "ACCT-3AECDFDB8592",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 348,
"timestamp": "2026-01-03T07:24:00Z",
"transaction_amount_usd": 48575.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 421880.27,
"financial_exposure_usd": 467010.5,
"recoverable_pct": 0.158
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105690",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "high",
"timestamp": "2026-01-04T22:50:00Z",
"trace_id": "3d51b96c-e682-e3fc-8d7d-f8cfbd166434"
} | {
"account_age_days": 449,
"account_id": "ACCT-FF36AD024514",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.771
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 521,
"timestamp": "2026-01-04T22:50:00Z",
"transaction_amount_usd": 369402.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.624,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1361375.58,
"financial_exposure_usd": 2894158.5,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105673",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-04T22:33:00Z",
"trace_id": "33e790b6-1436-b494-9ddf-e96ac40df70b"
} | {
"account_age_days": 596,
"account_id": "ACCT-466D17C2F77A",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 669,
"timestamp": "2026-01-04T22:33:00Z",
"transaction_amount_usd": 1948795.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.782,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3183946.94,
"financial_exposure_usd": 5109309.77,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103880",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "low",
"timestamp": "2026-01-03T16:40:00Z",
"trace_id": "1bf285ea-c977-6af7-7381-0b3da9a324c5"
} | {
"account_age_days": 113,
"account_id": "ACCT-DFF1F117F020",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 514,
"timestamp": "2026-01-03T16:40:00Z",
"transaction_amount_usd": 73409.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.793,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2400754.66,
"financial_exposure_usd": 3616706.04,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102751",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-02T21:51:00Z",
"trace_id": "e34cb174-01ee-0e9e-baae-13ec319afe68"
} | {
"account_age_days": 748,
"account_id": "ACCT-79153E8BE29F",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 418,
"timestamp": "2026-01-02T21:51:00Z",
"transaction_amount_usd": 61188.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.686,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 622684.16,
"financial_exposure_usd": 749708.31,
"recoverable_pct": 0.395
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109997",
"label": "benign",
"label_confidence": 0.544,
"severity": "low",
"timestamp": "2026-01-07T22:37:00Z",
"trace_id": "207c424d-0ab2-6959-ca8d-ed15809690d0"
} | {
"account_age_days": 1510,
"account_id": "ACCT-935D3769A981",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.69
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1115,
"timestamp": "2026-01-07T22:37:00Z",
"transaction_amount_usd": 3296.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2472.1,
"financial_exposure_usd": 3115.44,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100011",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-01T00:11:00Z",
"trace_id": "3d67cde9-2834-e4c0-14c8-b3b4a911d192"
} | {
"account_age_days": 1337,
"account_id": "ACCT-2CD94CBBC19A",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.5
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 676,
"timestamp": "2026-01-01T00:11:00Z",
"transaction_amount_usd": 19205.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 500913.62,
"financial_exposure_usd": 641480.77,
"recoverable_pct": 0.418
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108985",
"label": "benign",
"label_confidence": 0.56,
"severity": "critical",
"timestamp": "2026-01-07T05:45:00Z",
"trace_id": "5844fb85-138c-86fb-de4a-cdd0b728f5bb"
} | {
"account_age_days": 469,
"account_id": "ACCT-E6D15F939E24",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.52
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 307,
"timestamp": "2026-01-07T04:49:00Z",
"transaction_amount_usd": 18
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 403.16,
"financial_exposure_usd": 510.95,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100254",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "high",
"timestamp": "2026-01-01T04:14:00Z",
"trace_id": "9eead5de-f5b5-777f-041c-4ba30bb90921"
} | {
"account_age_days": 1462,
"account_id": "ACCT-DDE630E0CBEE",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_3",
"session_entropy": 0.37
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 258,
"timestamp": "2026-01-01T04:14:00Z",
"transaction_amount_usd": 18387.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.457,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 534151.18,
"financial_exposure_usd": 916643.62,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108360",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-06T19:20:00Z",
