schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105076",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "medium",
"timestamp": "2026-01-04T12:36:00Z",
"trace_id": "85a0a28f-654f-737f-6d4f-2158c682fe14"
} | {
"account_age_days": 724,
"account_id": "ACCT-9C0032D0206F",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_1",
"session_entropy": 0.695
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1000,
"timestamp": "2026-01-04T12:36:00Z",
"transaction_amount_usd": 2522895.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.478,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6886072.53,
"financial_exposure_usd": 7907554.15,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105204",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "high",
"timestamp": "2026-01-04T14:44:00Z",
"trace_id": "97a5e7e0-6e42-c884-06d3-c6a107f19c9e"
} | {
"account_age_days": 1892,
"account_id": "ACCT-A13083C4DBD5",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.829
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 864,
"timestamp": "2026-01-04T14:44:00Z",
"transaction_amount_usd": 1292872.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.372,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1357677.22,
"financial_exposure_usd": 2102145.16,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104253",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-03T22:53:00Z",
"trace_id": "4c7e6ec5-e63a-2674-c5bf-acd4d89b40ee"
} | {
"account_age_days": 661,
"account_id": "ACCT-5EA57FE3E4C9",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.841
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1043,
"timestamp": "2026-01-03T22:53:00Z",
"transaction_amount_usd": 2328816.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2796572.96,
"financial_exposure_usd": 2870978.14,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109300",
"label": "benign",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-07T11:00:00Z",
"trace_id": "e592b86b-5f83-4210-efae-26e341d5a1a4"
} | {
"account_age_days": 1779,
"account_id": "ACCT-A82261342715",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.229
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 685,
"timestamp": "2026-01-07T11:00:00Z",
"transaction_amount_usd": 5769.09
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1438.12,
"financial_exposure_usd": 2104.8,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104537",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "low",
"timestamp": "2026-01-04T03:37:00Z",
"trace_id": "4485dd8f-3a2c-5435-37e4-9122bf7fa51b"
} | {
"account_age_days": 996,
"account_id": "ACCT-9FFFFE2286C6",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.711
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 282,
"timestamp": "2026-01-03T18:44:00Z",
"transaction_amount_usd": 11.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.561,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4084871.91,
"financial_exposure_usd": 6906387.86,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109128",
"label": "benign",
"label_confidence": 0.735,
"severity": "medium",
"timestamp": "2026-01-07T08:08:00Z",
"trace_id": "1762e37d-8c0b-d503-596f-9242c40b90bf"
} | {
"account_age_days": 1303,
"account_id": "ACCT-81B09EC9A47B",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.873
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 185,
"timestamp": "2026-01-07T08:08:00Z",
"transaction_amount_usd": 3828.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.8,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 2276.4,
"financial_exposure_usd": 3323.64,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109831",
"label": "benign",
"label_confidence": 0.485,
"severity": "critical",
"timestamp": "2026-01-07T19:51:00Z",
"trace_id": "bd72772a-99f2-d98e-ab9c-0a1730679784"
} | {
"account_age_days": 1108,
"account_id": "ACCT-A48E865CEA11",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_2",
"session_entropy": 0.868
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 638,
"timestamp": "2026-01-07T19:51:00Z",
"transaction_amount_usd": 14372.72
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 887.55,
"financial_exposure_usd": 1553.96,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102009",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "medium",
"timestamp": "2026-01-02T09:29:00Z",
"trace_id": "cdb959c1-ad67-8acf-f5d8-7c34774cd204"
} | {
"account_age_days": 1983,
"account_id": "ACCT-99B8929DB334",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_3",
"session_entropy": 0.151
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 499,
"timestamp": "2026-01-02T09:29:00Z",
"transaction_amount_usd": 21248.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.766,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 988949.43,
"financial_exposure_usd": 1100591.69,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106793",
"label": "benign",
"label_confidence": 0.562,
"severity": "medium",
"timestamp": "2026-01-05T17:13:00Z",
"trace_id": "37652ecf-2173-ad41-78a9-001f0069b4cf"
} | {
"account_age_days": 551,
"account_id": "ACCT-E3E8EABF78AD",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 673,
"timestamp": "2026-01-05T17:13:00Z",
"transaction_amount_usd": 7276.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 77.73,
"financial_exposure_usd": 127.14,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101061",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "critical",
"timestamp": "2026-01-01T17:41:00Z",
"trace_id": "58ea28fc-e91e-1b34-ce41-ae8b1c867c2e"
} | {
"account_age_days": 1468,
"account_id": "ACCT-17D47A400F8E",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_3",
"session_entropy": 0.936
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 394,
"timestamp": "2026-01-01T14:37:00Z",
"transaction_amount_usd": 1.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.904,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1422995.37,
"financial_exposure_usd": 1471225.8,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106825",
"label": "benign",
"label_confidence": 0.693,
"severity": "low",
"timestamp": "2026-01-05T17:45:00Z",
"trace_id": "e3402fe1-04be-5de8-bc1f-91d58bae2d9b"
} | {
"account_age_days": 345,
"account_id": "ACCT-064FC6A0A872",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.442
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 139,
"timestamp": "2026-01-05T17:45:00Z",
"transaction_amount_usd": 11022.24
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2878.3,
"financial_exposure_usd": 4112.67,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102443",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-02T16:43:00Z",
"trace_id": "4459575d-6178-aa5d-ddc8-ccba82d4f826"
} | {
"account_age_days": 569,
"account_id": "ACCT-634CDA8F627B",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_3",
"session_entropy": 0.867
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 244,
"timestamp": "2026-01-02T05:24:00Z",
"transaction_amount_usd": 15.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.783,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 869250.56,
