schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104819",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-04T08:19:00Z",
"trace_id": "407f3c0a-f359-e879-b685-6d30e874f129"
} | {
"account_age_days": 1507,
"account_id": "ACCT-C3B2CB0FD6D4",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_2",
"session_entropy": 0.216
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 590,
"timestamp": "2026-01-04T08:19:00Z",
"transaction_amount_usd": 1756297.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.668,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2448363.71,
"financial_exposure_usd": 2655641.06,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103076",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "low",
"timestamp": "2026-01-03T03:16:00Z",
"trace_id": "ace8246d-9211-bc3c-f00b-b88edc6a2bfb"
} | {
"account_age_days": 1383,
"account_id": "ACCT-9247984FAE2B",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_1",
"session_entropy": 0.12
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 999,
"timestamp": "2026-01-03T03:16:00Z",
"transaction_amount_usd": 51703.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.506,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 688227.53,
"financial_exposure_usd": 981586.1,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107013",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-05T20:53:00Z",
"trace_id": "7e373c7e-a907-98fd-348d-c625027320b8"
} | {
"account_age_days": 777,
"account_id": "ACCT-1603EF10A1FA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 444,
"timestamp": "2026-01-05T20:53:00Z",
"transaction_amount_usd": 2984.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2950.06,
"financial_exposure_usd": 4080.22,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101256",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "low",
"timestamp": "2026-01-01T20:56:00Z",
"trace_id": "fb4c4d06-c286-527c-8d94-e25f76c3dd16"
} | {
"account_age_days": 1999,
"account_id": "ACCT-CD2E17A300F7",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_1",
"session_entropy": 0.938
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 155,
"timestamp": "2026-01-01T16:53:00Z",
"transaction_amount_usd": 5.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 723807.83,
"financial_exposure_usd": 793745.9,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100593",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "low",
"timestamp": "2026-01-01T09:53:00Z",
"trace_id": "7b899d97-165f-5ad9-5dbf-93ba101ac752"
} | {
"account_age_days": 909,
"account_id": "ACCT-2AF67F9B1BAF",
"baseline_risk_score": 0.646,
"kyc_tier": "tier_1",
"session_entropy": 0.595
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 491,
"timestamp": "2026-01-01T09:53:00Z",
"transaction_amount_usd": 53884.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 424788.46,
"financial_exposure_usd": 996837.46,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108680",
"label": "benign",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-07T00:40:00Z",
"trace_id": "8e47be3a-e372-e928-e149-65e55928e3c9"
} | {
"account_age_days": 1899,
"account_id": "ACCT-7E9F587C94A4",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 912,
"timestamp": "2026-01-07T00:40:00Z",
"transaction_amount_usd": 5772.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1187.67,
"financial_exposure_usd": 1703.72,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104603",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-04T04:43:00Z",
"trace_id": "62c24751-aceb-3532-0265-595a45758b7b"
} | {
"account_age_days": 583,
"account_id": "ACCT-3AB97C5C7AC9",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1117,
"timestamp": "2026-01-04T04:43:00Z",
"transaction_amount_usd": 1903791.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.458,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3675602.51,
"financial_exposure_usd": 4071390.04,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107592",
"label": "benign",
"label_confidence": 0.693,
"severity": "low",
"timestamp": "2026-01-06T06:32:00Z",
"trace_id": "c2ab57c8-fcfa-60a5-689d-df909460d109"
} | {
"account_age_days": 1333,
"account_id": "ACCT-BDA308CC09E8",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.713
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 999,
"timestamp": "2026-01-06T06:32:00Z",
"transaction_amount_usd": 2069.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3387.48,
"financial_exposure_usd": 4085.68,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109007",
"label": "benign",
"label_confidence": 0.531,
"severity": "high",
"timestamp": "2026-01-07T06:07:00Z",
"trace_id": "ca21a49e-0108-4f46-acd6-0cf4dfea9c4b"
} | {
"account_age_days": 1413,
"account_id": "ACCT-95A486A3F029",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_3",
"session_entropy": 0.522
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1130,
"timestamp": "2026-01-07T06:07:00Z",
"transaction_amount_usd": 8317.95
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2414.82,
"financial_exposure_usd": 3677.71,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109722",
"label": "benign",
"label_confidence": 0.515,
"severity": "medium",
"timestamp": "2026-01-07T18:02:00Z",
"trace_id": "7055c8c4-74e9-099b-d2e0-8d69d8cc1a28"
} | {
"account_age_days": 894,
"account_id": "ACCT-F2EEEDCCAB0D",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_2",
"session_entropy": 0.559
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 437,
"timestamp": "2026-01-07T18:02:00Z",
"transaction_amount_usd": 10852.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1262.2,
"financial_exposure_usd": 1673.26,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106178",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-05T06:58:00Z",
"trace_id": "37d5be4f-8709-9f09-468f-cc9c3ceb9d7b"
} | {
"account_age_days": 988,
"account_id": "ACCT-18C70D3EA978",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_2",
"session_entropy": 0.392
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1127,
"timestamp": "2026-01-05T06:58:00Z",
"transaction_amount_usd": 1510088.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.578,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3526184.64,
"financial_exposure_usd": 5499418.34,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100704",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-01T11:44:00Z",
"trace_id": "6c67d107-711b-72df-f143-9f10f7f1561e"
} | {
"account_age_days": 268,
"account_id": "ACCT-E71C5006A24A",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_3",
"session_entropy": 0.913
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 265,
"timestamp": "2026-01-01T11:44:00Z",
"transaction_amount_usd": 68050.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 201535.32,
"financial_exposure_usd": 501672.18,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105806",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-05T00:46:00Z",
"trace_id": "c6c84a7b-5dc0-84a5-5a55-79dc30f0ca54"
} | {
"account_age_days": 1987,
"account_id": "ACCT-51C34856E60F",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_1",
"session_entropy": 0.766
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 162,
