schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104735",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "high",
"timestamp": "2026-01-04T06:55:00Z",
"trace_id": "93914915-115f-e5eb-170a-c8b4ed012953"
} | {
"account_age_days": 32,
"account_id": "ACCT-A663E1954F11",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 539,
"timestamp": "2026-01-04T06:55:00Z",
"transaction_amount_usd": 925286.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3814924.11,
"financial_exposure_usd": 5248896.16,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100602",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "critical",
"timestamp": "2026-01-01T10:02:00Z",
"trace_id": "986b4a55-a707-8710-3957-e42db0465056"
} | {
"account_age_days": 1771,
"account_id": "ACCT-A76EE5DDBDAB",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_1",
"session_entropy": 0.409
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 227,
"timestamp": "2026-01-01T10:02:00Z",
"transaction_amount_usd": 101015.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 479215.78,
"financial_exposure_usd": 628388.05,
"recoverable_pct": 0.31
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106549",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "low",
"timestamp": "2026-01-05T13:09:00Z",
"trace_id": "93fdf383-c376-87d6-3f28-738c28a8559a"
} | {
"account_age_days": 376,
"account_id": "ACCT-2B908AA0777F",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 523,
"timestamp": "2026-01-05T13:09:00Z",
"transaction_amount_usd": 326846.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.676,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1944185.65,
"financial_exposure_usd": 4833511.29,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109745",
"label": "benign",
"label_confidence": 0.526,
"severity": "high",
"timestamp": "2026-01-07T18:25:00Z",
"trace_id": "18555448-4c6a-ed2c-721b-ee7cbc580a18"
} | {
"account_age_days": 1904,
"account_id": "ACCT-70F4C350BC7B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.531
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 955,
"timestamp": "2026-01-07T18:25:00Z",
"transaction_amount_usd": 4998.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1462.53,
"financial_exposure_usd": 2201.58,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104355",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "critical",
"timestamp": "2026-01-04T00:35:00Z",
"trace_id": "ba8d8d08-cf1d-0436-7743-2599ed21dfac"
} | {
"account_age_days": 1655,
"account_id": "ACCT-40DB1E708C44",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_1",
"session_entropy": 0.264
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 200,
"timestamp": "2026-01-03T20:27:00Z",
"transaction_amount_usd": 12.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.591,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7938997.66,
"financial_exposure_usd": 8231756.32,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104556",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-04T03:56:00Z",
"trace_id": "b422b4da-1141-05a8-f0d2-71900d175596"
} | {
"account_age_days": 1786,
"account_id": "ACCT-E8E7D58A61B2",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 401,
"timestamp": "2026-01-04T03:56:00Z",
"transaction_amount_usd": 1511023.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.467,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5467944.31,
"financial_exposure_usd": 6602652.94,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103041",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-03T02:41:00Z",
"trace_id": "9f4c1048-9ecc-3377-ae23-108c9522bfdc"
} | {
"account_age_days": 1275,
"account_id": "ACCT-E7E215C2025F",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1021,
"timestamp": "2026-01-03T02:41:00Z",
"transaction_amount_usd": 32674.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.756,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 789340.52,
"financial_exposure_usd": 1007813.98,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102992",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "low",
"timestamp": "2026-01-03T01:52:00Z",
"trace_id": "a24b0cd5-9d0d-4453-6f0d-bfbacdd49648"
} | {
"account_age_days": 90,
"account_id": "ACCT-0C2BB30AFF6B",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_1",
"session_entropy": 0.876
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 155,
"timestamp": "2026-01-02T18:28:00Z",
"transaction_amount_usd": 5.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 577545.62,
"financial_exposure_usd": 700553.14,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103529",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-03T10:49:00Z",
"trace_id": "9f9d3564-8770-70b2-860b-6a2bcc15df64"
} | {
"account_age_days": 249,
"account_id": "ACCT-1EDA24FF15F9",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_3",
"session_entropy": 0.37
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 344,
"timestamp": "2026-01-03T10:49:00Z",
"transaction_amount_usd": 461575.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2662269.87,
"financial_exposure_usd": 3851356.05,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105670",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-04T22:30:00Z",
"trace_id": "3ed2cf7b-235a-1e6d-8f84-25acbbd6bd14"
} | {
"account_age_days": 846,
"account_id": "ACCT-37A1867312EA",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_3",