"financial_exposure_usd": 1193224.55,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103604",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-03T12:04:00Z",
"trace_id": "b1d2dbf0-9741-85c8-f0d2-37af65a9e331"
} | {
"account_age_days": 1306,
"account_id": "ACCT-090D417995D4",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 232,
"timestamp": "2026-01-03T05:14:00Z",
"transaction_amount_usd": 6.22
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.456,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1114964.92,
"financial_exposure_usd": 1729549.12,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107319",
"label": "benign",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-06T01:59:00Z",
"trace_id": "4d7cc8a3-624d-a68c-444f-760fc23e3be6"
} | {
"account_age_days": 1799,
"account_id": "ACCT-35A87CF303E3",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.414
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 99,
"timestamp": "2026-01-05T18:36:00Z",
"transaction_amount_usd": 20.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 305.12,
"financial_exposure_usd": 441.73,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107184",
"label": "benign",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-05T23:44:00Z",
"trace_id": "f77c20fe-1f04-3647-f565-959f0ee6d29c"
} | {
"account_age_days": 1354,
"account_id": "ACCT-2FD74B76A790",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.423
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 617,
"timestamp": "2026-01-05T23:44:00Z",
"transaction_amount_usd": 14473.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6203.12,
"financial_exposure_usd": 8540.12,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101607",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-02T02:47:00Z",
"trace_id": "40d345b8-9339-e39c-2045-92f612ed45ff"
} | {
"account_age_days": 1934,
"account_id": "ACCT-B652E5E00CAB",
"baseline_risk_score": 0.636,
"kyc_tier": "tier_2",
"session_entropy": 0.382
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 248,
"timestamp": "2026-01-01T20:01:00Z",
"transaction_amount_usd": 11.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 879046.93,
"financial_exposure_usd": 941538.2,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105946",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-05T03:06:00Z",
"trace_id": "e6152f4c-984b-2867-f343-486f71dec95d"
} | {
"account_age_days": 903,
"account_id": "ACCT-109F975978DE",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.721
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 975,
"timestamp": "2026-01-05T03:06:00Z",
"transaction_amount_usd": 658522.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2230264.39,
"financial_exposure_usd": 4916738.55,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105063",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-04T12:23:00Z",
"trace_id": "3003f060-5bec-8378-61e7-b49203008119"
} | {
"account_age_days": 1117,
"account_id": "ACCT-A47CCF093B33",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.576
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 161,
"timestamp": "2026-01-04T12:23:00Z",
"transaction_amount_usd": 994760.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3093787.98,
"financial_exposure_usd": 5490783.43,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103518",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-03T10:38:00Z",
"trace_id": "843852a8-85b2-0b23-fc52-cc9bca3009ed"
} | {
"account_age_days": 1720,
"account_id": "ACCT-C5577B523405",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.147
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1009,
"timestamp": "2026-01-03T10:38:00Z",
"transaction_amount_usd": 844878.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3600002.29,
"financial_exposure_usd": 6845575.88,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101740",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "high",
"timestamp": "2026-01-02T05:00:00Z",
"trace_id": "5eb7d741-f5e9-9f5f-17b3-50f9e4822d49"
} | {
"account_age_days": 1576,
"account_id": "ACCT-C45797F788C6",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 376,
"timestamp": "2026-01-02T03:38:00Z",
"transaction_amount_usd": 17.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 648629.19,
"financial_exposure_usd": 1195439.44,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107851",
"label": "benign",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-06T10:51:00Z",
"trace_id": "1306a5fc-da8a-0e5b-50df-1db652e6253f"
} | {
"account_age_days": 1300,
"account_id": "ACCT-A063AC26570C",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.571
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 487,
"timestamp": "2026-01-06T10:51:00Z",
"transaction_amount_usd": 2795.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4816.06,
"financial_exposure_usd": 6194.1,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108123",
"label": "benign",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-06T15:23:00Z",
"trace_id": "f636ae3a-92f6-cf67-61aa-98fb9aad8b51"
} | {
"account_age_days": 267,
"account_id": "ACCT-A001ABACDB55",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 245,
"timestamp": "2026-01-06T15:23:00Z",
"transaction_amount_usd": 6972.9
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4507.06,
"financial_exposure_usd": 6236.43,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103389",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-03T08:29:00Z",
"trace_id": "6efbc92f-706d-b030-907f-112ec18f5028"
} | {
"account_age_days": 1332,
"account_id": "ACCT-4B6439F9D9EF",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_3",
"session_entropy": 0.228
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 614,
"timestamp": "2026-01-03T08:29:00Z",
"transaction_amount_usd": 2918468.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.445,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3435246.47,
"financial_exposure_usd": 4418353.94,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108358",
"label": "benign",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-06T19:18:00Z",
"trace_id": "f910352c-e23d-8949-d75f-2a143cb99a34"
} | {
"account_age_days": 1870,
"account_id": "ACCT-EF5045C78F1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.228
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 275,
"timestamp": "2026-01-06T15:58:00Z",
"transaction_amount_usd": 2.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.748,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3009.07,
"financial_exposure_usd": 4068.8,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103528",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-03T10:48:00Z",
"trace_id": "07852442-ec2c-0d30-915d-104cbd9ec712"
} | {
"account_age_days": 1638,
"account_id": "ACCT-93649F2A8E4E",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 563,
"timestamp": "2026-01-03T10:48:00Z",
"transaction_amount_usd": 1328593.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.629,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3700507.22,
"financial_exposure_usd": 5165943.72,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105354",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-04T17:14:00Z",