"trace_id": "ddeb213e-3822-4a5e-2c24-e815df6dacb2"
} | {
"account_age_days": 912,
"account_id": "ACCT-65A55360AB80",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 225,
"timestamp": "2026-01-06T19:20:00Z",
"transaction_amount_usd": 13447.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3144.32,
"financial_exposure_usd": 6451.68,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105814",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "medium",
"timestamp": "2026-01-05T00:54:00Z",
"trace_id": "46f1ca95-9f65-083b-bb7e-b0f4db55abd8"
} | {
"account_age_days": 1030,
"account_id": "ACCT-EDC652059388",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.578
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 346,
"timestamp": "2026-01-05T00:54:00Z",
"transaction_amount_usd": 284061.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2232134.15,
"financial_exposure_usd": 4263613.55,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107341",
"label": "benign",
"label_confidence": 0.748,
"severity": "low",
"timestamp": "2026-01-06T02:21:00Z",
"trace_id": "0595d094-7921-9717-3f45-0fd2d2e71d9c"
} | {
"account_age_days": 669,
"account_id": "ACCT-16EC75F73568",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 129,
"timestamp": "2026-01-05T20:04:00Z",
"transaction_amount_usd": 9.52
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4258.06,
"financial_exposure_usd": 8118.04,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100262",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-01T04:22:00Z",
"trace_id": "5c726f34-49a8-5d9e-dec7-56cad02094d6"
} | {
"account_age_days": 960,
"account_id": "ACCT-96A8DF54726A",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.513
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 482,
"timestamp": "2026-01-01T04:22:00Z",
"transaction_amount_usd": 59297.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.372,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 391711.31,
"financial_exposure_usd": 521351.13,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105463",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-04T19:03:00Z",
"trace_id": "edd29f88-784c-e3d3-092d-d43b42b1fcf2"
} | {
"account_age_days": 1498,
"account_id": "ACCT-018736311C33",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_3",
"session_entropy": 0.258
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 99,
"timestamp": "2026-01-04T19:03:00Z",
"transaction_amount_usd": 214786.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.397,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4782793,
"financial_exposure_usd": 9246956.77,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108600",
"label": "benign",
"label_confidence": 0.55,
"severity": "critical",
"timestamp": "2026-01-06T23:20:00Z",
"trace_id": "49d18fc2-4bd8-fdaa-b0b7-9d0150c51c77"
} | {
"account_age_days": 1281,
"account_id": "ACCT-00F6F78D6AFB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.254
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 145,
"timestamp": "2026-01-06T23:20:00Z",
"transaction_amount_usd": 3854.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 5908.14,
"financial_exposure_usd": 6849.72,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109874",
"label": "benign",
"label_confidence": 0.734,
"severity": "low",
"timestamp": "2026-01-07T20:34:00Z",
"trace_id": "2b3d5f74-79c3-d1a6-5e7d-89aa42e8de70"
} | {
"account_age_days": 293,
"account_id": "ACCT-3771A3357AED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.754
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 149,
"timestamp": "2026-01-07T10:54:00Z",
"transaction_amount_usd": 7.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3865.03,
"financial_exposure_usd": 4533.97,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109077",
"label": "benign",
"label_confidence": 0.673,
"severity": "high",
"timestamp": "2026-01-07T07:17:00Z",
"trace_id": "0d555254-8c98-7032-e689-e22053a244fb"
} | {
"account_age_days": 1128,
"account_id": "ACCT-9A61D521F1AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1052,
"timestamp": "2026-01-07T07:17:00Z",
"transaction_amount_usd": 4631.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1562.74,
"financial_exposure_usd": 1815.02,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104935",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "medium",
"timestamp": "2026-01-04T10:15:00Z",
"trace_id": "97e5b615-feb1-cb00-1c6e-6e63d4e771dc"
} | {
"account_age_days": 796,
"account_id": "ACCT-43F79BA1774A",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_3",
"session_entropy": 0.887
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 298,
"timestamp": "2026-01-04T10:15:00Z",
"transaction_amount_usd": 1890664.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3399178.43,
"financial_exposure_usd": 5549998.87,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105220",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-04T15:00:00Z",