"session_entropy": 0.553
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 277,
"timestamp": "2026-01-04T13:50:00Z",
"transaction_amount_usd": 1.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.355,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3272649.92,
"financial_exposure_usd": 5087218.8,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107504",
"label": "benign",
"label_confidence": 0.503,
"severity": "medium",
"timestamp": "2026-01-06T05:04:00Z",
"trace_id": "e1fdc6e3-b178-c0ff-0fac-2f8703f6d9cf"
} | {
"account_age_days": 1051,
"account_id": "ACCT-1F598C0775D4",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_1",
"session_entropy": 0.795
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 953,
"timestamp": "2026-01-06T05:04:00Z",
"transaction_amount_usd": 733.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1756.36,
"financial_exposure_usd": 2930.92,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105119",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-04T13:19:00Z",
"trace_id": "218e1df1-0542-a621-9fd5-5de00852b114"
} | {
"account_age_days": 1374,
"account_id": "ACCT-33CA9AFE01C0",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_3",
"session_entropy": 0.368
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 353,
"timestamp": "2026-01-04T11:37:00Z",
"transaction_amount_usd": 1.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3604648.94,
"financial_exposure_usd": 4579772.86,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104131",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "low",
"timestamp": "2026-01-03T20:51:00Z",
"trace_id": "e52c2dc3-1b42-90dc-80e0-27079204aa5d"
} | {
"account_age_days": 1467,
"account_id": "ACCT-5CD5F05B4182",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_3",
"session_entropy": 0.276
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 264,
"timestamp": "2026-01-03T15:41:00Z",
"transaction_amount_usd": 2.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1382189.72,
"financial_exposure_usd": 1396612.53,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101304",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-01T21:44:00Z",
"trace_id": "46c6f590-9c12-0321-4a5c-5a0f6f1bbbf7"
} | {
"account_age_days": 205,
"account_id": "ACCT-96F3006C6987",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_3",
"session_entropy": 0.61
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 175,
"timestamp": "2026-01-01T18:02:00Z",
"transaction_amount_usd": 1.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.883,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 203934.68,
"financial_exposure_usd": 211485.24,
"recoverable_pct": 0.012
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105345",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "medium",
"timestamp": "2026-01-04T17:05:00Z",
"trace_id": "d2e4ffed-cd09-28a6-8c1e-62c555fa2ccd"
} | {
"account_age_days": 1725,
"account_id": "ACCT-3EB98E955085",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_1",
"session_entropy": 0.181
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 417,
"timestamp": "2026-01-04T17:05:00Z",
"transaction_amount_usd": 1934638.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.617,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3548323.9,
"financial_exposure_usd": 6265609.38,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109937",
"label": "benign",
"label_confidence": 0.539,
"severity": "low",
"timestamp": "2026-01-07T21:37:00Z",
"trace_id": "f6f24f47-742b-e785-6e08-91e78119a46b"
} | {
"account_age_days": 818,
"account_id": "ACCT-AC2E379E6079",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.541
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 524,
"timestamp": "2026-01-07T21:37:00Z",
"transaction_amount_usd": 4785.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1195.54,
"financial_exposure_usd": 1854.46,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109954",
"label": "benign",
"label_confidence": 0.485,
"severity": "medium",
"timestamp": "2026-01-07T21:54:00Z",
"trace_id": "b71172fa-03a9-308a-3b92-5c843681ce34"
} | {
"account_age_days": 242,
"account_id": "ACCT-59D0A08D09B2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.279
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 651,
"timestamp": "2026-01-07T21:54:00Z",
"transaction_amount_usd": 2146.57
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 5779.08,
"financial_exposure_usd": 8246.83,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103665",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-03T13:05:00Z",
"trace_id": "df3f2040-d4c3-07e4-c6d1-7cd5ca46cf44"
} | {
"account_age_days": 1899,
"account_id": "ACCT-E342A9FB5E99",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.634
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 89,
"timestamp": "2026-01-03T03:00:00Z",
"transaction_amount_usd": 22.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1536616.27,
"financial_exposure_usd": 1836023.1,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103046",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "critical",
"timestamp": "2026-01-03T02:46:00Z",
"trace_id": "5ad3fe3d-625b-6ad2-e182-c3bb088b29e3"
} | {
"account_age_days": 1895,
"account_id": "ACCT-910154D2A3FB",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_3",
"session_entropy": 0.151