"trace_id": "9cb75963-a3e8-b906-f236-0a3e47b42b10"
} | {
"account_age_days": 664,
"account_id": "ACCT-9F103B751068",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 301,
"timestamp": "2026-01-04T17:14:00Z",
"transaction_amount_usd": 656110.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.647,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3068086.82,
"financial_exposure_usd": 3182778.9,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107001",
"label": "benign",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-05T20:41:00Z",
"trace_id": "d92b811e-0225-ff0e-c759-3a6da4be2d29"
} | {
"account_age_days": 226,
"account_id": "ACCT-3B70FD666780",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.938
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 824,
"timestamp": "2026-01-05T20:41:00Z",
"transaction_amount_usd": 9066.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2024.67,
"financial_exposure_usd": 3334.64,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103588",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-03T11:48:00Z",
"trace_id": "3e37335c-87cd-bb88-38a2-e2fa495a6713"
} | {
"account_age_days": 991,
"account_id": "ACCT-99CA2DF230A9",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.41
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 360,
"timestamp": "2026-01-03T01:02:00Z",
"transaction_amount_usd": 24.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 495041.11,
"financial_exposure_usd": 919714.63,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104314",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-03T23:54:00Z",
"trace_id": "8f3b3003-a8ce-e11e-8d0a-ba92d7e2cec1"
} | {
"account_age_days": 748,
"account_id": "ACCT-09D13A04C63F",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.772
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 195,
"timestamp": "2026-01-03T21:35:00Z",
"transaction_amount_usd": 7.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2992383.66,
"financial_exposure_usd": 3393357.61,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108466",
"label": "benign",
"label_confidence": 0.683,
"severity": "high",
"timestamp": "2026-01-06T21:06:00Z",
"trace_id": "deeb7e79-1845-bd70-fb13-4e2c598bdaec"
} | {
"account_age_days": 1846,
"account_id": "ACCT-78F82FF2A831",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_3",
"session_entropy": 0.927
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 186,
"timestamp": "2026-01-06T21:06:00Z",
"transaction_amount_usd": 9565.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2181.21,
"financial_exposure_usd": 3483.5,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104337",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-04T00:17:00Z",
"trace_id": "94a6f5b3-f3bb-be4f-ab74-53fb9d3ccf0c"
} | {
"account_age_days": 480,
"account_id": "ACCT-92EAC30CD97D",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_3",
"session_entropy": 0.753
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 998,
"timestamp": "2026-01-04T00:17:00Z",
"transaction_amount_usd": 1544247.69
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.672,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2507552.7,
"financial_exposure_usd": 2825058.65,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104751",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-04T07:11:00Z",
"trace_id": "bcdf8b68-5787-5ac3-65c3-3c3f9a45e2fb"
} | {
"account_age_days": 1857,
"account_id": "ACCT-E40F93301E1B",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_1",
"session_entropy": 0.573
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 989,
"timestamp": "2026-01-04T07:11:00Z",
"transaction_amount_usd": 2039498.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.791,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2386023.56,
"financial_exposure_usd": 4077258.03,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101178",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-01T19:38:00Z",
"trace_id": "5844d3bf-ab5f-f349-1ee7-2b0058488d91"
} | {
"account_age_days": 1635,
"account_id": "ACCT-EDE3FAF392F3",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_1",
"session_entropy": 0.477
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 339,
"timestamp": "2026-01-01T17:00:00Z",
"transaction_amount_usd": 10.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.748,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 447418.46,
"financial_exposure_usd": 793077.22,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106281",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "low",
"timestamp": "2026-01-05T08:41:00Z",
"trace_id": "880236a1-ac93-9171-78da-23ee0e8db20e"
} | {
"account_age_days": 1683,
"account_id": "ACCT-DA3AC3BC3A63",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.312
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 792,
"timestamp": "2026-01-05T08:41:00Z",
"transaction_amount_usd": 2219760.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3661404.96,
"financial_exposure_usd": 4335048.72,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100932",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-01T15:32:00Z",
"trace_id": "8d37a35e-7f0c-49b6-9dfc-5ace6b1e796c"
} | {
"account_age_days": 1714,
"account_id": "ACCT-19194CCE12CD",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_3",
"session_entropy": 0.65
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 403,
"timestamp": "2026-01-01T15:32:00Z",
"transaction_amount_usd": 79004.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 171057.91,
"financial_exposure_usd": 230962.27,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100305",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T05:05:00Z",
"trace_id": "046cf25d-340b-d8b6-a521-f3ae5b1bab8d"
} | {
"account_age_days": 981,
"account_id": "ACCT-98EC5B6A9C7C",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_1",
"session_entropy": 0.471
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 977,
"timestamp": "2026-01-01T05:05:00Z",
"transaction_amount_usd": 12102.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 410332.96,
"financial_exposure_usd": 803720.16,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104295",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "low",
"timestamp": "2026-01-03T23:35:00Z",
"trace_id": "da77791d-ddbe-c643-ea76-bcc0d2043243"
} | {
"account_age_days": 1199,
"account_id": "ACCT-5756555148EE",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_1",
"session_entropy": 0.21
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 311,
"timestamp": "2026-01-03T23:35:00Z",
"transaction_amount_usd": 2848385.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3816276.72,
"financial_exposure_usd": 4965320,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100467",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-01T07:47:00Z",
"trace_id": "fc962f6f-7974-e151-aea4-320b4087a859"
} | {
"account_age_days": 146,
"account_id": "ACCT-1E6B8A766839",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.883
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 104,
