schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106476",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-05T11:56:00Z",
"trace_id": "0054276c-476d-6e06-7a19-a36dddc95d1b"
} | {
"account_age_days": 569,
"account_id": "ACCT-32DB00266C8F",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_1",
"session_entropy": 0.559
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 623,
"timestamp": "2026-01-05T11:56:00Z",
"transaction_amount_usd": 961611.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.936,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2013587.82,
"financial_exposure_usd": 2257732.65,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105107",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "low",
"timestamp": "2026-01-04T13:07:00Z",
"trace_id": "a3891c08-1b60-f193-0cc0-381fa6d208e7"
} | {
"account_age_days": 586,
"account_id": "ACCT-F81F6CFFA69D",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.117
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 109,
"timestamp": "2026-01-04T13:07:00Z",
"transaction_amount_usd": 2697947.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2784842.29,
"financial_exposure_usd": 5486090.09,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108627",
"label": "benign",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-06T23:47:00Z",
"trace_id": "ac302be8-5d89-a53a-1d63-cbdc551e612e"
} | {
"account_age_days": 812,
"account_id": "ACCT-8457B20961A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.152
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 188,
"timestamp": "2026-01-06T23:47:00Z",
"transaction_amount_usd": 12538.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1223.1,
"financial_exposure_usd": 2844.52,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108348",
"label": "benign",
"label_confidence": 0.636,
"severity": "low",
"timestamp": "2026-01-06T19:08:00Z",
"trace_id": "8c70cce1-418a-ff40-23c7-2d2085eb8f6d"
} | {
"account_age_days": 1943,
"account_id": "ACCT-43C17B331A59",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.479
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 935,
"timestamp": "2026-01-06T19:08:00Z",
"transaction_amount_usd": 2944.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.756,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 544.77,
"financial_exposure_usd": 1350.6,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107152",
"label": "benign",
"label_confidence": 0.622,
"severity": "high",
"timestamp": "2026-01-05T23:12:00Z",
"trace_id": "cb74168d-150f-8c1a-0ecb-41503c7a8ff5"
} | {
"account_age_days": 127,
"account_id": "ACCT-FDF10764993A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.643
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1031,
"timestamp": "2026-01-05T23:12:00Z",
"transaction_amount_usd": 9040.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.57,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 3772.16,
"financial_exposure_usd": 5765.23,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100456",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-01T07:36:00Z",
"trace_id": "889d12fc-e704-4fd6-cd66-432b5bd6ac09"
} | {
"account_age_days": 560,
"account_id": "ACCT-EA58867E01FC",
"baseline_risk_score": 0.534,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 147,
"timestamp": "2025-12-31T21:54:00Z",
"transaction_amount_usd": 10.79
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.758,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 473391.21,
"financial_exposure_usd": 990476.65,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105471",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-04T19:11:00Z",
"trace_id": "9ddad30c-4bf9-8322-14cc-6ba455d8edce"
} | {
"account_age_days": 828,
"account_id": "ACCT-A0A40F69C9AD",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.137
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1151,
"timestamp": "2026-01-04T19:11:00Z",
"transaction_amount_usd": 2404147.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4652205.89,
"financial_exposure_usd": 4787239.7,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109690",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-07T17:30:00Z",
"trace_id": "b2e44492-f454-7d8a-63d5-deb1d07ae700"
} | {
"account_age_days": 642,
"account_id": "ACCT-A098C7CDC8DC",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_1",
"session_entropy": 0.457
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 820,
"timestamp": "2026-01-07T17:30:00Z",
"transaction_amount_usd": 9693.88
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1093.3,
"financial_exposure_usd": 2564.13,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107716",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-06T08:36:00Z",
"trace_id": "b96ac23b-0647-934d-db9c-97a9d984aac9"
} | {
"account_age_days": 97,
"account_id": "ACCT-30227F25193B",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_1",
"session_entropy": 0.683
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 304,
"timestamp": "2026-01-05T20:19:00Z",
"transaction_amount_usd": 24.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3170.98,
"financial_exposure_usd": 4424.96,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100929",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-01T15:29:00Z",
"trace_id": "8a7ca0ef-915d-f252-2485-ffcf76707b61"
} | {
"account_age_days": 1472,
"account_id": "ACCT-0A9C68DE4169",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_3",
"session_entropy": 0.249
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 163,
"timestamp": "2026-01-01T15:29:00Z",
"transaction_amount_usd": 21960.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1129643.31,
"financial_exposure_usd": 1190817.32,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109761",
"label": "benign",
"label_confidence": 0.465,
"severity": "low",
"timestamp": "2026-01-07T18:41:00Z",
"trace_id": "ae3b9d62-9469-5dd5-eb11-d881067e173d"
} | {
"account_age_days": 551,
"account_id": "ACCT-BD6C6B7F3536",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.738
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 813,
"timestamp": "2026-01-07T18:41:00Z",
"transaction_amount_usd": 9677.38
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 743.39,
"financial_exposure_usd": 1629.8,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107344",
"label": "benign",
"label_confidence": 0.464,
"severity": "medium",
"timestamp": "2026-01-06T02:24:00Z",
"trace_id": "2cdcceb6-a0c7-31a1-b6f0-05ea3a934d2d"
} | {
"account_age_days": 789,
"account_id": "ACCT-560AFE3D4D12",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.463
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 149,
"timestamp": "2026-01-05T15:32:00Z",
"transaction_amount_usd": 7.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.537,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 775.17,
"financial_exposure_usd": 1216.16,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106756",
"label": "benign",
"label_confidence": 0.67,
"severity": "high",
"timestamp": "2026-01-05T16:36:00Z",
"trace_id": "f68e27bf-475c-d803-7a4a-263fb708acea"
} | {
"account_age_days": 708,
"account_id": "ACCT-6CC2D95B753C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.833