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 495,
"timestamp": "2026-01-03T02:46:00Z",
"transaction_amount_usd": 34953.9
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 275075.44,
"financial_exposure_usd": 309070.2,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105455",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "medium",
"timestamp": "2026-01-04T18:55:00Z",
"trace_id": "e92e4fbb-b6a4-f067-72d5-4d1e270e83df"
} | {
"account_age_days": 1391,
"account_id": "ACCT-B8295552D04E",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 434,
"timestamp": "2026-01-04T18:55:00Z",
"transaction_amount_usd": 1711400.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.838,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 708100.47,
"financial_exposure_usd": 967166.32,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109165",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-07T08:45:00Z",
"trace_id": "35e51a11-efca-dc41-4aa8-0f4011f47d1d"
} | {
"account_age_days": 587,
"account_id": "ACCT-87041A9F434C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.218
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1007,
"timestamp": "2026-01-07T08:45:00Z",
"transaction_amount_usd": 13857.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5462.71,
"financial_exposure_usd": 6332.88,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106792",
"label": "benign",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-05T17:12:00Z",
"trace_id": "66fe261e-3d0c-5161-3685-92e080816db8"
} | {
"account_age_days": 1168,
"account_id": "ACCT-1FFEBA0F5284",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.549
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 713,
"timestamp": "2026-01-05T17:12:00Z",
"transaction_amount_usd": 5378.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1789.8,
"financial_exposure_usd": 2449.59,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109828",
"label": "benign",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-07T19:48:00Z",
"trace_id": "ab9b4c6f-ade8-1be2-2bf2-24846fc2a751"
} | {
"account_age_days": 783,
"account_id": "ACCT-65D20FE63BA5",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.336
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1148,
"timestamp": "2026-01-07T19:48:00Z",
"transaction_amount_usd": 14480.89
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 692.19,
"financial_exposure_usd": 1723.04,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104604",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-04T04:44:00Z",
"trace_id": "05da884b-dd59-c122-1e91-eef47b809bfb"
} | {
"account_age_days": 1913,
"account_id": "ACCT-7B5515ABBC76",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.473
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1104,
"timestamp": "2026-01-04T04:44:00Z",
"transaction_amount_usd": 2323141.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.554,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2944807.48,
"financial_exposure_usd": 6330419.25,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100302",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-01T05:02:00Z",
"trace_id": "c6e79a7b-f712-e813-4e01-009d8d59b363"
} | {
"account_age_days": 1501,
"account_id": "ACCT-FD9CED090442",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_1",
"session_entropy": 0.709
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 182,
"timestamp": "2026-01-01T02:13:00Z",
"transaction_amount_usd": 12.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.576,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 616487.5,
"financial_exposure_usd": 855852.32,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103515",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-03T10:35:00Z",
"trace_id": "1341e93d-d482-e93f-c542-c61382bddcfa"
} | {
"account_age_days": 1296,
"account_id": "ACCT-4FBE18E80AED",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.649
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 140,
"timestamp": "2026-01-03T00:03:00Z",
"transaction_amount_usd": 0.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.709,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4284107.56,
"financial_exposure_usd": 4966557.9,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108259",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-06T17:39:00Z",
"trace_id": "b7044d2c-9007-ba0d-a102-31073f07d689"
} | {
"account_age_days": 132,
"account_id": "ACCT-65F567267DB6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.423
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 277,
"timestamp": "2026-01-06T17:39:00Z",
"transaction_amount_usd": 7787.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3067.51,
"financial_exposure_usd": 5494.47,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105804",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "critical",
"timestamp": "2026-01-05T00:44:00Z",
"trace_id": "f5df751f-6cbf-e342-0f98-aedc7e25d06d"
} | {
"account_age_days": 1623,
"account_id": "ACCT-CFE819968ECB",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.629
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 510,
"timestamp": "2026-01-05T00:44:00Z",
"transaction_amount_usd": 1608714.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.693,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2057372.77,