"timestamp": "2026-01-01T03:38:00Z",
"transaction_amount_usd": 12.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.683,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 453552.3,
"financial_exposure_usd": 941640.41,
"recoverable_pct": 0.112
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107799",
"label": "benign",
"label_confidence": 0.58,
"severity": "low",
"timestamp": "2026-01-06T09:59:00Z",
"trace_id": "1d0a7cad-12fb-f4b1-2782-66f08d3438bf"
} | {
"account_age_days": 867,
"account_id": "ACCT-6822C562F72A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.354
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 262,
"timestamp": "2026-01-06T09:59:00Z",
"transaction_amount_usd": 4168.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2123.31,
"financial_exposure_usd": 2409.96,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105086",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-04T12:46:00Z",
"trace_id": "562d0460-5391-e655-0a4a-3f18cdce14bf"
} | {
"account_age_days": 184,
"account_id": "ACCT-0E51795DF7C6",
"baseline_risk_score": 0.242,
"kyc_tier": "tier_1",
"session_entropy": 0.265
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 602,
"timestamp": "2026-01-04T12:46:00Z",
"transaction_amount_usd": 1732105.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3042675.21,
"financial_exposure_usd": 5942693.31,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107078",
"label": "benign",
"label_confidence": 0.524,
"severity": "low",
"timestamp": "2026-01-05T21:58:00Z",
"trace_id": "24e26fa1-4ba8-73af-49a2-e6975c81464a"
} | {
"account_age_days": 1969,
"account_id": "ACCT-D7D73705A98B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1181,
"timestamp": "2026-01-05T21:58:00Z",
"transaction_amount_usd": 11132.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1163.58,
"financial_exposure_usd": 1447.05,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101630",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-02T03:10:00Z",
"trace_id": "38157d18-237e-c260-0207-9475ca1dac40"
} | {
"account_age_days": 630,
"account_id": "ACCT-48F6E2CB81AE",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1169,
"timestamp": "2026-01-02T03:10:00Z",
"transaction_amount_usd": 63957.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 711647.99,
"financial_exposure_usd": 1134211.42,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100576",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-01T09:36:00Z",
"trace_id": "f23ef5f3-9720-c1ba-0171-771f98d47d41"
} | {
"account_age_days": 434,
"account_id": "ACCT-9AB8D0518DF1",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 105,
"timestamp": "2026-01-01T03:12:00Z",
"transaction_amount_usd": 12.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 439588.02,
"financial_exposure_usd": 629163.46,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104565",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "low",
"timestamp": "2026-01-04T04:05:00Z",
"trace_id": "4d32e500-a2c5-f3a7-4d11-9e00526f32e2"
} | {
"account_age_days": 270,
"account_id": "ACCT-79C0D66BC462",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 163,
"timestamp": "2026-01-04T01:25:00Z",
"transaction_amount_usd": 1.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3670504.92,
"financial_exposure_usd": 3904212.45,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101942",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "critical",
"timestamp": "2026-01-02T08:22:00Z",
"trace_id": "e3ef8e81-8969-b7be-501f-de5d1dc143e5"
} | {
"account_age_days": 370,
"account_id": "ACCT-A3D81A17D29C",
"baseline_risk_score": 0.571,
"kyc_tier": "tier_3",
"session_entropy": 0.128
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1190,
"timestamp": "2026-01-02T08:22:00Z",
"transaction_amount_usd": 101225.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.558,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 414643.26,
"financial_exposure_usd": 911588.03,
"recoverable_pct": 0.009
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106037",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-05T04:37:00Z",
"trace_id": "ff3c33b0-feb3-dbb3-e4c3-57ef10681648"
} | {
"account_age_days": 1123,
"account_id": "ACCT-C0EFAD976E73",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.428
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 644,
"timestamp": "2026-01-05T04:37:00Z",
"transaction_amount_usd": 1316240.93
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.379,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3696966.26,
"financial_exposure_usd": 4917538.78,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106235",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "medium",
"timestamp": "2026-01-05T07:55:00Z",
"trace_id": "85568c41-28e1-96c2-0518-e8d3a4e374ee"
} | {
"account_age_days": 385,
"account_id": "ACCT-4928D366AA45",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 946,
"timestamp": "2026-01-05T07:55:00Z",
"transaction_amount_usd": 1251352.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1394509.41,
"financial_exposure_usd": 2258431.79,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100514",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "low",
"timestamp": "2026-01-01T08:34:00Z",
"trace_id": "3160c612-5ae9-e8bb-6f34-623bf64e12e2"
} | {
"account_age_days": 1689,
"account_id": "ACCT-F8757DC39D98",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_2",
"session_entropy": 0.166
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1124,
"timestamp": "2026-01-01T08:34:00Z",
"transaction_amount_usd": 21719.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 146195.12,
"financial_exposure_usd": 307038.56,
"recoverable_pct": 0.069
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103896",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-03T16:56:00Z",
"trace_id": "9087f88b-97a2-68dd-4ea8-66e4dd0032c5"
} | {
"account_age_days": 1677,
"account_id": "ACCT-C53EF59714CB",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.198
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 595,
"timestamp": "2026-01-03T16:56:00Z",
"transaction_amount_usd": 447899.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.704,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2198826.4,
"financial_exposure_usd": 3159726.51,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103193",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-03T05:13:00Z",
"trace_id": "2122e532-eee0-87c8-d9a8-18d18095ded8"
} | {
"account_age_days": 1079,
"account_id": "ACCT-2DBD5E214340",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.208
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 342,
"timestamp": "2026-01-03T05:13:00Z",
"transaction_amount_usd": 86922.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.89,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 256953.86,
"financial_exposure_usd": 503927.11,
"recoverable_pct": 0.228
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109785",
"label": "benign",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-07T19:05:00Z",
"trace_id": "1f4e77d5-1f4f-3b57-539d-4e71cfe1aa16"
} | {