"timestamp": "2026-01-04T21:41:00Z",
"transaction_amount_usd": 10.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.378,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1584523.38,
"financial_exposure_usd": 3617478.14,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103221",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-03T05:41:00Z",
"trace_id": "9df2f506-f198-01c4-60d4-1be7a06bdfc1"
} | {
"account_age_days": 1055,
"account_id": "ACCT-9EC250DD3B9A",
"baseline_risk_score": 0.523,
"kyc_tier": "tier_2",
"session_entropy": 0.91
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 644,
"timestamp": "2026-01-03T05:41:00Z",
"transaction_amount_usd": 14530.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 573435.38,
"financial_exposure_usd": 878538.56,
"recoverable_pct": 0.092
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108895",
"label": "benign",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-07T04:15:00Z",
"trace_id": "ee4b01a9-53d9-783b-180f-94f4ccf7a9e4"
} | {
"account_age_days": 455,
"account_id": "ACCT-0DD185C27734",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.422
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1060,
"timestamp": "2026-01-07T04:15:00Z",
"transaction_amount_usd": 2101.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3895.61,
"financial_exposure_usd": 6113.24,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101654",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "medium",
"timestamp": "2026-01-02T03:34:00Z",
"trace_id": "49f0e5dd-4866-2462-89f6-a0eac3725129"
} | {
"account_age_days": 160,
"account_id": "ACCT-0531E46B5C7E",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_2",
"session_entropy": 0.333
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 579,
"timestamp": "2026-01-02T03:34:00Z",
"transaction_amount_usd": 5050.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.588,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 568494.19,
"financial_exposure_usd": 602209.51,
"recoverable_pct": 0.137
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107130",
"label": "benign",
"label_confidence": 0.494,
"severity": "high",
"timestamp": "2026-01-05T22:50:00Z",
"trace_id": "815d6f24-9421-167c-a82f-e7cfcc775561"
} | {
"account_age_days": 711,
"account_id": "ACCT-D9C443BFE590",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.766
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 276,
"timestamp": "2026-01-05T22:50:00Z",
"transaction_amount_usd": 9327.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.703,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5284.08,
"financial_exposure_usd": 6406.22,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103650",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-03T12:50:00Z",
"trace_id": "bad900fd-9318-cb46-73e3-3f5aea42d50c"
} | {
"account_age_days": 591,
"account_id": "ACCT-4B403F332993",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_1",
"session_entropy": 0.811
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 845,
"timestamp": "2026-01-03T12:50:00Z",
"transaction_amount_usd": 410358.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.675,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2969637.08,
"financial_exposure_usd": 3689050.99,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104090",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "critical",
"timestamp": "2026-01-03T20:10:00Z",
"trace_id": "928580ce-6cdb-126e-1832-f1933ea5c3fc"
} | {
"account_age_days": 1064,
"account_id": "ACCT-75264650BFF6",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.138
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1013,
"timestamp": "2026-01-03T20:10:00Z",
"transaction_amount_usd": 2152506.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.59,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2053469.26,
"financial_exposure_usd": 3809143.64,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105678",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "critical",
"timestamp": "2026-01-04T22:38:00Z",
"trace_id": "2acae427-7a55-170d-7e75-f14cec3812f6"
} | {
"account_age_days": 1923,
"account_id": "ACCT-71E90909CB53",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_2",
"session_entropy": 0.573
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 272,
"timestamp": "2026-01-04T17:30:00Z",
"transaction_amount_usd": 8.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.56,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4224569.19,
"financial_exposure_usd": 8486010.55,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107616",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-06T06:56:00Z",
"trace_id": "389dd72c-93bc-7aab-918a-af6cf61767ae"
} | {
"account_age_days": 1311,
"account_id": "ACCT-566F47A6CE89",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 363,
"timestamp": "2026-01-06T06:56:00Z",
"transaction_amount_usd": 11311.09
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1487.7,
"financial_exposure_usd": 1814.24,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104814",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "medium",
"timestamp": "2026-01-04T08:14:00Z",
"trace_id": "996ea394-5b66-1468-a5a1-4a4cc2b5fd24"
} | {
"account_age_days": 1217,
"account_id": "ACCT-901547517777",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_1",
"session_entropy": 0.363
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1038,
"timestamp": "2026-01-04T08:14:00Z",
"transaction_amount_usd": 2412951.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4656580.33,
"financial_exposure_usd": 6352927.11,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104490",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-04T02:50:00Z",
"trace_id": "be2ad9db-f1ee-c407-9e8d-5db59e0358fc"
} | {
"account_age_days": 868,
"account_id": "ACCT-CAF2D83DF024",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_1",
"session_entropy": 0.701
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 119,
"timestamp": "2026-01-04T02:50:00Z",
"transaction_amount_usd": 2713006.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3255211.21,
"financial_exposure_usd": 3814076.6,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106395",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-05T10:35:00Z",
"trace_id": "9aa3cf1a-e978-fdf6-0478-5931290aa9ca"
} | {
"account_age_days": 311,
"account_id": "ACCT-AD313D0B14D2",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 294,
"timestamp": "2026-01-05T02:09:00Z",
"transaction_amount_usd": 20.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1308849.43,
"financial_exposure_usd": 1454302.89,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109309",
"label": "benign",
"label_confidence": 0.594,
"severity": "low",
"timestamp": "2026-01-07T11:09:00Z",
"trace_id": "b4ba767f-da8a-5867-f1b2-0bb0ffda3c2c"
} | {
"account_age_days": 606,
"account_id": "ACCT-C101A1756789",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.144
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 127,
"timestamp": "2026-01-07T11:09:00Z",
"transaction_amount_usd": 3167.4
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 671.49,
"financial_exposure_usd": 706.19,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109953",