"financial_exposure_usd": 2423988.04,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102235",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-02T13:15:00Z",
"trace_id": "f5afbaff-5530-20e8-9a0a-58edef5955b9"
} | {
"account_age_days": 291,
"account_id": "ACCT-8A325CB67EC3",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_2",
"session_entropy": 0.751
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1184,
"timestamp": "2026-01-02T13:15:00Z",
"transaction_amount_usd": 16170.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 647028.36,
"financial_exposure_usd": 863727.97,
"recoverable_pct": 0.154
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105372",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-04T17:32:00Z",
"trace_id": "0be34740-b45d-7fa1-bac2-db7119a5b0ed"
} | {
"account_age_days": 817,
"account_id": "ACCT-683A6AA3402E",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.62
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 866,
"timestamp": "2026-01-04T17:32:00Z",
"transaction_amount_usd": 355036.46
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4417456.28,
"financial_exposure_usd": 4510169.6,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103403",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-03T08:43:00Z",
"trace_id": "ba02a0f4-a69e-4cf5-fadc-dd88820d020f"
} | {
"account_age_days": 1261,
"account_id": "ACCT-03244A6ADCAA",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.724
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 589,
"timestamp": "2026-01-03T08:43:00Z",
"transaction_amount_usd": 1621395.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.512,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2162739.72,
"financial_exposure_usd": 4438625.84,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108353",
"label": "benign",
"label_confidence": 0.749,
"severity": "medium",
"timestamp": "2026-01-06T19:13:00Z",
"trace_id": "21d093e0-5d7e-9d78-5970-a8ec08d987ff"
} | {
"account_age_days": 168,
"account_id": "ACCT-4D6F01A99BEE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.895
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 757,
"timestamp": "2026-01-06T19:13:00Z",
"transaction_amount_usd": 3048.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1456.87,
"financial_exposure_usd": 2349.68,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103938",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "low",
"timestamp": "2026-01-03T17:38:00Z",
"trace_id": "0dd5c9ae-0b72-94da-f76a-b95475203730"
} | {
"account_age_days": 501,
"account_id": "ACCT-AA501DF4222A",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.659
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 588,
"timestamp": "2026-01-03T17:38:00Z",
"transaction_amount_usd": 135385.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2722791.08,
"financial_exposure_usd": 3281195.37,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100620",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-01T10:20:00Z",
"trace_id": "1055a10d-01ff-4957-1afb-be0b30b797cb"
} | {
"account_age_days": 1907,
"account_id": "ACCT-DD1E46087EF9",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 318,
"timestamp": "2026-01-01T01:11:00Z",
"transaction_amount_usd": 14.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.766,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 572628.68,
"financial_exposure_usd": 1150021.22,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105947",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "low",
"timestamp": "2026-01-05T03:07:00Z",
"trace_id": "5da4735b-737e-5b95-1f0b-79cc9defe52d"
} | {
"account_age_days": 1408,
"account_id": "ACCT-179A352C23CB",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_1",
"session_entropy": 0.229
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 221,
"timestamp": "2026-01-04T17:32:00Z",
"transaction_amount_usd": 11.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2989814.33,
"financial_exposure_usd": 4141699.62,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100192",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "medium",
"timestamp": "2026-01-01T03:12:00Z",
"trace_id": "72624be8-0c99-4ec1-6162-faf83565c8a2"
} | {
"account_age_days": 1224,
"account_id": "ACCT-C3254BC37845",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.133
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 438,
"timestamp": "2026-01-01T03:12:00Z",
"transaction_amount_usd": 25073.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 675706.02,
"financial_exposure_usd": 755865.2,
"recoverable_pct": 0.356
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104437",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "low",
"timestamp": "2026-01-04T01:57:00Z",
"trace_id": "d7e739ce-d6c6-a822-9e7b-2ca15f82f309"
} | {
"account_age_days": 426,
"account_id": "ACCT-E72415172CFF",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_3",
"session_entropy": 0.494
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 214,
"timestamp": "2026-01-03T18:25:00Z",
"transaction_amount_usd": 5.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3107895.45,
"financial_exposure_usd": 4891372.1,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100480",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-01T08:00:00Z",
"trace_id": "2f22c9f6-95c7-83cb-51a5-04c3c052aeb5"
} | {
"account_age_days": 1139,
"account_id": "ACCT-A88F311F67C7",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_1",