"trace_id": "3bdd2eea-d9c0-0751-2a0a-ce33dab928d5"
} | {
"account_age_days": 366,
"account_id": "ACCT-0E60FD4ECF2E",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_2",
"session_entropy": 0.322
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 474,
"timestamp": "2026-01-04T15:00:00Z",
"transaction_amount_usd": 942329.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.552,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 587970.3,
"financial_exposure_usd": 745839.58,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104807",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "high",
"timestamp": "2026-01-04T08:07:00Z",
"trace_id": "d287d267-77b8-186a-830a-9274789a53a0"
} | {
"account_age_days": 1302,
"account_id": "ACCT-43C0C5FCBD89",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 114,
"timestamp": "2026-01-04T08:07:00Z",
"transaction_amount_usd": 1050151.2
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3251815.41,
"financial_exposure_usd": 3797122.75,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107348",
"label": "benign",
"label_confidence": 0.583,
"severity": "low",
"timestamp": "2026-01-06T02:28:00Z",
"trace_id": "6a0b1f78-7ef2-1619-2b9f-f4182b1357bb"
} | {
"account_age_days": 581,
"account_id": "ACCT-55CD58FA31A1",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_3",
"session_entropy": 0.577
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 110,
"timestamp": "2026-01-06T02:28:00Z",
"transaction_amount_usd": 9390.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1273.65,
"financial_exposure_usd": 2524.36,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103258",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "critical",
"timestamp": "2026-01-03T06:18:00Z",
"trace_id": "5f8b28d8-3efa-a32b-effa-cdd95973133c"
} | {
"account_age_days": 1644,
"account_id": "ACCT-41B4529BB007",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_3",
"session_entropy": 0.911
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 279,
"timestamp": "2026-01-03T03:21:00Z",
"transaction_amount_usd": 9.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.747,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 295478.73,
"financial_exposure_usd": 386436.78,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106243",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "critical",
"timestamp": "2026-01-05T08:03:00Z",
"trace_id": "5d59c990-9ec5-22c2-b1be-f19060bafe99"
} | {
"account_age_days": 1535,
"account_id": "ACCT-F8DE76BFC378",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.564
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 313,
"timestamp": "2026-01-05T08:03:00Z",
"transaction_amount_usd": 602724.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.816,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1350643.16,
"financial_exposure_usd": 3041163.35,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108966",
"label": "benign",
"label_confidence": 0.478,
"severity": "high",
"timestamp": "2026-01-07T05:26:00Z",
"trace_id": "da2c7336-fa5d-1dd3-8434-f310b913d859"
} | {
"account_age_days": 465,
"account_id": "ACCT-0B3935DB72C3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.788
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 661,
"timestamp": "2026-01-07T05:26:00Z",
"transaction_amount_usd": 8363.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.702,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3660.47,
"financial_exposure_usd": 4161.56,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103183",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "high",
"timestamp": "2026-01-03T05:03:00Z",
"trace_id": "4377eb34-8ad1-f732-0984-e8369e047ad4"
} | {
"account_age_days": 571,
"account_id": "ACCT-4756B531ABA3",
"baseline_risk_score": 0.451,
"kyc_tier": "tier_2",
"session_entropy": 0.832
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 498,
"timestamp": "2026-01-03T05:03:00Z",
"transaction_amount_usd": 30910.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 456497.86,
"financial_exposure_usd": 589767.11,
"recoverable_pct": 0.325
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107880",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-06T11:20:00Z",
"trace_id": "4ce8611d-01cd-9212-8db9-eefd77fa1c21"
} | {
"account_age_days": 584,
"account_id": "ACCT-9B089BDFE7AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.573
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 339,
"timestamp": "2026-01-06T07:39:00Z",
"transaction_amount_usd": 5.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 878.68,
"financial_exposure_usd": 1119.62,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106268",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-05T08:28:00Z",
"trace_id": "f7fbc99f-7604-9054-faf0-b08f4210c861"
} | {
"account_age_days": 754,
"account_id": "ACCT-A8193441FFB7",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 616,
"timestamp": "2026-01-05T08:28:00Z",