"account_age_days": 853,
"account_id": "ACCT-11AFB08ADBE6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.176
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 173,
"timestamp": "2026-01-07T19:05:00Z",
"transaction_amount_usd": 1763.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.484,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 917.52,
"financial_exposure_usd": 1784.82,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109455",
"label": "benign",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-07T13:35:00Z",
"trace_id": "4ceee4a4-7335-1dd8-4191-fcf8a2065dc7"
} | {
"account_age_days": 1991,
"account_id": "ACCT-36362F43E5AE",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_3",
"session_entropy": 0.258
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 108,
"timestamp": "2026-01-07T13:35:00Z",
"transaction_amount_usd": 14815.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1263.92,
"financial_exposure_usd": 1511.66,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107551",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-06T05:51:00Z",
"trace_id": "d6eb2368-d3fe-8c4d-0f8c-6a0410d90203"
} | {
"account_age_days": 386,
"account_id": "ACCT-3296B8CE2F50",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 740,
"timestamp": "2026-01-06T05:51:00Z",
"transaction_amount_usd": 8499.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.691,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2400.58,
"financial_exposure_usd": 5430.01,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106927",
"label": "benign",
"label_confidence": 0.481,
"severity": "low",
"timestamp": "2026-01-05T19:27:00Z",
"trace_id": "9198633a-6e24-d562-e979-8232cbdb82b1"
} | {
"account_age_days": 843,
"account_id": "ACCT-ED425EFBE7CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.828
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 301,
"timestamp": "2026-01-05T19:27:00Z",
"transaction_amount_usd": 4977.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1798.08,
"financial_exposure_usd": 2320.79,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104601",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-04T04:41:00Z",
"trace_id": "10b8a130-acda-675e-db2f-6095398c7ee0"
} | {
"account_age_days": 1515,
"account_id": "ACCT-CB5703BCD868",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_2",
"session_entropy": 0.392
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 954,
"timestamp": "2026-01-04T04:41:00Z",
"transaction_amount_usd": 177739.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.627,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1279522.24,
"financial_exposure_usd": 1395468.76,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107735",
"label": "benign",
"label_confidence": 0.734,
"severity": "high",
"timestamp": "2026-01-06T08:55:00Z",
"trace_id": "fdc075be-7e4b-753a-b923-d15cc670f68f"
} | {
"account_age_days": 903,
"account_id": "ACCT-2B7DFDACC2B0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.648
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 149,
"timestamp": "2026-01-06T08:15:00Z",
"transaction_amount_usd": 17.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1418.15,
"financial_exposure_usd": 2287.28,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105919",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "medium",
"timestamp": "2026-01-05T02:39:00Z",
"trace_id": "3b5159ba-268f-1c01-b210-3680b79b982d"
} | {
"account_age_days": 1503,
"account_id": "ACCT-5A488DFA106A",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_2",
"session_entropy": 0.724
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 222,
"timestamp": "2026-01-05T02:39:00Z",
"transaction_amount_usd": 1825320.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.498,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6373658.34,
"financial_exposure_usd": 7029776.75,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106260",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-05T08:20:00Z",
"trace_id": "8204aea6-f40b-e524-4308-1eaed2aea54d"
} | {
"account_age_days": 898,
"account_id": "ACCT-CC84A0C8FEE4",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 944,
"timestamp": "2026-01-05T08:20:00Z",
"transaction_amount_usd": 2354878.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.852,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6064071.4,
"financial_exposure_usd": 9648413.89,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101895",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-02T07:35:00Z",
"trace_id": "a006b701-f14b-a25a-e36b-f6367a2e4d22"
} | {
"account_age_days": 439,
"account_id": "ACCT-3F10361694ED",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_3",
"session_entropy": 0.675
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 363,
"timestamp": "2026-01-02T07:35:00Z",
"transaction_amount_usd": 116474.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.775,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 346374.72,
"financial_exposure_usd": 582434.61,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103692",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-03T13:32:00Z",
"trace_id": "3d180651-7766-bb24-fd27-a2b49d952178"
} | {
"account_age_days": 1553,
"account_id": "ACCT-43912EAFDD57",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 156,
"timestamp": "2026-01-03T08:57:00Z",
"transaction_amount_usd": 5.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.63,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2613222.93,
"financial_exposure_usd": 3445777.12,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100851",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "medium",
"timestamp": "2026-01-01T14:11:00Z",
"trace_id": "cbde1252-b7ea-1118-fd36-9f59c5621922"
} | {
"account_age_days": 1753,
"account_id": "ACCT-31ED8DFAB141",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.347
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 192,
"timestamp": "2026-01-01T07:28:00Z",
"transaction_amount_usd": 10.09
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.631,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 698334.1,
"financial_exposure_usd": 924047.15,
"recoverable_pct": 0.258
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102655",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-02T20:15:00Z",
"trace_id": "a458021b-83f2-5a51-6c6c-dfabdb7ab89a"
} | {
"account_age_days": 1473,
"account_id": "ACCT-FEA84306F333",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_2",
"session_entropy": 0.696
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 284,
"timestamp": "2026-01-02T16:33:00Z",
"transaction_amount_usd": 18.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.854,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 97264.43,
"financial_exposure_usd": 211168.88,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101287",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "medium",
"timestamp": "2026-01-01T21:27:00Z",
"trace_id": "a5d43b3b-5d9a-6e46-8398-11e88034842b"
} | {
"account_age_days": 250,
"account_id": "ACCT-D7A9F561FE82",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_2",