"session_entropy": 0.518
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 412,
"timestamp": "2026-01-01T08:00:00Z",
"transaction_amount_usd": 14546.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.379,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 560869,
"financial_exposure_usd": 864559.81,
"recoverable_pct": 0.277
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100774",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-01T12:54:00Z",
"trace_id": "304e6c65-a0e5-f6d8-69be-9ddea4ab86aa"
} | {
"account_age_days": 1799,
"account_id": "ACCT-957E3EE9CA5D",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_2",
"session_entropy": 0.349
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 307,
"timestamp": "2026-01-01T02:42:00Z",
"transaction_amount_usd": 23.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 780259.19,
"financial_exposure_usd": 885977.18,
"recoverable_pct": 0.138
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103194",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "medium",
"timestamp": "2026-01-03T05:14:00Z",
"trace_id": "db29da9c-2996-210e-8c12-ed85d3645112"
} | {
"account_age_days": 1547,
"account_id": "ACCT-DE25CBCB2C3F",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_3",
"session_entropy": 0.182
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 844,
"timestamp": "2026-01-03T05:14:00Z",
"transaction_amount_usd": 73585.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 494619.01,
"financial_exposure_usd": 771353.91,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105207",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "high",
"timestamp": "2026-01-04T14:47:00Z",
"trace_id": "6cb08f76-4e21-b39f-daa4-a9faa56ccd42"
} | {
"account_age_days": 1523,
"account_id": "ACCT-8C8D96EADBEC",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_1",
"session_entropy": 0.931
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 184,
"timestamp": "2026-01-04T06:08:00Z",
"transaction_amount_usd": 20.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2875172.68,
"financial_exposure_usd": 5190221.29,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102345",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-02T15:05:00Z",
"trace_id": "bbf7c7b2-b156-d974-45e8-f8301c1d37c1"
} | {
"account_age_days": 97,
"account_id": "ACCT-FA21556AFF5E",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_1",
"session_entropy": 0.515
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 789,
"timestamp": "2026-01-02T15:05:00Z",
"transaction_amount_usd": 59615.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.475,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.26
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100629",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-01T10:29:00Z",
"trace_id": "7e2e5641-7cd7-aea8-3af9-40f50e9c4a6b"
} | {
"account_age_days": 1645,
"account_id": "ACCT-9180B5E01945",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_2",
"session_entropy": 0.614
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 188,
"timestamp": "2025-12-31T22:42:00Z",
"transaction_amount_usd": 5.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 446080.11,
"financial_exposure_usd": 787282.26,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108700",
"label": "benign",
"label_confidence": 0.634,
"severity": "low",
"timestamp": "2026-01-07T01:00:00Z",
"trace_id": "11bb77ca-d3fd-c611-93df-774aa75850fa"
} | {
"account_age_days": 1261,
"account_id": "ACCT-6763731AE815",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.656
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 514,
"timestamp": "2026-01-07T01:00:00Z",
"transaction_amount_usd": 9891.09
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1621.03,
"financial_exposure_usd": 2747.74,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105675",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-04T22:35:00Z",
"trace_id": "a4dba566-4b3c-f5e2-6fe1-4001b496fedf"
} | {
"account_age_days": 1575,
"account_id": "ACCT-AC4B3E7203BB",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.175
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 203,
"timestamp": "2026-01-04T16:51:00Z",
"transaction_amount_usd": 12.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.372,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3935418.27,
"financial_exposure_usd": 6219215,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100636",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "high",
"timestamp": "2026-01-01T10:36:00Z",
"trace_id": "a515a2c2-1e34-2c86-1e29-a57b9cf8e2e0"
} | {
"account_age_days": 98,
"account_id": "ACCT-66A9F9FA131A",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.235
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 134,
"timestamp": "2025-12-31T22:02:00Z",
"transaction_amount_usd": 0.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 934654.74,
"financial_exposure_usd": 1403156.75,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103718",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "medium",
"timestamp": "2026-01-03T13:58:00Z",
"trace_id": "641c9862-6b4f-1429-b406-73e0a396fe35"
} | {
"account_age_days": 1982,
"account_id": "ACCT-E71FFC5DEF0B",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_3",
"session_entropy": 0.888
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 748,