"transaction_amount_usd": 640713.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.503,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4609006.84,
"financial_exposure_usd": 5065159.04,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103775",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "high",
"timestamp": "2026-01-03T14:55:00Z",
"trace_id": "0064a974-9422-f986-0738-9cc3dc9622ca"
} | {
"account_age_days": 1563,
"account_id": "ACCT-15E073A4F8DF",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.839
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 408,
"timestamp": "2026-01-03T14:55:00Z",
"transaction_amount_usd": 2767872.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.581,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3387286.66,
"financial_exposure_usd": 5355758.88,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102339",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "low",
"timestamp": "2026-01-02T14:59:00Z",
"trace_id": "0f110e62-9c84-474a-5377-8c32cfa188fe"
} | {
"account_age_days": 1404,
"account_id": "ACCT-793D8F548ABE",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 104,
"timestamp": "2026-01-02T14:59:00Z",
"transaction_amount_usd": 11612.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.526,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 271255.18,
"financial_exposure_usd": 517138.16,
"recoverable_pct": 0.325
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105193",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-04T14:33:00Z",
"trace_id": "735d21af-0cef-f344-c58f-9f774be2faab"
} | {
"account_age_days": 1313,
"account_id": "ACCT-8E3A508A5BE3",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.694
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1138,
"timestamp": "2026-01-04T14:33:00Z",
"transaction_amount_usd": 1452491.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3244334.96,
"financial_exposure_usd": 4388862.31,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106890",
"label": "benign",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-05T18:50:00Z",
"trace_id": "f3a18ef0-d31a-093f-6998-a7a8b720f55b"
} | {
"account_age_days": 621,
"account_id": "ACCT-6E3C810E64E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 200,
"timestamp": "2026-01-05T13:00:00Z",
"transaction_amount_usd": 14.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.773,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1151.74,
"financial_exposure_usd": 1709.12,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100858",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-01T14:18:00Z",
"trace_id": "5e0d2664-cc67-c183-48ff-063e9885e2b5"
} | {
"account_age_days": 1680,
"account_id": "ACCT-FAA9742CDFFC",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.66
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 405,
"timestamp": "2026-01-01T14:18:00Z",
"transaction_amount_usd": 62981.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 611933,
"financial_exposure_usd": 693534.13,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102685",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-02T20:45:00Z",
"trace_id": "76a3a6bd-23d4-3dec-905b-0a54375d8a70"
} | {
"account_age_days": 1521,
"account_id": "ACCT-BD8FBBFE3918",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_3",
"session_entropy": 0.82
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 864,
"timestamp": "2026-01-02T20:45:00Z",
"transaction_amount_usd": 58864.64
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.674,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 282049.03,
"financial_exposure_usd": 343573.51,
"recoverable_pct": 0.035
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104582",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "medium",
"timestamp": "2026-01-04T04:22:00Z",
"trace_id": "727fc97d-629d-539b-7e20-feb558ead279"
} | {
"account_age_days": 383,
"account_id": "ACCT-803798361CB6",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_1",
"session_entropy": 0.874
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 440,
"timestamp": "2026-01-04T04:22:00Z",
"transaction_amount_usd": 2962466.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.615,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3631095.59,
"financial_exposure_usd": 6104886.29,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107751",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-06T09:11:00Z",
"trace_id": "c6a28120-7ee0-795d-fd7b-a34f2f2b26e3"
} | {
"account_age_days": 997,
"account_id": "ACCT-1DEFAB3482C9",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_2",
"session_entropy": 0.573
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 815,
"timestamp": "2026-01-06T09:11:00Z",
"transaction_amount_usd": 8397.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1902.72,
"financial_exposure_usd": 2347.33,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106277",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-05T08:37:00Z",
"trace_id": "5924119d-2792-7198-2f81-296b316fb337"
} | {