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 158,
"timestamp": "2026-01-05T12:53:00Z",
"transaction_amount_usd": 16.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 6323.03,
"financial_exposure_usd": 6598.38,
"recoverable_pct": 0.631
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109777",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-07T18:57:00Z",
"trace_id": "46112c8a-50d4-b898-f288-1c41a902f39c"
} | {
"account_age_days": 1198,
"account_id": "ACCT-8C8A7BC960AC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.627
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1062,
"timestamp": "2026-01-07T18:57:00Z",
"transaction_amount_usd": 14344.54
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3308.87,
"financial_exposure_usd": 4195.44,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104078",
"label": "fraudulent",
"label_confidence": 0.667,
"severity": "medium",
"timestamp": "2026-01-03T19:58:00Z",
"trace_id": "25b5a5ff-1286-6eff-565a-2318bd30b275"
} | {
"account_age_days": 23,
"account_id": "ACCT-05B734C8A7FB",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.57
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 233,
"timestamp": "2026-01-03T13:12:00Z",
"transaction_amount_usd": 10.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2002149.35,
"financial_exposure_usd": 2994962.78,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105837",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "low",
"timestamp": "2026-01-05T01:17:00Z",
"trace_id": "7c2b2857-50a2-21d7-55d9-49c4618a72cc"
} | {
"account_age_days": 1860,
"account_id": "ACCT-5EE830C6D6CA",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.696
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 382,
"timestamp": "2026-01-05T01:17:00Z",
"transaction_amount_usd": 824269
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IMB... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1403024.22,
"financial_exposure_usd": 3273971.18,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102419",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "high",
"timestamp": "2026-01-02T16:19:00Z",
"trace_id": "ee3d3618-2665-ada8-10b5-fc481c75cce2"
} | {
"account_age_days": 1357,
"account_id": "ACCT-19DCD3538247",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.4
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 174,
"timestamp": "2026-01-02T16:19:00Z",
"transaction_amount_usd": 67627.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.84,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 432777.54,
"financial_exposure_usd": 1027958.89,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105999",
"label": "fraudulent",
"label_confidence": 0.738,
"severity": "high",
"timestamp": "2026-01-05T03:59:00Z",
"trace_id": "d322bf95-9487-b9f1-611b-1b5d0b2cee43"
} | {
"account_age_days": 1038,
"account_id": "ACCT-BB0A0FCAA076",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.862
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 121,
"timestamp": "2026-01-05T03:59:00Z",
"transaction_amount_usd": 2386341.55
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2110825.53,
"financial_exposure_usd": 4598768.31,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101140",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-01T19:00:00Z",
"trace_id": "f6b0d804-4596-d08e-62dc-bd94338c645b"
} | {
"account_age_days": 1852,
"account_id": "ACCT-54379A63FDFA",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_3",
"session_entropy": 0.468
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 171,
"timestamp": "2026-01-01T19:00:00Z",
"transaction_amount_usd": 51244.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 259257.6,
"financial_exposure_usd": 485022.78,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107604",
"label": "benign",
"label_confidence": 0.48,
"severity": "high",
"timestamp": "2026-01-06T06:44:00Z",
"trace_id": "5c900e97-85dd-4ae5-bdf9-92d5b1422b74"
} | {
"account_age_days": 797,
"account_id": "ACCT-0FD7CFC4D05C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.679
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1143,
"timestamp": "2026-01-06T06:44:00Z",
"transaction_amount_usd": 10326.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 955.2,
"financial_exposure_usd": 2076.31,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102539",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-02T18:19:00Z",
"trace_id": "38286789-63cc-dbb6-4199-833e0b4413e5"
} | {
"account_age_days": 419,
"account_id": "ACCT-CE975F74EF71",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_3",
"session_entropy": 0.254
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 536,
"timestamp": "2026-01-02T18:19:00Z",
"transaction_amount_usd": 28688.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.853,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 432507.66,
"financial_exposure_usd": 496372.86,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109488",
"label": "benign",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-07T14:08:00Z",
"trace_id": "cfc333cc-e4bc-8bbc-87c0-d12d5d3240eb"
} | {
"account_age_days": 1492,
"account_id": "ACCT-BA502038DF44",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.728
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 748,
"timestamp": "2026-01-07T14:08:00Z",
"transaction_amount_usd": 12202.43
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 346.43,
"financial_exposure_usd": 666.04,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105090",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-04T12:50:00Z",
"trace_id": "ad336eb5-c91e-7d47-6211-114bf440cc53"
} | {
"account_age_days": 1664,
"account_id": "ACCT-5765C88B5E10",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 874,
"timestamp": "2026-01-04T12:50:00Z",
"transaction_amount_usd": 2515304.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4272815.4,
"financial_exposure_usd": 7606285.79,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100691",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "low",
"timestamp": "2026-01-01T11:31:00Z",
"trace_id": "41d8c57c-a923-d326-80f7-e73706823a76"
} | {
"account_age_days": 51,
"account_id": "ACCT-D941A66C7687",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_1",
"session_entropy": 0.127
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 274,
"timestamp": "2026-01-01T11:31:00Z",
"transaction_amount_usd": 113310.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 171569.53,
"financial_exposure_usd": 281396.07,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101834",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "critical",
"timestamp": "2026-01-02T06:34:00Z",
"trace_id": "13ee47e5-4c13-24bf-cf7e-514b9d39b9fb"
} | {
"account_age_days": 903,
"account_id": "ACCT-62682772258A",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_3",
"session_entropy": 0.709
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 952,
"timestamp": "2026-01-02T06:34:00Z",
"transaction_amount_usd": 18806.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 421013.36,
"financial_exposure_usd": 652616.03,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103243",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "critical",
"timestamp": "2026-01-03T06:03:00Z",