"timestamp": "2026-01-03T13:58:00Z",
"transaction_amount_usd": 2079971.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2930049.42,
"financial_exposure_usd": 4990153.15,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108190",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-06T16:30:00Z",
"trace_id": "cff015f4-f406-4a55-c60c-4e963b76f81e"
} | {
"account_age_days": 926,
"account_id": "ACCT-98C01A88FACD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.472
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1070,
"timestamp": "2026-01-06T16:30:00Z",
"transaction_amount_usd": 4830.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 717.06,
"financial_exposure_usd": 1729.95,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104527",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-04T03:27:00Z",
"trace_id": "2d00a8e6-2527-8203-cabf-fa0542d1157b"
} | {
"account_age_days": 1037,
"account_id": "ACCT-737044C887AC",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 724,
"timestamp": "2026-01-04T03:27:00Z",
"transaction_amount_usd": 2133594.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.722,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4054273.21,
"financial_exposure_usd": 6716456.35,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104965",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "low",
"timestamp": "2026-01-04T10:45:00Z",
"trace_id": "99e00ad5-11da-ebe7-2c4c-fb735fbdf142"
} | {
"account_age_days": 1950,
"account_id": "ACCT-2F89B1AB433B",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.935
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 211,
"timestamp": "2026-01-04T00:48:00Z",
"transaction_amount_usd": 2.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.881,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1040734.63,
"financial_exposure_usd": 2169664.27,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108504",
"label": "benign",
"label_confidence": 0.708,
"severity": "medium",
"timestamp": "2026-01-06T21:44:00Z",
"trace_id": "d643f995-1c47-2639-0e6d-e9e141455303"
} | {
"account_age_days": 850,
"account_id": "ACCT-5CDFC19439AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.781
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 519,
"timestamp": "2026-01-06T21:44:00Z",
"transaction_amount_usd": 8517.6
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4896.21,
"financial_exposure_usd": 4907.14,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103699",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-03T13:39:00Z",
"trace_id": "7f7c2d67-8b1a-2796-1d8d-c074516c4c0e"
} | {
"account_age_days": 163,
"account_id": "ACCT-E173978C378C",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.115
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 463,
"timestamp": "2026-01-03T13:39:00Z",
"transaction_amount_usd": 2460591.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.708,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1439735.81,
"financial_exposure_usd": 2302129.56,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102909",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "critical",
"timestamp": "2026-01-03T00:29:00Z",
"trace_id": "73fbeab5-988b-38ef-739e-185af3ef7a45"
} | {
"account_age_days": 1900,
"account_id": "ACCT-7B393CD5A60D",
"baseline_risk_score": 0.477,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1195,
"timestamp": "2026-01-03T00:29:00Z",
"transaction_amount_usd": 111467.56
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.524,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 754843.66,
"financial_exposure_usd": 1354283.91,
"recoverable_pct": 0.185
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105222",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "low",
"timestamp": "2026-01-04T15:02:00Z",
"trace_id": "b7aebc60-0847-20ac-b84e-fe751fc8a143"
} | {
"account_age_days": 437,
"account_id": "ACCT-61A44F10D1DA",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_3",
"session_entropy": 0.453
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 556,
"timestamp": "2026-01-04T15:02:00Z",
"transaction_amount_usd": 1939168.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.426,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6932821.12,
"financial_exposure_usd": 7513089.56,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108993",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-07T05:53:00Z",
"trace_id": "e2b87ed1-ba91-b94b-b0b4-d41d54a1e345"
} | {
"account_age_days": 468,
"account_id": "ACCT-C2B83A644139",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.715
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 178,
"timestamp": "2026-01-07T05:53:00Z",
"transaction_amount_usd": 7366.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1888.1,
"financial_exposure_usd": 4360.37,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109907",
"label": "benign",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-07T21:07:00Z",
"trace_id": "8b601dc3-938d-adc9-1ead-9eeb79a521a5"
} | {
"account_age_days": 442,
"account_id": "ACCT-5ABA0B47E134",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.358
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1123,
"timestamp": "2026-01-07T21:07:00Z",
"transaction_amount_usd": 4346.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 859.68,