"account_age_days": 535,
"account_id": "ACCT-A263C4438F18",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_2",
"session_entropy": 0.781
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 424,
"timestamp": "2026-01-05T08:37:00Z",
"transaction_amount_usd": 2293180.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5787546.88,
"financial_exposure_usd": 6833425.36,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109906",
"label": "benign",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-07T21:06:00Z",
"trace_id": "743d174c-913c-6882-ccb8-a0337f2f4268"
} | {
"account_age_days": 19,
"account_id": "ACCT-54F2DA84D80C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.538
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 85,
"timestamp": "2026-01-07T08:37:00Z",
"transaction_amount_usd": 0.33
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1852.89,
"financial_exposure_usd": 2165.17,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103700",
"label": "fraudulent",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-03T13:40:00Z",
"trace_id": "d4194a73-1999-4df9-2d30-a02d18e17749"
} | {
"account_age_days": 91,
"account_id": "ACCT-8F7690B59652",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.12
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 340,
"timestamp": "2026-01-03T09:17:00Z",
"transaction_amount_usd": 10.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.568,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3953935.19,
"financial_exposure_usd": 6379972.67,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109388",
"label": "benign",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-07T12:28:00Z",
"trace_id": "780d70a2-39c8-c0c9-37d4-18661dce4a71"
} | {
"account_age_days": 464,
"account_id": "ACCT-2807321F04AC",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_1",
"session_entropy": 0.328
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 383,
"timestamp": "2026-01-07T03:48:00Z",
"transaction_amount_usd": 13.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2776.51,
"financial_exposure_usd": 4005.92,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105125",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "critical",
"timestamp": "2026-01-04T13:25:00Z",
"trace_id": "602beb82-97c7-c23c-48ae-4f63043246e2"
} | {
"account_age_days": 1790,
"account_id": "ACCT-9979FCDAC766",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.397
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 640,
"timestamp": "2026-01-04T13:25:00Z",
"transaction_amount_usd": 2192661.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.924,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4595591.37,
"financial_exposure_usd": 8245783.32,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104054",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "critical",
"timestamp": "2026-01-03T19:34:00Z",
"trace_id": "0683f8be-61f4-d1d4-f229-121e590e0e37"
} | {
"account_age_days": 1180,
"account_id": "ACCT-4F34E90D0ADF",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_3",
"session_entropy": 0.151
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 122,
"timestamp": "2026-01-03T14:01:00Z",
"transaction_amount_usd": 17.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6435156.67,
"financial_exposure_usd": 6453525.54,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105728",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-04T23:28:00Z",
"trace_id": "69e7f5ae-a8ac-be48-4eb7-5b72789fdf12"
} | {
"account_age_days": 56,
"account_id": "ACCT-DB9743726A45",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.823
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 552,
"timestamp": "2026-01-04T23:28:00Z",
"transaction_amount_usd": 1139221.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.697,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1803698.97,
"financial_exposure_usd": 4072108.15,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102850",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-02T23:30:00Z",
"trace_id": "361145f4-a41c-ad13-ac70-94f77b6ceec5"
} | {
"account_age_days": 855,
"account_id": "ACCT-ECDD7C50D912",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_2",
"session_entropy": 0.481
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 232,
"timestamp": "2026-01-02T23:30:00Z",
"transaction_amount_usd": 95665.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.46,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 27691.07,
"financial_exposure_usd": 33852.51,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101012",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-01T16:52:00Z",
"trace_id": "b05c8346-575f-ee90-5af9-13bcf3ba37a5"
} | {
"account_age_days": 1221,
"account_id": "ACCT-F6D645C521D7",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_3",
"session_entropy": 0.435
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1060,
"timestamp": "2026-01-01T16:52:00Z",
"transaction_amount_usd": 41631.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 563107.6,