"trace_id": "f620fc39-cd1c-2f42-28ff-b7ddc4e05f0c"
} | {
"account_age_days": 730,
"account_id": "ACCT-191990D00206",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.677
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 376,
"timestamp": "2026-01-02T19:18:00Z",
"transaction_amount_usd": 2.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 457962.96,
"financial_exposure_usd": 711222.34,
"recoverable_pct": 0.229
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100383",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-01T06:23:00Z",
"trace_id": "346030ec-341b-36b5-8b0b-0789dea3352b"
} | {
"account_age_days": 525,
"account_id": "ACCT-BC3C7B65BA6E",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_3",
"session_entropy": 0.13
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1123,
"timestamp": "2026-01-01T06:23:00Z",
"transaction_amount_usd": 54437.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.387,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 146585.62,
"financial_exposure_usd": 260289.6,
"recoverable_pct": 0.054
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103774",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "low",
"timestamp": "2026-01-03T14:54:00Z",
"trace_id": "60c6726b-3a54-2f8e-2b94-778c5d55721f"
} | {
"account_age_days": 1623,
"account_id": "ACCT-D30F974BCA27",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_2",
"session_entropy": 0.591
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 811,
"timestamp": "2026-01-03T14:54:00Z",
"transaction_amount_usd": 2277881.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5138975.71,
"financial_exposure_usd": 5421430.96,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108741",
"label": "benign",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-07T01:41:00Z",
"trace_id": "18debf87-73e2-fca6-cc13-a088cac5be6d"
} | {
"account_age_days": 997,
"account_id": "ACCT-0D9C5A9A3318",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.226
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 174,
"timestamp": "2026-01-07T01:41:00Z",
"transaction_amount_usd": 12098.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3280.94,
"financial_exposure_usd": 4957.01,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105689",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "low",
"timestamp": "2026-01-04T22:49:00Z",
"trace_id": "d30c4779-374d-8a4c-5c04-f6f25a1043be"
} | {
"account_age_days": 208,
"account_id": "ACCT-A71E98009723",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_1",
"session_entropy": 0.693
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 458,
"timestamp": "2026-01-04T22:49:00Z",
"transaction_amount_usd": 2794978.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.389,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2708884.5,
"financial_exposure_usd": 5683433.59,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108440",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-06T20:40:00Z",
"trace_id": "a13713e9-f0e0-a399-be66-2ea33c56f9b2"
} | {
"account_age_days": 894,
"account_id": "ACCT-0579EEC96D02",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.326
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 787,
"timestamp": "2026-01-06T20:40:00Z",
"transaction_amount_usd": 12329.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1311.42,
"financial_exposure_usd": 1550.48,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109223",
"label": "benign",
"label_confidence": 0.72,
"severity": "medium",
"timestamp": "2026-01-07T09:43:00Z",
"trace_id": "c28859a4-1712-fe40-dfce-8cfcaf4635f5"
} | {
"account_age_days": 68,
"account_id": "ACCT-EB36B968FF28",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.489
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 246,
"timestamp": "2026-01-07T07:23:00Z",
"transaction_amount_usd": 8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_c... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.56,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 102.49,
"financial_exposure_usd": 137.99,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100066",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-01T01:06:00Z",
"trace_id": "215d3b1f-a8cd-f44d-7b74-244017db4c2f"
} | {
"account_age_days": 1186,
"account_id": "ACCT-40F7924B7BD7",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_2",
"session_entropy": 0.94
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 838,
"timestamp": "2026-01-01T01:06:00Z",
"transaction_amount_usd": 643.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.791,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1200031.57,
"financial_exposure_usd": 1413983.51,
"recoverable_pct": 0.38
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107554",
"label": "benign",
"label_confidence": 0.508,
"severity": "high",
"timestamp": "2026-01-06T05:54:00Z",
"trace_id": "9362712a-f177-c44c-3e8d-f5b520d36128"
} | {
"account_age_days": 893,
"account_id": "ACCT-3B832EA7B8FA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 94,
"timestamp": "2026-01-06T05:54:00Z",
"transaction_amount_usd": 3264.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 11077.43,
"financial_exposure_usd": 11338.43,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101727",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T04:47:00Z",
"trace_id": "d0a3ef35-2f6f-4900-0ef4-d66f075306ab"
} | {
"account_age_days": 1085,
"account_id": "ACCT-CC304A146773",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_1",
"session_entropy": 0.264
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 424,
"timestamp": "2026-01-02T04:47:00Z",
"transaction_amount_usd": 94888.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 722993.52,
"financial_exposure_usd": 806505.53,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105485",
"label": "fraudulent",
"label_confidence": 0.659,
"severity": "medium",
"timestamp": "2026-01-04T19:25:00Z",
"trace_id": "96b2c102-131a-7a0f-739e-d17b980801a8"
} | {
"account_age_days": 1165,
"account_id": "ACCT-20BDE2A45A75",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_3",
"session_entropy": 0.921
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1108,
"timestamp": "2026-01-04T19:25:00Z",
"transaction_amount_usd": 1159586.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.431,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4238944.43,
"financial_exposure_usd": 9213409.17,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105059",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "low",
"timestamp": "2026-01-04T12:19:00Z",
"trace_id": "9214f935-085b-2792-76f0-e670f24c8551"
} | {
"account_age_days": 719,
"account_id": "ACCT-B580E499F673",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.194
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1038,
"timestamp": "2026-01-04T12:19:00Z",
"transaction_amount_usd": 325592.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4752726.67,
"financial_exposure_usd": 5125272.06,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103032",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-03T02:32:00Z",
"trace_id": "01402f51-2a9e-d27c-1755-be5a5d0d80ec"
} | {
"account_age_days": 173,
"account_id": "ACCT-F512846483C3",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_1",