"label": "benign",
"label_confidence": 0.717,
"severity": "high",
"timestamp": "2026-01-07T21:53:00Z",
"trace_id": "e844db16-7c72-b44a-7b3e-bba96822b087"
} | {
"account_age_days": 840,
"account_id": "ACCT-36CE6450B6F3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.488
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 493,
"timestamp": "2026-01-07T21:53:00Z",
"transaction_amount_usd": 6274.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1971.36,
"financial_exposure_usd": 3072.67,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106647",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-05T14:47:00Z",
"trace_id": "50da2956-fa11-5a81-31b7-f947d4148883"
} | {
"account_age_days": 1565,
"account_id": "ACCT-CCD0CE2EAE9D",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 420,
"timestamp": "2026-01-05T14:47:00Z",
"transaction_amount_usd": 2108871.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3273295.03,
"financial_exposure_usd": 4948531.03,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107256",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-06T00:56:00Z",
"trace_id": "4dae2246-e1b4-b980-2dd1-ba844a1004fd"
} | {
"account_age_days": 1078,
"account_id": "ACCT-34248D8C6D2E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.243
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1069,
"timestamp": "2026-01-06T00:56:00Z",
"transaction_amount_usd": 6234.58
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1136.04,
"financial_exposure_usd": 2029.33,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105584",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "critical",
"timestamp": "2026-01-04T21:04:00Z",
"trace_id": "9f53a4a1-a4f3-7954-468a-f2024e064829"
} | {
"account_age_days": 1754,
"account_id": "ACCT-491C8D5C8F63",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_1",
"session_entropy": 0.562
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 847,
"timestamp": "2026-01-04T21:04:00Z",
"transaction_amount_usd": 2813339.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.818,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105892",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "critical",
"timestamp": "2026-01-05T02:12:00Z",
"trace_id": "8521f6b7-42d1-fa7a-6c62-14d3e6b021af"
} | {
"account_age_days": 1044,
"account_id": "ACCT-63881E97716F",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_3",
"session_entropy": 0.905
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1030,
"timestamp": "2026-01-05T02:12:00Z",
"transaction_amount_usd": 340394.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.808,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4305144.26,
"financial_exposure_usd": 4730051.8,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107688",
"label": "benign",
"label_confidence": 0.617,
"severity": "high",
"timestamp": "2026-01-06T08:08:00Z",
"trace_id": "e78ae240-9566-88eb-8b1f-f0cb211ac862"
} | {
"account_age_days": 1837,
"account_id": "ACCT-C7190E15667C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.286
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 216,
"timestamp": "2026-01-06T08:08:00Z",
"transaction_amount_usd": 10561.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.55,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 5363.99,
"financial_exposure_usd": 5694.01,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102400",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "medium",
"timestamp": "2026-01-02T16:00:00Z",
"trace_id": "14d73329-72d9-5534-27e6-88bf80f867a7"
} | {
"account_age_days": 1906,
"account_id": "ACCT-0CB0538B95E2",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_1",
"session_entropy": 0.451
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 212,
"timestamp": "2026-01-02T16:00:00Z",
"transaction_amount_usd": 92205.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1165473.9,
"financial_exposure_usd": 1359534.63,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102517",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "high",
"timestamp": "2026-01-02T17:57:00Z",
"trace_id": "8c328c10-8fe8-96b9-180d-ddee329fed72"
} | {
"account_age_days": 1859,
"account_id": "ACCT-D1994BF9A799",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.17
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 871,
"timestamp": "2026-01-02T17:57:00Z",
"transaction_amount_usd": 12609.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 557882.2,
"financial_exposure_usd": 587859.18,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108002",
"label": "benign",
"label_confidence": 0.749,
"severity": "medium",
"timestamp": "2026-01-06T13:22:00Z",
"trace_id": "76796302-25a4-7b5f-d4f8-3f20ce4d50be"
} | {
"account_age_days": 529,
"account_id": "ACCT-7E9D617B8FD5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.266
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 360,
"timestamp": "2026-01-06T09:52:00Z",
"transaction_amount_usd": 0.69
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.631,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 536.89,
"financial_exposure_usd": 953.56,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105406",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "low",
"timestamp": "2026-01-04T18:06:00Z",
"trace_id": "73352b6a-741e-7829-7448-601d1e4787ed"
} | {
"account_age_days": 870,
"account_id": "ACCT-F766B11B9BA8",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.195
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 234,
"timestamp": "2026-01-04T18:06:00Z",
"transaction_amount_usd": 2276754.58
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.787,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4148288.14,
"financial_exposure_usd": 4673728.92,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107881",
"label": "benign",
"label_confidence": 0.479,
"severity": "high",
"timestamp": "2026-01-06T11:21:00Z",
"trace_id": "4128c07f-3a4d-f0c5-5764-fecd1173c01f"
} | {
"account_age_days": 848,
"account_id": "ACCT-FEEED57D1875",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 113,
"timestamp": "2026-01-06T11:21:00Z",
"transaction_amount_usd": 11751.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1459.24,
"financial_exposure_usd": 2075.45,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104025",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "high",
"timestamp": "2026-01-03T19:05:00Z",
"trace_id": "f58dd7e5-571f-7bce-c1ba-64c3c1b57c1f"
} | {
"account_age_days": 1376,
"account_id": "ACCT-A5AF039CDD0C",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.465
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 289,
"timestamp": "2026-01-03T15:55:00Z",
"transaction_amount_usd": 10.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3329709.52,
"financial_exposure_usd": 4101046.69,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101324",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "medium",
"timestamp": "2026-01-01T22:04:00Z",
"trace_id": "8df6c7e0-86e2-da87-7743-043a290c814a"
} | {
"account_age_days": 1903,
"account_id": "ACCT-D045749DC9B7",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_1",
"session_entropy": 0.535
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1045,