"session_entropy": 0.466
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 336,
"timestamp": "2026-01-01T11:44:00Z",
"transaction_amount_usd": 1.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 361198.59,
"financial_exposure_usd": 634895.38,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107515",
"label": "benign",
"label_confidence": 0.549,
"severity": "high",
"timestamp": "2026-01-06T05:15:00Z",
"trace_id": "dec17200-563c-4f56-4d10-e81f64b0f1d2"
} | {
"account_age_days": 1708,
"account_id": "ACCT-34513373736B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.484
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 182,
"timestamp": "2026-01-06T01:18:00Z",
"transaction_amount_usd": 22.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2916.59,
"financial_exposure_usd": 3575.52,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104130",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "high",
"timestamp": "2026-01-03T20:50:00Z",
"trace_id": "7fde97e4-8422-73f4-e7ce-97fd96403ce7"
} | {
"account_age_days": 1254,
"account_id": "ACCT-4FFB25C798D8",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 952,
"timestamp": "2026-01-03T20:50:00Z",
"transaction_amount_usd": 2123254.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 9692534.09,
"financial_exposure_usd": 9756597.63,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109567",
"label": "benign",
"label_confidence": 0.561,
"severity": "low",
"timestamp": "2026-01-07T15:27:00Z",
"trace_id": "4acfbf48-e93d-9612-c5dc-a55d7dea2a73"
} | {
"account_age_days": 1273,
"account_id": "ACCT-914C2A302E81",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.229
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 384,
"timestamp": "2026-01-07T03:56:00Z",
"transaction_amount_usd": 4.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1145.56,
"financial_exposure_usd": 1485.79,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108608",
"label": "benign",
"label_confidence": 0.644,
"severity": "medium",
"timestamp": "2026-01-06T23:28:00Z",
"trace_id": "5474f9e2-4e6c-cca2-d2f9-89c9bd80a4fe"
} | {
"account_age_days": 711,
"account_id": "ACCT-C781CB8C8370",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.121
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 156,
"timestamp": "2026-01-06T23:28:00Z",
"transaction_amount_usd": 11710.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2378.45,
"financial_exposure_usd": 2564.87,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105744",
"label": "fraudulent",
"label_confidence": 0.667,
"severity": "high",
"timestamp": "2026-01-04T23:44:00Z",
"trace_id": "257a570a-ea9a-e091-d211-916ec54113ac"
} | {
"account_age_days": 1116,
"account_id": "ACCT-94A13DE0AB3B",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_2",
"session_entropy": 0.588
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 713,
"timestamp": "2026-01-04T23:44:00Z",
"transaction_amount_usd": 162636.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.813,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1141399.68,
"financial_exposure_usd": 1600328.57,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109251",
"label": "benign",
"label_confidence": 0.553,
"severity": "medium",
"timestamp": "2026-01-07T10:11:00Z",
"trace_id": "c5f53fc6-7aca-5ef9-3cfe-f280f88cc546"
} | {
"account_age_days": 779,
"account_id": "ACCT-225EB24AEE9C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.26
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 126,
"timestamp": "2026-01-07T00:54:00Z",
"transaction_amount_usd": 6.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4898.65,
"financial_exposure_usd": 5073.73,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100921",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "critical",
"timestamp": "2026-01-01T15:21:00Z",
"trace_id": "bfbe6c20-48c5-a974-db4f-2cd5ddabe68c"
} | {
"account_age_days": 704,
"account_id": "ACCT-8D8C22DB326E",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_3",
"session_entropy": 0.835
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 386,
"timestamp": "2026-01-01T15:21:00Z",
"transaction_amount_usd": 2537.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 938102.65,
"financial_exposure_usd": 1193653.76,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100255",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-01T04:15:00Z",
"trace_id": "6d987038-b174-429c-cffa-9e4d153e09ba"
} | {
"account_age_days": 1674,
"account_id": "ACCT-B52308212C41",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_1",
"session_entropy": 0.562
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 197,
"timestamp": "2025-12-31T21:27:00Z",
"transaction_amount_usd": 20.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.464,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 605177.82,
"financial_exposure_usd": 1271977.2,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102642",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-02T20:02:00Z",
"trace_id": "075b8242-1053-a7a5-e137-3a9625004f74"
} | {
"account_age_days": 97,
"account_id": "ACCT-74433051BE2D",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_3",
"session_entropy": 0.818
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 152,
"timestamp": "2026-01-02T20:02:00Z",
"transaction_amount_usd": 50207.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 588771.03,
"financial_exposure_usd": 607631.58,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100418",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-01T06:58:00Z",
"trace_id": "963cae6e-8563-e2f8-fea9-c616db59ba43"
} | {
"account_age_days": 1559,
"account_id": "ACCT-8959765BB787",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 230,
"timestamp": "2026-01-01T06:58:00Z",
"transaction_amount_usd": 67434.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.481,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 426614.97,
"financial_exposure_usd": 683557.37,
"recoverable_pct": 0.035
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100213",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "critical",
"timestamp": "2026-01-01T03:33:00Z",
"trace_id": "c1315e84-1784-1919-3c29-d9edb6bf1f51"
} | {
"account_age_days": 1101,
"account_id": "ACCT-65ADAFAB2A07",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_1",
"session_entropy": 0.281
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 900,
"timestamp": "2026-01-01T03:33:00Z",
"transaction_amount_usd": 40909.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.519,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 315012.99,
"financial_exposure_usd": 445860.73,
"recoverable_pct": 0.136
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100906",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-01T15:06:00Z",
"trace_id": "d3e666eb-73f3-87c3-7d6b-ed39be967bc1"
} | {
"account_age_days": 841,
"account_id": "ACCT-8FC001385C01",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_1",
"session_entropy": 0.468
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 202,
"timestamp": "2026-01-01T07:03:00Z",