"session_entropy": 0.105
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1052,
"timestamp": "2026-01-03T02:32:00Z",
"transaction_amount_usd": 71321.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.948,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 526959.55,
"financial_exposure_usd": 770665.02,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100697",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-01T11:37:00Z",
"trace_id": "01269124-9a00-c4c0-d573-fe2dd3dc7fcb"
} | {
"account_age_days": 1737,
"account_id": "ACCT-C935C39B2906",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_3",
"session_entropy": 0.716
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 87,
"timestamp": "2026-01-01T00:41:00Z",
"transaction_amount_usd": 14.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.381,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 233978.17,
"financial_exposure_usd": 576232,
"recoverable_pct": 0.06
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100913",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "medium",
"timestamp": "2026-01-01T15:13:00Z",
"trace_id": "83d9d707-799d-3357-8c74-ac32c8c4621c"
} | {
"account_age_days": 1297,
"account_id": "ACCT-B237A0F6D695",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_1",
"session_entropy": 0.482
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1195,
"timestamp": "2026-01-01T15:13:00Z",
"transaction_amount_usd": 72925.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.436,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 407420.61,
"financial_exposure_usd": 427628.55,
"recoverable_pct": 0.119
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108276",
"label": "benign",
"label_confidence": 0.714,
"severity": "high",
"timestamp": "2026-01-06T17:56:00Z",
"trace_id": "f72cdcec-8454-edd6-a840-4e84a03e93ad"
} | {
"account_age_days": 317,
"account_id": "ACCT-ED05A8D5BCA7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.194
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 509,
"timestamp": "2026-01-06T17:56:00Z",
"transaction_amount_usd": 1228.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1354.89,
"financial_exposure_usd": 2217.69,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109086",
"label": "benign",
"label_confidence": 0.583,
"severity": "medium",
"timestamp": "2026-01-07T07:26:00Z",
"trace_id": "100b0ee0-9dce-90c7-0b1d-26430cc1db77"
} | {
"account_age_days": 926,
"account_id": "ACCT-A12FD020D701",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_1",
"session_entropy": 0.573
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 212,
"timestamp": "2026-01-06T20:50:00Z",
"transaction_amount_usd": 21.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.537,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4569.31,
"financial_exposure_usd": 6568.74,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108665",
"label": "benign",
"label_confidence": 0.596,
"severity": "high",
"timestamp": "2026-01-07T00:25:00Z",
"trace_id": "ba74c9e3-871e-0176-423c-1c290b1e3011"
} | {
"account_age_days": 1812,
"account_id": "ACCT-A0D8D23F4BDF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.533
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 108,
"timestamp": "2026-01-07T00:25:00Z",
"transaction_amount_usd": 13430.29
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.533,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2812.69,
"financial_exposure_usd": 3085.83,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107415",
"label": "benign",
"label_confidence": 0.478,
"severity": "low",
"timestamp": "2026-01-06T03:35:00Z",
"trace_id": "45b82d0f-9e29-857a-6cdf-36a21827c167"
} | {
"account_age_days": 1520,
"account_id": "ACCT-8467A649B1A8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.188
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 671,
"timestamp": "2026-01-06T03:35:00Z",
"transaction_amount_usd": 10795.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 140.29,
"financial_exposure_usd": 218,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109714",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-07T17:54:00Z",
"trace_id": "de665b16-a056-5316-a50e-188c2aca7249"
} | {
"account_age_days": 9,
"account_id": "ACCT-C9A28AC55E1D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.791
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 704,
"timestamp": "2026-01-07T17:54:00Z",
"transaction_amount_usd": 3748.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2117.74,
"financial_exposure_usd": 2316.68,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103594",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "medium",
"timestamp": "2026-01-03T11:54:00Z",
"trace_id": "e50bdb24-b5ae-eef6-9f1f-ce8d18e8ffbf"
} | {
"account_age_days": 792,
"account_id": "ACCT-A70650787BD4",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_3",
"session_entropy": 0.505
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 918,
"timestamp": "2026-01-03T11:54:00Z",
"transaction_amount_usd": 2145055.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.831,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2723011.09,
"financial_exposure_usd": 4405064.63,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102415",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-02T16:15:00Z",
"trace_id": "d936d774-650d-2c6c-bcea-1817cbd8fafa"
} | {
"account_age_days": 1298,
"account_id": "ACCT-CAF7210B0EA9",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 103,
"timestamp": "2026-01-02T12:09:00Z",
"transaction_amount_usd": 9.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.48,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 420860.51,
"financial_exposure_usd": 593007.94,
"recoverable_pct": 0.297
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107447",
"label": "benign",
"label_confidence": 0.476,
"severity": "low",
"timestamp": "2026-01-06T04:07:00Z",
"trace_id": "132c526a-09a5-69d0-6470-6b0efe43c8a9"
} | {
"account_age_days": 420,
"account_id": "ACCT-5E7AFB3BEBD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.751
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 863,
"timestamp": "2026-01-06T04:07:00Z",
"transaction_amount_usd": 12597.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1113.45,
"financial_exposure_usd": 1598.77,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104192",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-03T21:52:00Z",
"trace_id": "f5817292-16d5-ee32-317b-770f1c6fe495"
} | {
"account_age_days": 129,
"account_id": "ACCT-BF67BDFFC937",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_3",
"session_entropy": 0.131
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 844,
"timestamp": "2026-01-03T21:52:00Z",
"transaction_amount_usd": 1380524.94
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.897,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3676879.11,
"financial_exposure_usd": 4234412.45,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104343",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-04T00:23:00Z",
"trace_id": "78e94624-2afa-1adc-ad68-ed6566fbb5da"
} | {
"account_age_days": 948,
"account_id": "ACCT-E2752B2DE15A",
"baseline_risk_score": 0.22,
"kyc_tier": "tier_2",
"session_entropy": 0.432