"timestamp": "2026-01-01T22:04:00Z",
"transaction_amount_usd": 62156.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.856,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 574724.3,
"financial_exposure_usd": 757873.12,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102216",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "critical",
"timestamp": "2026-01-02T12:56:00Z",
"trace_id": "988eb313-a3f8-4f6b-4229-7a744e55d805"
} | {
"account_age_days": 471,
"account_id": "ACCT-D3400B2458CF",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_2",
"session_entropy": 0.175
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 764,
"timestamp": "2026-01-02T12:56:00Z",
"transaction_amount_usd": 88306.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.783,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 253254.7,
"financial_exposure_usd": 603855.19,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103878",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-03T16:38:00Z",
"trace_id": "35b16994-dfe2-59c9-1edc-2e6f5f0324ad"
} | {
"account_age_days": 354,
"account_id": "ACCT-14494FB66916",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_1",
"session_entropy": 0.547
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1150,
"timestamp": "2026-01-03T16:38:00Z",
"transaction_amount_usd": 1863480.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1464873.21,
"financial_exposure_usd": 3033313.59,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100448",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "critical",
"timestamp": "2026-01-01T07:28:00Z",
"trace_id": "ba15a44a-360b-b108-d18c-116906c99a0a"
} | {
"account_age_days": 15,
"account_id": "ACCT-EFEE043470B8",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_2",
"session_entropy": 0.128
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 448,
"timestamp": "2026-01-01T07:28:00Z",
"transaction_amount_usd": 108871.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.686,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 421019.37,
"financial_exposure_usd": 613181.52,
"recoverable_pct": 0.195
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103966",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-03T18:06:00Z",
"trace_id": "8e9e64da-ffcd-e2f9-d5ea-be8835015021"
} | {
"account_age_days": 750,
"account_id": "ACCT-00DE39D003A6",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_2",
"session_entropy": 0.663
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 674,
"timestamp": "2026-01-03T18:06:00Z",
"transaction_amount_usd": 1926664.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5353669.37,
"financial_exposure_usd": 6145746.98,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107738",
"label": "benign",
"label_confidence": 0.474,
"severity": "low",
"timestamp": "2026-01-06T08:58:00Z",
"trace_id": "cabf2ba4-cb86-1b6f-8443-9f0975dbd90c"
} | {
"account_age_days": 1045,
"account_id": "ACCT-67EF8C7BEFFB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 311,
"timestamp": "2026-01-06T02:05:00Z",
"transaction_amount_usd": 19.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1998.67,
"financial_exposure_usd": 2092.89,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104260",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "low",
"timestamp": "2026-01-03T23:00:00Z",
"trace_id": "368817f2-09dc-98bf-2f5c-ce33e75e1bc1"
} | {
"account_age_days": 456,
"account_id": "ACCT-6934C1CB244E",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_3",
"session_entropy": 0.314
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 383,
"timestamp": "2026-01-03T16:08:00Z",
"transaction_amount_usd": 3.33
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1664949.29,
"financial_exposure_usd": 3359824.55,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108847",
"label": "benign",
"label_confidence": 0.678,
"severity": "high",
"timestamp": "2026-01-07T03:27:00Z",
"trace_id": "912dea6d-a949-de96-3956-9f049a2bd0aa"
} | {
"account_age_days": 534,
"account_id": "ACCT-AE99E6B80A62",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.881
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 135,
"timestamp": "2026-01-06T22:30:00Z",
"transaction_amount_usd": 15.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2375.86,
"financial_exposure_usd": 3041.66,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105137",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "low",
"timestamp": "2026-01-04T13:37:00Z",
"trace_id": "ac944ee6-6686-5c48-1d71-ec72adf7c309"
} | {
"account_age_days": 1847,
"account_id": "ACCT-458CFC3CA2E0",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.11
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 990,
"timestamp": "2026-01-04T13:37:00Z",
"transaction_amount_usd": 1272189.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.783,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3563004.68,
"financial_exposure_usd": 4026433.75,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107232",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-06T00:32:00Z",
"trace_id": "f15e3059-5289-5774-386d-89131bfd27af"
} | {
"account_age_days": 310,
"account_id": "ACCT-28C5EE43B0D6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.599
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 819,
"timestamp": "2026-01-06T00:32:00Z",
"transaction_amount_usd": 14122.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1314.88,
"financial_exposure_usd": 3063.06,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108744",
"label": "benign",
"label_confidence": 0.516,
"severity": "low",
"timestamp": "2026-01-07T01:44:00Z",
"trace_id": "6122cfc2-df31-cd63-646f-b4e232fe2ad6"
} | {
"account_age_days": 11,
"account_id": "ACCT-F036F222B333",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.206
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 317,
"timestamp": "2026-01-07T01:44:00Z",
"transaction_amount_usd": 4782.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2406.9,
"financial_exposure_usd": 5559.68,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103025",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-03T02:25:00Z",
"trace_id": "583fdade-89da-4449-ef5e-59c0aeae40f8"
} | {
"account_age_days": 554,
"account_id": "ACCT-99D34D7FFB25",
"baseline_risk_score": 0.515,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 380,
"timestamp": "2026-01-03T02:25:00Z",
"transaction_amount_usd": 26217.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 747772.46,
"financial_exposure_usd": 754281.93,
"recoverable_pct": 0.147
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109374",
"label": "benign",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-07T12:14:00Z",
"trace_id": "980f5d39-24b9-24f5-ae5e-94d73dc1646b"
} | {
"account_age_days": 1882,
"account_id": "ACCT-DACD0D9C85E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.516
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 219,
"timestamp": "2026-01-07T12:14:00Z",
"transaction_amount_usd": 13142.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2428.31,
"financial_exposure_usd": 3052.07,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106185",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "low",