"transaction_amount_usd": 9.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.563,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 507880.42,
"financial_exposure_usd": 571541.82,
"recoverable_pct": 0.254
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103126",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-03T04:06:00Z",
"trace_id": "2c18a6ba-d063-594c-80ec-41c94b0c8603"
} | {
"account_age_days": 1176,
"account_id": "ACCT-E73DF33C02BA",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_3",
"session_entropy": 0.265
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 984,
"timestamp": "2026-01-03T04:06:00Z",
"transaction_amount_usd": 6034.8
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 648148.42,
"financial_exposure_usd": 1252860.2,
"recoverable_pct": 0.048
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109826",
"label": "benign",
"label_confidence": 0.493,
"severity": "low",
"timestamp": "2026-01-07T19:46:00Z",
"trace_id": "bbb929d2-cad6-bf15-89a6-0e0b8f6f7970"
} | {
"account_age_days": 1305,
"account_id": "ACCT-DD08ADF8C4F8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.15
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1080,
"timestamp": "2026-01-07T19:46:00Z",
"transaction_amount_usd": 5251.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1002.8,
"financial_exposure_usd": 2059.31,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107295",
"label": "benign",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-06T01:35:00Z",
"trace_id": "f68e65d7-9651-056f-6565-e4d524601b2f"
} | {
"account_age_days": 704,
"account_id": "ACCT-8EC1E2A03E53",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.718
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 760,
"timestamp": "2026-01-06T01:35:00Z",
"transaction_amount_usd": 3681.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2126.39,
"financial_exposure_usd": 4208.44,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105912",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "critical",
"timestamp": "2026-01-05T02:32:00Z",
"trace_id": "4c0ead96-a516-62ee-0e3f-f48b6ae482aa"
} | {
"account_age_days": 831,
"account_id": "ACCT-B91B187AD9F1",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_2",
"session_entropy": 0.824
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 373,
"timestamp": "2026-01-05T02:32:00Z",
"transaction_amount_usd": 2547547.39
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5597132.55,
"financial_exposure_usd": 5786313.81,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107776",
"label": "benign",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-06T09:36:00Z",
"trace_id": "f4fe264c-41f8-4912-dc0a-ff0a4c52bf12"
} | {
"account_age_days": 1500,
"account_id": "ACCT-313057E5274C",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.184
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 177,
"timestamp": "2026-01-06T09:36:00Z",
"transaction_amount_usd": 1850.92
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 808.24,
"financial_exposure_usd": 1566.88,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108150",
"label": "benign",
"label_confidence": 0.552,
"severity": "medium",
"timestamp": "2026-01-06T15:50:00Z",
"trace_id": "1f0163f8-36f0-7bd5-7b64-80cb44e04151"
} | {
"account_age_days": 1317,
"account_id": "ACCT-E4FC0CED41FA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.514
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 191,
"timestamp": "2026-01-06T05:12:00Z",
"transaction_amount_usd": 2.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 67.29,
"financial_exposure_usd": 136.57,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106898",
"label": "benign",
"label_confidence": 0.524,
"severity": "high",
"timestamp": "2026-01-05T18:58:00Z",
"trace_id": "c1643321-4766-b120-6097-83b7a5f83786"
} | {
"account_age_days": 1769,
"account_id": "ACCT-8B92D76817C2",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 788,
"timestamp": "2026-01-05T18:58:00Z",
"transaction_amount_usd": 14683.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1759.05,
"financial_exposure_usd": 3504.22,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103975",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "medium",
"timestamp": "2026-01-03T18:15:00Z",
"trace_id": "24e5008d-d923-9c5f-3d07-7daa6bab5ef7"
} | {
"account_age_days": 1931,
"account_id": "ACCT-A1CA40669756",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_1",
"session_entropy": 0.91
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 174,
"timestamp": "2026-01-03T18:15:00Z",
"transaction_amount_usd": 268999.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.4,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 5790849.43,
"financial_exposure_usd": 5814484.99,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100364",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-01T06:04:00Z",
"trace_id": "20c4ff5d-d699-f908-d95a-017ccb1e7a8c"
} | {
"account_age_days": 1312,
"account_id": "ACCT-9528688E5B23",
"baseline_risk_score": 0.507,
"kyc_tier": "tier_1",
"session_entropy": 0.744
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 228,
"timestamp": "2026-01-01T06:04:00Z",
"transaction_amount_usd": 117472.38
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 853231.43,
"financial_exposure_usd": 937117.8,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107864",
"label": "benign",
"label_confidence": 0.642,
"severity": "low",
"timestamp": "2026-01-06T11:04:00Z",
"trace_id": "f96bb5bf-3eed-2181-5fb6-f0bd1c49476a"
} | {
"account_age_days": 555,
"account_id": "ACCT-CF43C732CF28",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 801,
"timestamp": "2026-01-06T11:04:00Z",
"transaction_amount_usd": 10902.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 387.92,
"financial_exposure_usd": 744.5,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102424",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-02T16:24:00Z",
"trace_id": "153d332f-2d61-6a10-b7c6-6954492b652d"
} | {
"account_age_days": 1061,
"account_id": "ACCT-57F6F69EF1EF",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.52
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 179,
"timestamp": "2026-01-02T16:24:00Z",
"transaction_amount_usd": 24908.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.809,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 514536.87,
"financial_exposure_usd": 815344.6,
"recoverable_pct": 0.034
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102478",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-02T17:18:00Z",
"trace_id": "bd0a5c53-a9d9-9565-8e91-3ffa9bb2ac2a"
} | {
"account_age_days": 1742,
"account_id": "ACCT-8729F2BBB2C1",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 217,
"timestamp": "2026-01-02T17:18:00Z",
"transaction_amount_usd": 41794.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.4,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 237350.57,
"financial_exposure_usd": 371162.98,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101742",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-02T05:02:00Z",
"trace_id": "8d984d28-cd6b-d3e2-8415-4256b631db48"
} | {
"account_age_days": 1467,