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1179,
"timestamp": "2026-01-04T00:23:00Z",
"transaction_amount_usd": 1462281.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2949580.79,
"financial_exposure_usd": 3070724.58,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109245",
"label": "benign",
"label_confidence": 0.476,
"severity": "high",
"timestamp": "2026-01-07T10:05:00Z",
"trace_id": "9adbe7ba-217d-a85e-77a6-ebe0184828b1"
} | {
"account_age_days": 676,
"account_id": "ACCT-0032D9259D20",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.79
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1193,
"timestamp": "2026-01-07T10:05:00Z",
"transaction_amount_usd": 12432.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1943.24,
"financial_exposure_usd": 2482.8,
"recoverable_pct": 0.673
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109296",
"label": "benign",
"label_confidence": 0.457,
"severity": "medium",
"timestamp": "2026-01-07T10:56:00Z",
"trace_id": "85afe680-65ef-3b62-9c3b-492be8bbb066"
} | {
"account_age_days": 1469,
"account_id": "ACCT-81ECB5656033",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 821,
"timestamp": "2026-01-07T10:56:00Z",
"transaction_amount_usd": 14754.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2887.04,
"financial_exposure_usd": 3457.46,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101863",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "medium",
"timestamp": "2026-01-02T07:03:00Z",
"trace_id": "cd7541b4-206d-de55-8018-53b4639ac2e3"
} | {
"account_age_days": 1127,
"account_id": "ACCT-AB9D2C8B1011",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_2",
"session_entropy": 0.175
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 781,
"timestamp": "2026-01-02T07:03:00Z",
"transaction_amount_usd": 106148.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.945,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 453939.22,
"financial_exposure_usd": 672397.58,
"recoverable_pct": 0.183
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102198",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "low",
"timestamp": "2026-01-02T12:38:00Z",
"trace_id": "ee3c43a9-2530-7638-18f3-dc3923e6496d"
} | {
"account_age_days": 708,
"account_id": "ACCT-7500769A4029",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.691
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 170,
"timestamp": "2026-01-02T10:46:00Z",
"transaction_amount_usd": 5.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.379,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 394377.68,
"financial_exposure_usd": 817090.31,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105250",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-04T15:30:00Z",
"trace_id": "a44274a8-7b59-ea4a-c32e-fe04b32c4706"
} | {
"account_age_days": 1053,
"account_id": "ACCT-1B82BD082D68",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.32
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 146,
"timestamp": "2026-01-04T15:30:00Z",
"transaction_amount_usd": 1699517.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.709,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3811026.84,
"financial_exposure_usd": 5426515.22,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101660",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-02T03:40:00Z",
"trace_id": "25a30516-119d-fd67-34d8-76deffff8099"
} | {
"account_age_days": 1474,
"account_id": "ACCT-0557A8059224",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.314
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 368,
"timestamp": "2026-01-02T03:40:00Z",
"transaction_amount_usd": 80230.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 371463.21,
"financial_exposure_usd": 598952.01,
"recoverable_pct": 0.141
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104495",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-04T02:55:00Z",
"trace_id": "5d7bafbd-f1de-6507-fb5d-34ac22b401ba"
} | {
"account_age_days": 865,
"account_id": "ACCT-AAF82560D3C5",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 313,
"timestamp": "2026-01-04T02:55:00Z",
"transaction_amount_usd": 1555731.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2447587.44,
"financial_exposure_usd": 3856740.54,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105164",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-04T14:04:00Z",
"trace_id": "63ad49a0-f9af-05f3-0162-a4a8bea16203"
} | {
"account_age_days": 296,
"account_id": "ACCT-DC08D61C3074",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_1",
"session_entropy": 0.445
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 157,
"timestamp": "2026-01-04T14:04:00Z",
"transaction_amount_usd": 2018488.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.573,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3920000.86,
"financial_exposure_usd": 6216103.65,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106266",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-05T08:26:00Z",
"trace_id": "7c1a6b0b-40a0-91b1-15bd-163cc4fc6d1f"
} | {
"account_age_days": 1920,
"account_id": "ACCT-29D576091D8F",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_2",
"session_entropy": 0.177
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 292,
"timestamp": "2026-01-04T21:31:00Z",
"transaction_amount_usd": 2.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.495,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1112618.85,
"financial_exposure_usd": 2511161.07,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104605",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-04T04:45:00Z",
"trace_id": "0973ae95-6f82-b8f9-b1fc-4fffa0bb16eb"
} | {
"account_age_days": 376,
"account_id": "ACCT-F6AA63C9C2DF",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_3",
"session_entropy": 0.374
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 869,
"timestamp": "2026-01-04T04:45:00Z",
"transaction_amount_usd": 2111520.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1366199.73,
"financial_exposure_usd": 2959674.03,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104283",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "medium",
"timestamp": "2026-01-03T23:23:00Z",
"trace_id": "dd5d8c2b-89cd-0b29-9a04-42f47eec15cb"
} | {
"account_age_days": 519,
"account_id": "ACCT-BE000C88365F",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_2",
"session_entropy": 0.238
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 165,
"timestamp": "2026-01-03T23:23:00Z",
"transaction_amount_usd": 2563898.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.538,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2137641.66,
"financial_exposure_usd": 4193288.54,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104830",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-04T08:30:00Z",
"trace_id": "90f5c0b2-249f-d255-53aa-add7a4344d0d"
} | {
"account_age_days": 1008,
"account_id": "ACCT-D5B5566F773F",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_3",
"session_entropy": 0.876
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 208,
"timestamp": "2026-01-03T20:57:00Z",
"transaction_amount_usd": 16.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.438,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4646278.52,