"timestamp": "2026-01-05T07:05:00Z",
"trace_id": "a048eee5-5879-a088-2ba8-5f86c10e738e"
} | {
"account_age_days": 164,
"account_id": "ACCT-58D13C3C7C2F",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.594
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 541,
"timestamp": "2026-01-05T07:05:00Z",
"transaction_amount_usd": 1719261.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.816,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5142253.16,
"financial_exposure_usd": 8264151.22,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107636",
"label": "benign",
"label_confidence": 0.585,
"severity": "low",
"timestamp": "2026-01-06T07:16:00Z",
"trace_id": "49f14d86-110f-b1a8-86e8-e78612da189c"
} | {
"account_age_days": 69,
"account_id": "ACCT-7DD52CED267D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.455
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 907,
"timestamp": "2026-01-06T07:16:00Z",
"transaction_amount_usd": 12453.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1247.3,
"financial_exposure_usd": 1782.86,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109922",
"label": "benign",
"label_confidence": 0.669,
"severity": "high",
"timestamp": "2026-01-07T21:22:00Z",
"trace_id": "b457b173-1027-8325-b334-9ecfce7c7674"
} | {
"account_age_days": 110,
"account_id": "ACCT-8657CBAD9043",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.836
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 549,
"timestamp": "2026-01-07T21:22:00Z",
"transaction_amount_usd": 11260.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1971.36,
"financial_exposure_usd": 2756.62,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105245",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-04T15:25:00Z",
"trace_id": "e0aebd29-9e3b-26bd-e4c9-5e8c977488c8"
} | {
"account_age_days": 1587,
"account_id": "ACCT-CEA7D93F5172",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_1",
"session_entropy": 0.424
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 212,
"timestamp": "2026-01-04T15:25:00Z",
"transaction_amount_usd": 517921.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.484,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2495828.75,
"financial_exposure_usd": 3061559.11,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108257",
"label": "benign",
"label_confidence": 0.697,
"severity": "medium",
"timestamp": "2026-01-06T17:37:00Z",
"trace_id": "876d8c48-fdee-0e4d-c39a-9c9491670072"
} | {
"account_age_days": 534,
"account_id": "ACCT-3789586995C0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.297
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 332,
"timestamp": "2026-01-06T17:37:00Z",
"transaction_amount_usd": 3997.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1423.38,
"financial_exposure_usd": 3229.64,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101318",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-01T21:58:00Z",
"trace_id": "a9572c17-99ce-92ef-5dd0-399329e0d707"
} | {
"account_age_days": 1762,
"account_id": "ACCT-D85D0DC631F9",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_1",
"session_entropy": 0.813
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 626,
"timestamp": "2026-01-01T21:58:00Z",
"transaction_amount_usd": 10948.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 736033.55,
"financial_exposure_usd": 745876.47,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104848",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-04T08:48:00Z",
"trace_id": "ce370636-8d51-f1ae-0fcd-319efb5f4cf3"
} | {
"account_age_days": 1555,
"account_id": "ACCT-9FAE437C165E",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.153
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 543,
"timestamp": "2026-01-04T08:48:00Z",
"transaction_amount_usd": 1014178.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1387546.52,
"financial_exposure_usd": 1595380.18,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107968",
"label": "benign",
"label_confidence": 0.739,
"severity": "high",
"timestamp": "2026-01-06T12:48:00Z",
"trace_id": "b125f02c-acbd-14b5-089a-860c3cd0da5a"
} | {
"account_age_days": 1619,
"account_id": "ACCT-D385DF5F50DC",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_2",
"session_entropy": 0.818
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 222,
"timestamp": "2026-01-06T12:48:00Z",
"transaction_amount_usd": 7526.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1398.32,
"financial_exposure_usd": 3036.36,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103570",
"label": "fraudulent",
"label_confidence": 0.614,
"severity": "critical",
"timestamp": "2026-01-03T11:30:00Z",
"trace_id": "e739ad12-701f-ca41-7c62-46aba5aea1d0"
} | {
"account_age_days": 88,
"account_id": "ACCT-1BF7ABBFCF4D",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_2",
"session_entropy": 0.908
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 647,
"timestamp": "2026-01-03T11:30:00Z",
"transaction_amount_usd": 1605145.22
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1261288.79,
"financial_exposure_usd": 2463038.42,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101788",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "critical",
"timestamp": "2026-01-02T05:48:00Z",
"trace_id": "c32b80d6-2821-396f-1d94-b65ca475cb49"
} | {
"account_age_days": 353,
"account_id": "ACCT-6142A8783B81",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 338,
"timestamp": "2026-01-02T00:16:00Z",
"transaction_amount_usd": 3.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.74,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 169574.86,
"financial_exposure_usd": 297535.73,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107378",
"label": "benign",
"label_confidence": 0.587,
"severity": "low",
"timestamp": "2026-01-06T02:58:00Z",
"trace_id": "19d29639-c12e-c576-df64-c2ab3cdfe650"
} | {
"account_age_days": 291,
"account_id": "ACCT-A43A4FEF5BFC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.341
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 117,
"timestamp": "2026-01-05T18:51:00Z",
"transaction_amount_usd": 23.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3780.85,
"financial_exposure_usd": 6585.93,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109448",
"label": "benign",
"label_confidence": 0.534,
"severity": "critical",
"timestamp": "2026-01-07T13:28:00Z",
"trace_id": "1bea491d-9e78-4f0d-1687-5e805d16aa2f"
} | {
"account_age_days": 541,
"account_id": "ACCT-456F92C10BD3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.533
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1023,
"timestamp": "2026-01-07T13:28:00Z",
"transaction_amount_usd": 6050.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 782.79,
"financial_exposure_usd": 1783.56,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100436",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "low",
"timestamp": "2026-01-01T07:16:00Z",
"trace_id": "7ed30462-84d6-1ba3-7662-74f1e5907906"
} | {
"account_age_days": 1871,
"account_id": "ACCT-A128D0EBD486",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_1",
"session_entropy": 0.928
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 911,