"account_id": "ACCT-90E10C0552C5",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.86
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1104,
"timestamp": "2026-01-02T05:02:00Z",
"transaction_amount_usd": 33562.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 417078.56,
"financial_exposure_usd": 853772.62,
"recoverable_pct": 0.264
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105615",
"label": "fraudulent",
"label_confidence": 0.629,
"severity": "critical",
"timestamp": "2026-01-04T21:35:00Z",
"trace_id": "92aba3fa-5880-0932-8753-8c5551af2fbb"
} | {
"account_age_days": 1295,
"account_id": "ACCT-CD5204CEE2BD",
"baseline_risk_score": 0.216,
"kyc_tier": "tier_1",
"session_entropy": 0.328
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 252,
"timestamp": "2026-01-04T14:38:00Z",
"transaction_amount_usd": 10.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.761,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3524937.52,
"financial_exposure_usd": 4998292.47,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108614",
"label": "benign",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-06T23:34:00Z",
"trace_id": "3500ac83-cb4f-96e9-cf30-35efeb6ee936"
} | {
"account_age_days": 1073,
"account_id": "ACCT-C3B0F23A067F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 898,
"timestamp": "2026-01-06T23:34:00Z",
"transaction_amount_usd": 13641.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1566.01,
"financial_exposure_usd": 1969.88,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102627",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-02T19:47:00Z",
"trace_id": "c206f309-d60f-aa02-0273-6537cdd841f5"
} | {
"account_age_days": 1494,
"account_id": "ACCT-0AC54901DF29",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.397
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 340,
"timestamp": "2026-01-02T08:58:00Z",
"transaction_amount_usd": 19.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.736,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 226384.83,
"financial_exposure_usd": 525777.43,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108445",
"label": "benign",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-06T20:45:00Z",
"trace_id": "ff7b64de-b8ed-53f5-df4d-4297aa7fa16d"
} | {
"account_age_days": 1046,
"account_id": "ACCT-3A9E0D7BC6A1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.151
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 393,
"timestamp": "2026-01-06T08:43:00Z",
"transaction_amount_usd": 22.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 658.01,
"financial_exposure_usd": 805.05,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102114",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "critical",
"timestamp": "2026-01-02T11:14:00Z",
"trace_id": "3e75a8af-7f5f-19ce-828f-79b45e4368a0"
} | {
"account_age_days": 601,
"account_id": "ACCT-9EBFD4FB955C",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1024,
"timestamp": "2026-01-02T11:14:00Z",
"transaction_amount_usd": 4375.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 451024.79,
"financial_exposure_usd": 724896.71,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107697",
"label": "benign",
"label_confidence": 0.573,
"severity": "low",
"timestamp": "2026-01-06T08:17:00Z",
"trace_id": "3d499fbb-668f-9d91-1e88-47a754bca8a5"
} | {
"account_age_days": 1510,
"account_id": "ACCT-9DB3747FFEB4",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.417
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 627,
"timestamp": "2026-01-06T08:17:00Z",
"transaction_amount_usd": 5734.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1139.91,
"financial_exposure_usd": 2236.01,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102489",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "critical",
"timestamp": "2026-01-02T17:29:00Z",
"trace_id": "db924385-bf21-2909-f1a9-8e96c825b592"
} | {
"account_age_days": 1791,
"account_id": "ACCT-32265DED138D",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 595,
"timestamp": "2026-01-02T17:29:00Z",
"transaction_amount_usd": 43402.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 308441.63,
"financial_exposure_usd": 432427.3,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107908",
"label": "benign",
"label_confidence": 0.514,
"severity": "low",
"timestamp": "2026-01-06T11:48:00Z",
"trace_id": "83a788ea-3bbe-cc31-9f99-6e34630f1093"
} | {
"account_age_days": 1500,
"account_id": "ACCT-14D2B2B46AF0",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1111,
"timestamp": "2026-01-06T11:48:00Z",
"transaction_amount_usd": 7433.3
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3669.83,
"financial_exposure_usd": 6661.08,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105436",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "medium",
"timestamp": "2026-01-04T18:36:00Z",
"trace_id": "6e7cc25e-3e56-796a-ba0b-cbfc98ef937b"
} | {
"account_age_days": 570,
"account_id": "ACCT-73E52F49AFCB",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_2",
"session_entropy": 0.929
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 159,
"timestamp": "2026-01-04T15:20:00Z",
"transaction_amount_usd": 1.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.73,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3064743.94,
"financial_exposure_usd": 3676833.5,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104662",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "high",
"timestamp": "2026-01-04T05:42:00Z",
"trace_id": "c0e567f7-d055-56df-9931-d8e388d5c3a0"
} | {
"account_age_days": 441,
"account_id": "ACCT-911A3064CEFF",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.559
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 180,
"timestamp": "2026-01-04T02:14:00Z",
"transaction_amount_usd": 13.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.597,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2197137.61,
"financial_exposure_usd": 3879111.8,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105904",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-05T02:24:00Z",
"trace_id": "f06bed48-7e50-4d04-9371-5e13bc411f42"
} | {
"account_age_days": 313,
"account_id": "ACCT-F48588CBA7AE",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_2",
"session_entropy": 0.125
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 346,
"timestamp": "2026-01-04T15:05:00Z",
"transaction_amount_usd": 16.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4449379.48,
"financial_exposure_usd": 6677863.57,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101326",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-01T22:06:00Z",
"trace_id": "b359465e-5372-ec22-ff10-754ba7813d1f"
} | {
"account_age_days": 105,
"account_id": "ACCT-33ABB3247947",
"baseline_risk_score": 0.579,
"kyc_tier": "tier_1",
"session_entropy": 0.121
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 661,
"timestamp": "2026-01-01T22:06:00Z",
"transaction_amount_usd": 40819.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.369,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 585898.67,
"financial_exposure_usd": 759644.81,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.