"financial_exposure_usd": 1038.27,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105417",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "medium",
"timestamp": "2026-01-04T18:17:00Z",
"trace_id": "fd1a84a2-e7b0-75ab-a56e-d5e9125875d1"
} | {
"account_age_days": 1982,
"account_id": "ACCT-79F9B5FCAAE7",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_2",
"session_entropy": 0.429
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 374,
"timestamp": "2026-01-04T18:17:00Z",
"transaction_amount_usd": 999094
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.381,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4002205.99,
"financial_exposure_usd": 6936015.05,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102075",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "critical",
"timestamp": "2026-01-02T10:35:00Z",
"trace_id": "7c46c840-afe3-91b7-398b-8c245c1d67d2"
} | {
"account_age_days": 1652,
"account_id": "ACCT-53AE23BE92CD",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 415,
"timestamp": "2026-01-02T10:35:00Z",
"transaction_amount_usd": 74208.44
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.75,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 297572.03,
"financial_exposure_usd": 598608.35,
"recoverable_pct": 0.384
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104137",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-03T20:57:00Z",
"trace_id": "7ebe6139-c422-71a1-1641-28d989bddeca"
} | {
"account_age_days": 1007,
"account_id": "ACCT-15E2F976E2B3",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_1",
"session_entropy": 0.487
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 477,
"timestamp": "2026-01-03T20:57:00Z",
"transaction_amount_usd": 997789.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.441,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4864839.78,
"financial_exposure_usd": 7668702.16,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104857",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-04T08:57:00Z",
"trace_id": "db91f12b-0b5d-d3bd-2c3e-6bb9a5154843"
} | {
"account_age_days": 1569,
"account_id": "ACCT-EFB5323756E5",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.104
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 943,
"timestamp": "2026-01-04T08:57:00Z",
"transaction_amount_usd": 2137146.3
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.762,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2813529,
"financial_exposure_usd": 5949456.05,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108894",
"label": "benign",
"label_confidence": 0.475,
"severity": "low",
"timestamp": "2026-01-07T04:14:00Z",
"trace_id": "579722d2-d292-7f6a-94ef-840e2a8a256c"
} | {
"account_age_days": 1700,
"account_id": "ACCT-4044EE95D851",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.715
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 845,
"timestamp": "2026-01-07T04:14:00Z",
"transaction_amount_usd": 4863.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.684,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 601.85,
"financial_exposure_usd": 1056.64,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104445",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-04T02:05:00Z",
"trace_id": "1c2be39c-48bd-f815-7ba5-7da61bc9f949"
} | {
"account_age_days": 582,
"account_id": "ACCT-C204925456E3",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_2",
"session_entropy": 0.405
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 485,
"timestamp": "2026-01-04T02:05:00Z",
"transaction_amount_usd": 2214722.09
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1065801.37,
"financial_exposure_usd": 1507904.76,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109873",
"label": "benign",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-07T20:33:00Z",
"trace_id": "33bc1291-2107-f601-25bf-db19c5fdd257"
} | {
"account_age_days": 1024,
"account_id": "ACCT-C9CB9A051DC6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.826
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1136,
"timestamp": "2026-01-07T20:33:00Z",
"transaction_amount_usd": 10138.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1277.96,
"financial_exposure_usd": 1415,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107894",
"label": "benign",
"label_confidence": 0.458,
"severity": "low",
"timestamp": "2026-01-06T11:34:00Z",
"trace_id": "96959f6f-954c-6caf-9d30-1d6b88c79c21"
} | {
"account_age_days": 239,
"account_id": "ACCT-903F13330B36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.68
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 206,
"timestamp": "2026-01-06T05:09:00Z",
"transaction_amount_usd": 16.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1269.33,
"financial_exposure_usd": 3123.91,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108905",
"label": "benign",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-07T04:25:00Z",
"trace_id": "b9a2507b-ab14-a27a-e309-414039ae5c92"
} | {
"account_age_days": 104,
"account_id": "ACCT-7515D38D0919",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_3",
"session_entropy": 0.236
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 347,
"timestamp": "2026-01-07T04:25:00Z",
"transaction_amount_usd": 13552.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3488.85,
"financial_exposure_usd": 4129.92,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102495",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-02T17:35:00Z",