"financial_exposure_usd": 713786.99,
"recoverable_pct": 0.113
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102408",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-02T16:08:00Z",
"trace_id": "169cc3f6-8ac5-4769-abe6-cd6f9bf595da"
} | {
"account_age_days": 951,
"account_id": "ACCT-DA6E706F2BA9",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 350,
"timestamp": "2026-01-02T10:15:00Z",
"transaction_amount_usd": 22.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 34471.23,
"financial_exposure_usd": 35257.88,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103988",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-03T18:28:00Z",
"trace_id": "e83d706d-3566-8fe8-8430-3423b1555326"
} | {
"account_age_days": 789,
"account_id": "ACCT-85A15A02C58D",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_3",
"session_entropy": 0.897
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 719,
"timestamp": "2026-01-03T18:28:00Z",
"transaction_amount_usd": 822825.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4518466.86,
"financial_exposure_usd": 4845655.9,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105751",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "critical",
"timestamp": "2026-01-04T23:51:00Z",
"trace_id": "d6b47186-d6a1-4b21-e3cd-bdf038d9f1fc"
} | {
"account_age_days": 1627,
"account_id": "ACCT-2172D39BC9ED",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_1",
"session_entropy": 0.767
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 886,
"timestamp": "2026-01-04T23:51:00Z",
"transaction_amount_usd": 540215.76
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2614251.82,
"financial_exposure_usd": 3758080.05,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104692",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "critical",
"timestamp": "2026-01-04T06:12:00Z",
"trace_id": "961634a1-c713-25a4-fa06-ae492393e830"
} | {
"account_age_days": 1801,
"account_id": "ACCT-218F7AEF2626",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_2",
"session_entropy": 0.865
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 603,
"timestamp": "2026-01-04T06:12:00Z",
"transaction_amount_usd": 2730257.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.691,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4319358.88,
"financial_exposure_usd": 6250939.09,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102920",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-03T00:40:00Z",
"trace_id": "5811841a-24d8-c996-fea4-987656f87473"
} | {
"account_age_days": 1729,
"account_id": "ACCT-56D0C055BF23",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 330,
"timestamp": "2026-01-02T22:44:00Z",
"transaction_amount_usd": 3.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 304948.21,
"financial_exposure_usd": 443712.98,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103679",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-03T13:19:00Z",
"trace_id": "4ff1ef33-b984-38fd-9a74-23e2430bb391"
} | {
"account_age_days": 1759,
"account_id": "ACCT-FFC49FE12D84",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_3",
"session_entropy": 0.252
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1025,
"timestamp": "2026-01-03T13:19:00Z",
"transaction_amount_usd": 2484192.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.394,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1862748.58,
"financial_exposure_usd": 2349488.9,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107430",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T03:50:00Z",
"trace_id": "89a73c3b-8172-506f-6442-0a8a569bdb32"
} | {
"account_age_days": 32,
"account_id": "ACCT-653CD1E7CDFC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.634
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 955,
"timestamp": "2026-01-06T03:50:00Z",
"transaction_amount_usd": 5587.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3396.33,
"financial_exposure_usd": 4250.7,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105482",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-04T19:22:00Z",
"trace_id": "b27fc506-af09-f833-a624-d786f128fddf"
} | {
"account_age_days": 1775,
"account_id": "ACCT-CAD7254A5B9C",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1046,
"timestamp": "2026-01-04T19:22:00Z",
"transaction_amount_usd": 2327536.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.77,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1470847.86,
"financial_exposure_usd": 1887963.43,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106323",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-05T09:23:00Z",
"trace_id": "80b4a3e3-8ac6-f1ef-0fe1-9c38ca595692"
} | {
"account_age_days": 968,
"account_id": "ACCT-2B2425DBAE13",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.318
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 422,
"timestamp": "2026-01-05T09:23:00Z",