"timestamp": "2026-01-01T07:16:00Z",
"transaction_amount_usd": 104107.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 160051.55,
"financial_exposure_usd": 344019.39,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109248",
"label": "benign",
"label_confidence": 0.661,
"severity": "low",
"timestamp": "2026-01-07T10:08:00Z",
"trace_id": "ab81331c-b758-650b-dca5-3122e85a3480"
} | {
"account_age_days": 1697,
"account_id": "ACCT-14FDBCA4CE9E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.628
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 371,
"timestamp": "2026-01-07T07:14:00Z",
"transaction_amount_usd": 12.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3374.47,
"financial_exposure_usd": 4357.8,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103300",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-03T07:00:00Z",
"trace_id": "f9883beb-3ae0-d0b2-5860-00fa2644fec0"
} | {
"account_age_days": 561,
"account_id": "ACCT-3E0E80321C4F",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 425,
"timestamp": "2026-01-03T07:00:00Z",
"transaction_amount_usd": 60042.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.907,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 190336.36,
"financial_exposure_usd": 425885.95,
"recoverable_pct": 0.345
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102269",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "high",
"timestamp": "2026-01-02T13:49:00Z",
"trace_id": "765e6b3f-7adb-943c-2bfe-26e036be6296"
} | {
"account_age_days": 1265,
"account_id": "ACCT-488E8E9924EA",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.477
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 373,
"timestamp": "2026-01-02T13:49:00Z",
"transaction_amount_usd": 74023.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 626032.83,
"financial_exposure_usd": 634312.83,
"recoverable_pct": 0.067
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104544",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "low",
"timestamp": "2026-01-04T03:44:00Z",
"trace_id": "91d8da80-eea8-0828-e3fe-96425bd77068"
} | {
"account_age_days": 469,
"account_id": "ACCT-2A43D4CAD6FA",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_3",
"session_entropy": 0.583
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 251,
"timestamp": "2026-01-03T20:01:00Z",
"transaction_amount_usd": 9.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1731696.1,
"financial_exposure_usd": 3111820.48,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108649",
"label": "benign",
"label_confidence": 0.609,
"severity": "high",
"timestamp": "2026-01-07T00:09:00Z",
"trace_id": "97f7df0e-7c04-9b2b-6667-078e6a4153bd"
} | {
"account_age_days": 390,
"account_id": "ACCT-9636A71C7223",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.285
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 504,
"timestamp": "2026-01-07T00:09:00Z",
"transaction_amount_usd": 9026.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2181.42,
"financial_exposure_usd": 3469.03,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107657",
"label": "benign",
"label_confidence": 0.479,
"severity": "low",
"timestamp": "2026-01-06T07:37:00Z",
"trace_id": "6602090f-9e95-a133-bbf5-0e37a5fa06ec"
} | {
"account_age_days": 1746,
"account_id": "ACCT-AAF757D3A83E",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.103
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 268,
"timestamp": "2026-01-05T23:21:00Z",
"transaction_amount_usd": 7.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3276.3,
"financial_exposure_usd": 6004.17,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105993",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "medium",
"timestamp": "2026-01-05T03:53:00Z",
"trace_id": "3f351032-1d4f-49e4-0f99-95e73d7ba019"
} | {
"account_age_days": 465,
"account_id": "ACCT-E955591D6214",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_1",
"session_entropy": 0.501
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 383,
"timestamp": "2026-01-04T22:51:00Z",
"transaction_amount_usd": 2.13
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.921,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2427808.55,
"financial_exposure_usd": 5756447.83,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108449",
"label": "benign",
"label_confidence": 0.466,
"severity": "high",
"timestamp": "2026-01-06T20:49:00Z",
"trace_id": "952dd664-2a2a-455e-e17d-6c8383e5de61"
} | {
"account_age_days": 1758,
"account_id": "ACCT-CBAC84A320F5",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.234
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1193,
"timestamp": "2026-01-06T20:49:00Z",
"transaction_amount_usd": 3176.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1422.37,
"financial_exposure_usd": 3366.98,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105052",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "medium",
"timestamp": "2026-01-04T12:12:00Z",
"trace_id": "855291e7-4477-2663-69f0-ae25457fb57c"
} | {
"account_age_days": 1505,
"account_id": "ACCT-A845232781BD",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_1",
"session_entropy": 0.451
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 972,
"timestamp": "2026-01-04T12:12:00Z",
"transaction_amount_usd": 109762.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.723,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2782352.66,
"financial_exposure_usd": 3451188.03,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100271",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-01T04:31:00Z",
"trace_id": "410cde46-4762-fc23-2c18-9303fd28750f"
} | {
"account_age_days": 1976,
"account_id": "ACCT-9924C5EEFC8A",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_2",
"session_entropy": 0.559
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1168,
"timestamp": "2026-01-01T04:31:00Z",
"transaction_amount_usd": 114683.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 960160.92,
"financial_exposure_usd": 1018484.28,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106164",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-05T06:44:00Z",
"trace_id": "01a40c71-4f3f-7ce2-7bb4-6a3850f720c6"
} | {
"account_age_days": 1135,
"account_id": "ACCT-0F4834B1E20F",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1076,
"timestamp": "2026-01-05T06:44:00Z",
"transaction_amount_usd": 2769695.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 4272321.76,
"financial_exposure_usd": 7221457.5,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107327",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-06T02:07:00Z",
"trace_id": "1250bbfd-c7df-757e-f37b-813358fbf67b"
} | {
"account_age_days": 550,
"account_id": "ACCT-333AB88F85E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.263
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 593,
"timestamp": "2026-01-06T02:07:00Z",
"transaction_amount_usd": 14671.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3538.79,
"financial_exposure_usd": 5962.68,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105985",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-05T03:45:00Z",
"trace_id": "b4ccb09b-51d1-03f9-a35f-b5af2091ac81"
} | {
"account_age_days": 222,