"financial_exposure_usd": 7112085.27,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109049",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-07T06:49:00Z",
"trace_id": "534c5e6c-8d7e-4bc4-a65f-e43f0908392b"
} | {
"account_age_days": 29,
"account_id": "ACCT-EB8469BA880E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.153
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 379,
"timestamp": "2026-01-06T21:40:00Z",
"transaction_amount_usd": 18.2
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1142.21,
"financial_exposure_usd": 1616.02,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107576",
"label": "benign",
"label_confidence": 0.555,
"severity": "medium",
"timestamp": "2026-01-06T06:16:00Z",
"trace_id": "dccd4600-a615-1069-4f11-ad9155e84b8d"
} | {
"account_age_days": 1401,
"account_id": "ACCT-A569AB82F5FA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.534
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1039,
"timestamp": "2026-01-06T06:16:00Z",
"transaction_amount_usd": 13228.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 706.75,
"financial_exposure_usd": 1693.41,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102785",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-02T22:25:00Z",
"trace_id": "85fc47b4-3cd7-e510-be0c-06b24dca1307"
} | {
"account_age_days": 1660,
"account_id": "ACCT-BAA989344D08",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.92
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 113,
"timestamp": "2026-01-02T13:42:00Z",
"transaction_amount_usd": 17.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.389,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 726549.99,
"financial_exposure_usd": 777221.64,
"recoverable_pct": 0.079
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105066",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "low",
"timestamp": "2026-01-04T12:26:00Z",
"trace_id": "95e6673b-ca2c-ece0-b698-a905919efabf"
} | {
"account_age_days": 1961,
"account_id": "ACCT-9A505C7D6661",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.93
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 303,
"timestamp": "2026-01-04T12:26:00Z",
"transaction_amount_usd": 854212.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.559,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3838278.64,
"financial_exposure_usd": 5408767.7,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105110",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "medium",
"timestamp": "2026-01-04T13:10:00Z",
"trace_id": "a27a5717-5126-fc73-3f0b-fb9768079367"
} | {
"account_age_days": 1957,
"account_id": "ACCT-4B4CE284961C",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.459
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 389,
"timestamp": "2026-01-04T06:18:00Z",
"transaction_amount_usd": 19.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.588,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1324193.68,
"financial_exposure_usd": 2378813.85,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102391",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "critical",
"timestamp": "2026-01-02T15:51:00Z",
"trace_id": "7cfe7a27-94a6-72b9-4fcd-080d64686d41"
} | {
"account_age_days": 1229,
"account_id": "ACCT-4D59E44578E7",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_1",
"session_entropy": 0.843
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 383,
"timestamp": "2026-01-02T15:51:00Z",
"transaction_amount_usd": 9716.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 699107.84,
"financial_exposure_usd": 832774.08,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102034",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-02T09:54:00Z",
"trace_id": "205980df-5add-bb0c-cc9b-5903966c9708"
} | {
"account_age_days": 1354,
"account_id": "ACCT-B78283D03EF0",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.927
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 249,
"timestamp": "2026-01-02T00:39:00Z",
"transaction_amount_usd": 4.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.919,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 645665.87,
"financial_exposure_usd": 1010552.2,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102417",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-02T16:17:00Z",
"trace_id": "78f1b7ee-f282-5671-3418-d1e6e940b0e8"
} | {
"account_age_days": 1277,
"account_id": "ACCT-27F3A7C42B3F",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_2",
"session_entropy": 0.747
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1172,
"timestamp": "2026-01-02T16:17:00Z",
"transaction_amount_usd": 95925.38
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 83234.63,
"financial_exposure_usd": 108449.15,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101941",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-02T08:21:00Z",
"trace_id": "e37f5315-52aa-ca04-fd09-f34b30100924"
} | {
"account_age_days": 651,
"account_id": "ACCT-223DAC2BC4CD",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 201,
"timestamp": "2026-01-02T03:23:00Z",
"transaction_amount_usd": 0.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.899,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 125570.51,
"financial_exposure_usd": 292000.48,
"recoverable_pct": 0.251
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100769",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-01T12:49:00Z",
"trace_id": "2b5d5716-9c0f-e54b-5854-4c3a728adc3d"
} | {
"account_age_days": 896,
"account_id": "ACCT-61CCAE45C86C",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.879
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 986,
"timestamp": "2026-01-01T12:49:00Z",
"transaction_amount_usd": 111213.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 328223.15,
"financial_exposure_usd": 774477.12,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100469",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-01T07:49:00Z",
"trace_id": "45c32483-9d0b-3d71-f3c8-ff73d58ce487"
} | {
"account_age_days": 553,
"account_id": "ACCT-8FA031F872E6",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.293
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1107,
"timestamp": "2026-01-01T07:49:00Z",
"transaction_amount_usd": 85912.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 371591.23,
"financial_exposure_usd": 576987.15,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106012",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "critical",
"timestamp": "2026-01-05T04:12:00Z",
"trace_id": "a3a4f386-c3c7-8262-95c6-ba3ef86c7705"
} | {
"account_age_days": 91,
"account_id": "ACCT-B40C7703E5B2",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_1",
"session_entropy": 0.458
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 230,
"timestamp": "2026-01-04T17:35:00Z",
"transaction_amount_usd": 20.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3451763.48,
"financial_exposure_usd": 4799437.53,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109632",
"label": "benign",
"label_confidence": 0.703,
"severity": "low",
"timestamp": "2026-01-07T16:32:00Z",
"trace_id": "da922efc-2bb0-87c5-1e7f-28bd083670b0"
} | {
"account_age_days": 1168,
"account_id": "ACCT-59803B4A1C28",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.359