"transaction_amount_usd": 206255.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.491,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4058685.55,
"financial_exposure_usd": 4210224.31,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106107",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "medium",
"timestamp": "2026-01-05T05:47:00Z",
"trace_id": "d35014d6-ebca-b8e9-3e81-674a0ca52136"
} | {
"account_age_days": 717,
"account_id": "ACCT-E443583902EA",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.503
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 347,
"timestamp": "2026-01-05T00:50:00Z",
"transaction_amount_usd": 10.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.423,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5427873.42,
"financial_exposure_usd": 7134299.72,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101762",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "low",
"timestamp": "2026-01-02T05:22:00Z",
"trace_id": "fd00add1-013b-4ebb-70d8-62fb638dc328"
} | {
"account_age_days": 96,
"account_id": "ACCT-AC9A6B218E4A",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.925
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 309,
"timestamp": "2026-01-01T22:52:00Z",
"transaction_amount_usd": 17.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.375,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 550470.69,
"financial_exposure_usd": 584259.57,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101204",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-01T20:04:00Z",
"trace_id": "b07c70f0-e361-9306-995d-517d7afae65e"
} | {
"account_age_days": 953,
"account_id": "ACCT-A13745666B5F",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_2",
"session_entropy": 0.567
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 333,
"timestamp": "2026-01-01T20:04:00Z",
"transaction_amount_usd": 57329.64
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.742,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 431645.08,
"financial_exposure_usd": 639993.44,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102080",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "medium",
"timestamp": "2026-01-02T10:40:00Z",
"trace_id": "2816167e-367e-90ed-1fac-ddd26ef7765c"
} | {
"account_age_days": 848,
"account_id": "ACCT-9EE5131B31C9",
"baseline_risk_score": 0.538,
"kyc_tier": "tier_2",
"session_entropy": 0.306
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 840,
"timestamp": "2026-01-02T10:40:00Z",
"transaction_amount_usd": 88066.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 77114.42,
"financial_exposure_usd": 139304.07,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100745",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-01T12:25:00Z",
"trace_id": "cf61a3e6-1b93-3086-a54d-26e2f7916b38"
} | {
"account_age_days": 1938,
"account_id": "ACCT-A391227CEFD1",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_1",
"session_entropy": 0.639
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 137,
"timestamp": "2026-01-01T12:25:00Z",
"transaction_amount_usd": 23419.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.532,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 566889.96,
"financial_exposure_usd": 643836.56,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100347",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "medium",
"timestamp": "2026-01-01T05:47:00Z",
"trace_id": "0e34d6f5-3338-efe5-21d4-a8606ae2d4fa"
} | {
"account_age_days": 561,
"account_id": "ACCT-79DE557601CB",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_2",
"session_entropy": 0.506
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1118,
"timestamp": "2026-01-01T05:47:00Z",
"transaction_amount_usd": 56476.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1228277.08,
"financial_exposure_usd": 1337808.95,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105225",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "high",
"timestamp": "2026-01-04T15:05:00Z",
"trace_id": "f322cff0-7d58-f08f-6e56-d30c722e94b0"
} | {
"account_age_days": 1991,
"account_id": "ACCT-09D080240BE4",
"baseline_risk_score": 0.231,
"kyc_tier": "tier_3",
"session_entropy": 0.24
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 295,
"timestamp": "2026-01-04T08:58:00Z",
"transaction_amount_usd": 10.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.7,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 7175389.87,
"financial_exposure_usd": 9245468.46,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102519",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-02T17:59:00Z",
"trace_id": "38169de3-5daf-829d-ed89-da10298af228"
} | {
"account_age_days": 189,
"account_id": "ACCT-87D6D6FCD820",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 342,
"timestamp": "2026-01-02T06:31:00Z",
"transaction_amount_usd": 13.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.709,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 399548.6,
"financial_exposure_usd": 857356.22,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.