"account_id": "ACCT-E5F7641BA541",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_3",
"session_entropy": 0.811
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 324,
"timestamp": "2026-01-04T22:42:00Z",
"transaction_amount_usd": 2.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2678728.26,
"financial_exposure_usd": 3005157.56,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104714",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-04T06:34:00Z",
"trace_id": "5aa2fcb8-bf36-c4dd-0307-458f864939da"
} | {
"account_age_days": 513,
"account_id": "ACCT-06652F7DB4DC",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_1",
"session_entropy": 0.236
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 350,
"timestamp": "2026-01-04T01:18:00Z",
"transaction_amount_usd": 19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5950062.71,
"financial_exposure_usd": 7299456.69,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106161",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "low",
"timestamp": "2026-01-05T06:41:00Z",
"trace_id": "d4d1af15-42ec-bfa7-f19e-91ef42aa3f1f"
} | {
"account_age_days": 435,
"account_id": "ACCT-BABE63B65B9F",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_2",
"session_entropy": 0.441
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1011,
"timestamp": "2026-01-05T06:41:00Z",
"transaction_amount_usd": 1762935.6
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.902,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 641146.17,
"financial_exposure_usd": 1062740.87,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108936",
"label": "benign",
"label_confidence": 0.487,
"severity": "low",
"timestamp": "2026-01-07T04:56:00Z",
"trace_id": "44c6cb36-0ccb-accd-7bed-bbf7795ecf11"
} | {
"account_age_days": 1695,
"account_id": "ACCT-C3B73EDB7DB2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 377,
"timestamp": "2026-01-07T04:56:00Z",
"transaction_amount_usd": 6900.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 2020.16,
"financial_exposure_usd": 2096.93,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104033",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-03T19:13:00Z",
"trace_id": "43e573d2-498a-b6f8-a68e-4cdc0848dc47"
} | {
"account_age_days": 1926,
"account_id": "ACCT-BA4C0C62B3BC",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_1",
"session_entropy": 0.39
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1014,
"timestamp": "2026-01-03T19:13:00Z",
"transaction_amount_usd": 482936.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.861,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4202105.54,
"financial_exposure_usd": 4400085.86,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101510",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "critical",
"timestamp": "2026-01-02T01:10:00Z",
"trace_id": "57b494b8-3343-690a-abf1-d7b41855f1bc"
} | {
"account_age_days": 879,
"account_id": "ACCT-AAA0F12DBB3F",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_2",
"session_entropy": 0.917
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 321,
"timestamp": "2026-01-01T15:32:00Z",
"transaction_amount_usd": 19.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 807073.18,
"financial_exposure_usd": 914785.81,
"recoverable_pct": 0.243
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107760",
"label": "benign",
"label_confidence": 0.704,
"severity": "low",
"timestamp": "2026-01-06T09:20:00Z",
"trace_id": "169613e2-c15a-33cb-1df8-f4fd0e697f7e"
} | {
"account_age_days": 1922,
"account_id": "ACCT-B1F4E8230DFB",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.694
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1167,
"timestamp": "2026-01-06T09:20:00Z",
"transaction_amount_usd": 14697.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2132.51,
"financial_exposure_usd": 4119.72,
"recoverable_pct": 0.826
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105397",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "low",
"timestamp": "2026-01-04T17:57:00Z",
"trace_id": "a20aadf6-d4e5-bf01-33bc-a54e79922d2c"
} | {
"account_age_days": 494,
"account_id": "ACCT-0AB848EF389A",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_1",
"session_entropy": 0.848
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 825,
"timestamp": "2026-01-04T17:57:00Z",
"transaction_amount_usd": 1820984.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.49,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2409624.57,
"financial_exposure_usd": 4528239.28,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107104",
"label": "benign",
"label_confidence": 0.598,
"severity": "high",
"timestamp": "2026-01-05T22:24:00Z",
"trace_id": "1dec3db6-c7a3-663d-5439-929389be4806"
} | {
"account_age_days": 757,
"account_id": "ACCT-897B67A3CE1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.331
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 213,
"timestamp": "2026-01-05T22:24:00Z",
"transaction_amount_usd": 4059.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1086.65,
"financial_exposure_usd": 1368.57,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104107",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-03T20:27:00Z",
"trace_id": "4d503621-f09f-478a-4c6b-e97794f2e3d3"
} | {
"account_age_days": 1365,
"account_id": "ACCT-4FBC240E45C0",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_1",
"session_entropy": 0.384
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 322,
"timestamp": "2026-01-03T08:11:00Z",
"transaction_amount_usd": 3.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.477,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4183589.02,
"financial_exposure_usd": 4389605.99,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105520",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-04T20:00:00Z",
"trace_id": "d1799d93-5c08-f15e-4170-9e9e30ca7648"
} | {
"account_age_days": 1576,
"account_id": "ACCT-BB1D4A2E49A0",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.876
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 382,
"timestamp": "2026-01-04T20:00:00Z",
"transaction_amount_usd": 1860737.54
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.945,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7764164.74,
"financial_exposure_usd": 8122424.48,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101814",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "critical",
"timestamp": "2026-01-02T06:14:00Z",
"trace_id": "63beae04-3f70-e62c-d370-d9eddd2e0de4"
} | {
"account_age_days": 1606,
"account_id": "ACCT-31B0E0CB18B2",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1148,
"timestamp": "2026-01-02T06:14:00Z",
"transaction_amount_usd": 38865.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.662,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 908131.74,
"financial_exposure_usd": 948196.21,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106624",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-05T14:24:00Z",
"trace_id": "f8c676e8-11ed-66e0-932b-7b93d2c33172"
} | {
"account_age_days": 351,
"account_id": "ACCT-40CA0B2B94B9",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_2",
"session_entropy": 0.682
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 219,