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 465,
"timestamp": "2026-01-07T16:32:00Z",
"transaction_amount_usd": 7337.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 753.31,
"financial_exposure_usd": 1445.05,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104315",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-03T23:55:00Z",
"trace_id": "8b0ab508-773d-c1f9-1e71-dc8bd023eab5"
} | {
"account_age_days": 1828,
"account_id": "ACCT-2FC8B9375F50",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 414,
"timestamp": "2026-01-03T23:55:00Z",
"transaction_amount_usd": 1074601.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4949946.62,
"financial_exposure_usd": 5576954.82,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104981",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "medium",
"timestamp": "2026-01-04T11:01:00Z",
"trace_id": "db634691-46e1-8015-6e47-5dad8197a496"
} | {
"account_age_days": 1701,
"account_id": "ACCT-04580AAB14B8",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.243
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 167,
"timestamp": "2026-01-04T05:00:00Z",
"transaction_amount_usd": 20.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.375,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3077426.67,
"financial_exposure_usd": 6774149.4,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101657",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-02T03:37:00Z",
"trace_id": "c7c2b527-cd5f-ffb3-5d6b-5e8571c0c573"
} | {
"account_age_days": 163,
"account_id": "ACCT-6D0E63B99FF7",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.281
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 735,
"timestamp": "2026-01-02T03:37:00Z",
"transaction_amount_usd": 119320.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.419,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 887696.49,
"financial_exposure_usd": 1276127.54,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106967",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-05T20:07:00Z",
"trace_id": "b1a5acec-7447-43c2-e6d2-f1c092b42a43"
} | {
"account_age_days": 837,
"account_id": "ACCT-82DF8145F8AD",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_3",
"session_entropy": 0.842
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 874,
"timestamp": "2026-01-05T20:07:00Z",
"transaction_amount_usd": 2313.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1260.85,
"financial_exposure_usd": 2934.26,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104845",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "critical",
"timestamp": "2026-01-04T08:45:00Z",
"trace_id": "93d9edeb-d376-8bdb-d9f8-04a278fdc481"
} | {
"account_age_days": 1572,
"account_id": "ACCT-4A9E37B8AF2F",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_1",
"session_entropy": 0.483
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 92,
"timestamp": "2026-01-04T05:59:00Z",
"transaction_amount_usd": 16.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.631,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3058224.49,
"financial_exposure_usd": 5123215.41,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108456",
"label": "benign",
"label_confidence": 0.597,
"severity": "medium",
"timestamp": "2026-01-06T20:56:00Z",
"trace_id": "f0fa295d-de01-d59b-3bfe-92b0ab75bee0"
} | {
"account_age_days": 1062,
"account_id": "ACCT-073A12E85206",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 158,
"timestamp": "2026-01-06T08:38:00Z",
"transaction_amount_usd": 19.52
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 574.85,
"financial_exposure_usd": 731.53,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100887",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-01T14:47:00Z",
"trace_id": "7e79fc00-fcc9-feef-4530-2005a49b8476"
} | {
"account_age_days": 1591,
"account_id": "ACCT-94D9DE10626B",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_1",
"session_entropy": 0.722
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 640,
"timestamp": "2026-01-01T14:47:00Z",
"transaction_amount_usd": 117278.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.702,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1087142.93,
"financial_exposure_usd": 1353266.59,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103854",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-03T16:14:00Z",
"trace_id": "3866e6d0-9d4e-6aa5-5c35-9a9a1eba956a"
} | {
"account_age_days": 486,
"account_id": "ACCT-E32D929B8782",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_1",
"session_entropy": 0.243
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 387,
"timestamp": "2026-01-03T12:59:00Z",
"transaction_amount_usd": 10.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.845,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3785103.73,
"financial_exposure_usd": 4134641.6,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109621",
"label": "benign",
"label_confidence": 0.716,
"severity": "critical",
"timestamp": "2026-01-07T16:21:00Z",
"trace_id": "87bce40e-9879-ed90-e4b3-891bfcd2e210"
} | {
"account_age_days": 515,
"account_id": "ACCT-93888CD55043",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 94,
"timestamp": "2026-01-07T08:41:00Z",
"transaction_amount_usd": 10.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 505.31,
"financial_exposure_usd": 935.77,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109102",
"label": "benign",
"label_confidence": 0.454,
"severity": "high",
"timestamp": "2026-01-07T07:42:00Z",
"trace_id": "5c0c1453-d0f5-be36-c865-01288bffaa02"
} | {
"account_age_days": 1618,
"account_id": "ACCT-1AF0519C1429",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1180,
"timestamp": "2026-01-07T07:42:00Z",
"transaction_amount_usd": 9391.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2783.43,
"financial_exposure_usd": 3831.87,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103471",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "low",
"timestamp": "2026-01-03T09:51:00Z",
"trace_id": "05e55b89-6ddb-e2a2-f3d6-a8f32f6c3c7c"
} | {
"account_age_days": 88,
"account_id": "ACCT-F27588C62DF2",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.433
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1198,
"timestamp": "2026-01-03T09:51:00Z",
"transaction_amount_usd": 2321632.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2642098.82,
"financial_exposure_usd": 4479931.98,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102800",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "medium",
"timestamp": "2026-01-02T22:40:00Z",
"trace_id": "e829534e-bb9b-3fef-1f28-6013c9638476"
} | {
"account_age_days": 818,
"account_id": "ACCT-723107E87C48",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_3",
"session_entropy": 0.893
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 298,
"timestamp": "2026-01-02T14:13:00Z",
"transaction_amount_usd": 10.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 593435.45,
"financial_exposure_usd": 669657.33,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109981",
"label": "benign",
"label_confidence": 0.594,
"severity": "medium",
"timestamp": "2026-01-07T22:21:00Z",
"trace_id": "c18c67ca-2d78-264f-44d7-9a2b171a7353"