"timestamp": "2026-01-05T09:58:00Z",
"transaction_amount_usd": 21.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.462,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3931533.3,
"financial_exposure_usd": 6198827.51,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103539",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-03T10:59:00Z",
"trace_id": "3425596f-e63b-2a85-7b16-5a072e137d87"
} | {
"account_age_days": 476,
"account_id": "ACCT-42B874ED89C2",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_2",
"session_entropy": 0.139
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 373,
"timestamp": "2026-01-03T01:46:00Z",
"transaction_amount_usd": 16.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2136441.73,
"financial_exposure_usd": 2303475.88,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109369",
"label": "benign",
"label_confidence": 0.593,
"severity": "low",
"timestamp": "2026-01-07T12:09:00Z",
"trace_id": "56477067-5722-6de9-088e-27c0516129b2"
} | {
"account_age_days": 540,
"account_id": "ACCT-4097F4694A0A",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.844
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 319,
"timestamp": "2026-01-07T12:09:00Z",
"transaction_amount_usd": 13497.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2129.15,
"financial_exposure_usd": 4461.94,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105608",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-04T21:28:00Z",
"trace_id": "a15c63d7-9e5a-dd45-163b-bdc52a0bcec8"
} | {
"account_age_days": 314,
"account_id": "ACCT-3240B060E870",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_1",
"session_entropy": 0.116
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 809,
"timestamp": "2026-01-04T21:28:00Z",
"transaction_amount_usd": 2079913.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.773,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1525562.62,
"financial_exposure_usd": 3232411.61,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105074",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "critical",
"timestamp": "2026-01-04T12:34:00Z",
"trace_id": "1f4e1f21-25cc-c392-0bb5-c03bdd02dd55"
} | {
"account_age_days": 148,
"account_id": "ACCT-A63CAE25728C",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.28
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1052,
"timestamp": "2026-01-04T12:34:00Z",
"transaction_amount_usd": 2577855.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.555,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 837887.22,
"financial_exposure_usd": 1055155.65,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106302",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-05T09:02:00Z",
"trace_id": "a2af6ade-99a8-7b38-da89-c0bed281b349"
} | {
"account_age_days": 530,
"account_id": "ACCT-E4C4EEF64C47",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_1",
"session_entropy": 0.298
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 938,
"timestamp": "2026-01-05T09:02:00Z",
"transaction_amount_usd": 1587913.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4191991.7,
"financial_exposure_usd": 4726169.91,
"recoverable_pct": 0.483
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107374",
"label": "benign",
"label_confidence": 0.484,
"severity": "high",
"timestamp": "2026-01-06T02:54:00Z",
"trace_id": "8ad786af-a608-187b-f803-a97d9bbcb717"
} | {
"account_age_days": 1317,
"account_id": "ACCT-CA667D12A1AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.634
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 232,
"timestamp": "2026-01-05T18:48:00Z",
"transaction_amount_usd": 16.65
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 691.97,
"financial_exposure_usd": 1095.84,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101599",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "low",
"timestamp": "2026-01-02T02:39:00Z",
"trace_id": "b134ff5a-208d-534f-2488-8cf2e81ae898"
} | {
"account_age_days": 345,
"account_id": "ACCT-2346B4B8D1C2",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_1",
"session_entropy": 0.664
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 177,
"timestamp": "2026-01-02T02:39:00Z",
"transaction_amount_usd": 91871.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 512240.8,
"financial_exposure_usd": 776318.45,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105935",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "medium",
"timestamp": "2026-01-05T02:55:00Z",
"trace_id": "3f17ba48-5ae4-2677-9826-271e8cc0712f"
} | {
"account_age_days": 929,
"account_id": "ACCT-159A00473285",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_1",
"session_entropy": 0.106
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 450,
"timestamp": "2026-01-05T02:55:00Z",
"transaction_amount_usd": 1944593.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3366039.59,
"financial_exposure_usd": 4391446.13,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102497",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-02T17:37:00Z",
"trace_id": "5ed8d086-53f4-0994-a184-6d1e0ef43a27"
} | {
"account_age_days": 505,
"account_id": "ACCT-6B5D98B047F1",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_3",
"session_entropy": 0.211
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1136,
"timestamp": "2026-01-02T17:37:00Z",
"transaction_amount_usd": 39297.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.865,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 324510.16,
"financial_exposure_usd": 370517.17,
"recoverable_pct": 0.17
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108035",
"label": "benign",
"label_confidence": 0.453,
"severity": "medium",
"timestamp": "2026-01-06T13:55:00Z",
"trace_id": "85a6bad3-860a-2404-2b2c-3ad561bce1c4"
} | {
"account_age_days": 643,
"account_id": "ACCT-B4ADC2A19063",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.59
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1097,
"timestamp": "2026-01-06T13:55:00Z",
"transaction_amount_usd": 8664.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2113.59,
"financial_exposure_usd": 4312.08,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106949",
"label": "benign",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-05T19:49:00Z",
"trace_id": "f911561c-4cff-e167-f0a7-9928a14d23a9"
} | {
"account_age_days": 373,
"account_id": "ACCT-160720EA73EF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.464
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 877,
"timestamp": "2026-01-05T19:49:00Z",
"transaction_amount_usd": 2766.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1399.75,
"financial_exposure_usd": 2151.74,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102922",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-03T00:42:00Z",
"trace_id": "932e3bb0-138a-baf2-4774-4b93d988349a"
} | {
"account_age_days": 409,
"account_id": "ACCT-49C9D95BF560",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 288,
"timestamp": "2026-01-02T15:49:00Z",
"transaction_amount_usd": 3.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 446357.16,
"financial_exposure_usd": 1035909.85,
"recoverable_pct": 0.083
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.