} | {
"account_age_days": 1848,
"account_id": "ACCT-EB128103B181",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.598
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 330,
"timestamp": "2026-01-07T20:39:00Z",
"transaction_amount_usd": 11.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1131.37,
"financial_exposure_usd": 1530.5,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104011",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-03T18:51:00Z",
"trace_id": "e4967a11-94f1-c73d-37f2-170c207395ce"
} | {
"account_age_days": 960,
"account_id": "ACCT-E53442907984",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_3",
"session_entropy": 0.551
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 964,
"timestamp": "2026-01-03T18:51:00Z",
"transaction_amount_usd": 565689.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.895,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5786240.55,
"financial_exposure_usd": 5846135.11,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103047",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-03T02:47:00Z",
"trace_id": "88cdd729-4422-6df9-2b24-5b9f3297f345"
} | {
"account_age_days": 867,
"account_id": "ACCT-CA5CD6325281",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.62
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 916,
"timestamp": "2026-01-03T02:47:00Z",
"transaction_amount_usd": 93657.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 789374.89,
"financial_exposure_usd": 946184.58,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105501",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-04T19:41:00Z",
"trace_id": "d8a94c48-f979-25f2-57db-cc41fc73b83a"
} | {
"account_age_days": 1591,
"account_id": "ACCT-75BB82FE5594",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_1",
"session_entropy": 0.83
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 445,
"timestamp": "2026-01-04T19:41:00Z",
"transaction_amount_usd": 714094.58
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 824677.49,
"financial_exposure_usd": 1438394.87,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104210",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "critical",
"timestamp": "2026-01-03T22:10:00Z",
"trace_id": "95efd1d8-b31e-5c2b-a6b8-36122ef17ec6"
} | {
"account_age_days": 239,
"account_id": "ACCT-434278DB4E82",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_3",
"session_entropy": 0.713
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1051,
"timestamp": "2026-01-03T22:10:00Z",
"transaction_amount_usd": 1203401.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3463161.65,
"financial_exposure_usd": 6030959.82,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108284",
"label": "benign",
"label_confidence": 0.71,
"severity": "medium",
"timestamp": "2026-01-06T18:04:00Z",
"trace_id": "09762ac1-8a25-d74b-9de4-1cf86ef31eb4"
} | {
"account_age_days": 1366,
"account_id": "ACCT-7AD5C367E808",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.214
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 957,
"timestamp": "2026-01-06T18:04:00Z",
"transaction_amount_usd": 7829.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1634.38,
"financial_exposure_usd": 1945.06,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101689",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "critical",
"timestamp": "2026-01-02T04:09:00Z",
"trace_id": "37e24ae1-081b-e623-b3e4-960b223b5e8c"
} | {
"account_age_days": 933,
"account_id": "ACCT-1A6B02C739A5",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_3",
"session_entropy": 0.366
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 305,
"timestamp": "2026-01-01T18:53:00Z",
"transaction_amount_usd": 6.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 37642.44,
"financial_exposure_usd": 38056.27,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108815",
"label": "benign",
"label_confidence": 0.723,
"severity": "high",
"timestamp": "2026-01-07T02:55:00Z",
"trace_id": "88c92096-d8f2-cffa-15b8-32e5622950f4"
} | {
"account_age_days": 20,
"account_id": "ACCT-DC176ACD50D6",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_1",
"session_entropy": 0.447
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 360,
"timestamp": "2026-01-07T02:55:00Z",
"transaction_amount_usd": 4706.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 75.56,
"financial_exposure_usd": 144.78,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106710",
"label": "benign",
"label_confidence": 0.709,
"severity": "low",
"timestamp": "2026-01-05T15:50:00Z",
"trace_id": "80c3915b-777e-c82c-bbf2-66adc4e12958"
} | {
"account_age_days": 501,
"account_id": "ACCT-E9789A0E7961",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1191,
"timestamp": "2026-01-05T15:50:00Z",
"transaction_amount_usd": 2352.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2746.48,
"financial_exposure_usd": 2781.58,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109105",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-07T07:45:00Z",
"trace_id": "269c3d19-ed0a-b3e7-894a-4141f8fbc22a"
} | {
"account_age_days": 156,
"account_id": "ACCT-B5A98B50EE65",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.534
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 544,
"timestamp": "2026-01-07T07:45:00Z",
"transaction_amount_usd": 7029.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1044.61,
"financial_exposure_usd": 1521.37,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103784",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "medium",
"timestamp": "2026-01-03T15:04:00Z",
"trace_id": "76215b13-b703-3ffa-459e-fda6aa25bf30"
} | {
"account_age_days": 1022,
"account_id": "ACCT-0D33EFFA1DD2",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_2",
"session_entropy": 0.864
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 985,
"timestamp": "2026-01-03T15:04:00Z",
"transaction_amount_usd": 1743234.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3836148.2,
"financial_exposure_usd": 7124842.47,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108015",
"label": "benign",
"label_confidence": 0.708,
"severity": "high",
"timestamp": "2026-01-06T13:35:00Z",
"trace_id": "d19fec21-5168-3420-9994-f134924d1318"
} | {
"account_age_days": 1610,
"account_id": "ACCT-99E9D85EA7AE",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_3",
"session_entropy": 0.22
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 261,
"timestamp": "2026-01-06T06:25:00Z",
"transaction_amount_usd": 4.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2856.55,
"financial_exposure_usd": 4292.12,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106633",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "critical",
"timestamp": "2026-01-05T14:33:00Z",
"trace_id": "df4a4666-2ef8-c94b-8dd1-261d2185e96f"
} | {
"account_age_days": 1528,
"account_id": "ACCT-FA49A054B95A",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_3",
"session_entropy": 0.179
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 749,
"timestamp": "2026-01-05T14:33:00Z",
"transaction_amount_usd": 2164806.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1941412.21,
"financial_exposure_usd": 4212314.85,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.