"trace_id": "c3fc5d86-c9ef-18c1-ed13-85f6f4273a5a"
} | {
"account_age_days": 1104,
"account_id": "ACCT-23E45A1D151B",
"baseline_risk_score": 0.56,
"kyc_tier": "tier_1",
"session_entropy": 0.317
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 856,
"timestamp": "2026-01-02T17:35:00Z",
"transaction_amount_usd": 16775.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 262914.36,
"financial_exposure_usd": 369395.86,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100232",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-01T03:52:00Z",
"trace_id": "c9fbe7f1-5b33-cb3f-1551-0ef5c91654e6"
} | {
"account_age_days": 241,
"account_id": "ACCT-85406ADB983A",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_3",
"session_entropy": 0.577
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 256,
"timestamp": "2026-01-01T03:52:00Z",
"transaction_amount_usd": 46851.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 481478.75,
"financial_exposure_usd": 1020402.42,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107635",
"label": "benign",
"label_confidence": 0.501,
"severity": "low",
"timestamp": "2026-01-06T07:15:00Z",
"trace_id": "36a93b9e-1cb9-d196-8bec-b7282ea8a673"
} | {
"account_age_days": 1452,
"account_id": "ACCT-EE59D0AE4BF4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.261
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 950,
"timestamp": "2026-01-06T07:15:00Z",
"transaction_amount_usd": 14061.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2031.3,
"financial_exposure_usd": 3896.29,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104394",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "low",
"timestamp": "2026-01-04T01:14:00Z",
"trace_id": "9bc4146a-daca-3525-f24d-2afeacbd2793"
} | {
"account_age_days": 993,
"account_id": "ACCT-3496938AE257",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_2",
"session_entropy": 0.376
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1098,
"timestamp": "2026-01-04T01:14:00Z",
"transaction_amount_usd": 794406.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2280367.57,
"financial_exposure_usd": 4716480.09,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108443",
"label": "benign",
"label_confidence": 0.471,
"severity": "critical",
"timestamp": "2026-01-06T20:43:00Z",
"trace_id": "60ef10cd-a747-2e4a-0490-61b66b56289b"
} | {
"account_age_days": 1237,
"account_id": "ACCT-2F28800B94E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.253
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 436,
"timestamp": "2026-01-06T20:43:00Z",
"transaction_amount_usd": 311.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1229.01,
"financial_exposure_usd": 2160.39,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104955",
"label": "fraudulent",
"label_confidence": 0.743,
"severity": "high",
"timestamp": "2026-01-04T10:35:00Z",
"trace_id": "1c2990dd-3fc5-5c25-3b53-59374760ba34"
} | {
"account_age_days": 22,
"account_id": "ACCT-1B5E896FA3BB",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_1",
"session_entropy": 0.905
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1058,
"timestamp": "2026-01-04T10:35:00Z",
"transaction_amount_usd": 2907595.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.745,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2311142.33,
"financial_exposure_usd": 5244786.28,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104887",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "low",
"timestamp": "2026-01-04T09:27:00Z",
"trace_id": "a29ea0e4-9aa8-adba-8fe2-a36c5960f830"
} | {
"account_age_days": 652,
"account_id": "ACCT-F0722F18B31B",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_1",
"session_entropy": 0.417
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 476,
"timestamp": "2026-01-04T09:27:00Z",
"transaction_amount_usd": 1619549.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5841410.74,
"financial_exposure_usd": 6039839.48,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104430",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-04T01:50:00Z",
"trace_id": "b89c7e81-ced9-e11b-bb9b-3b2bae6df387"
} | {
"account_age_days": 723,
"account_id": "ACCT-48289C254F76",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_2",
"session_entropy": 0.335
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 768,
"timestamp": "2026-01-04T01:50:00Z",
"transaction_amount_usd": 1052266.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4164878.84,
"financial_exposure_usd": 4752419.51,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102499",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "medium",
"timestamp": "2026-01-02T17:39:00Z",
"trace_id": "0307d76f-2e20-4763-884c-a7b83b321425"
} | {
"account_age_days": 48,
"account_id": "ACCT-043F87F71140",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_1",
"session_entropy": 0.112
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 591,
"timestamp": "2026-01-02T17:39:00Z",
"transaction_amount_usd": 15455.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.562,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1052223.78,
"financial_exposure_usd": 1221903.65,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102103",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "low",
"timestamp": "2026-01-02T11:03:00Z",
"trace_id": "b632de48-7cd9-2a71-cd4e-ba23a456c455"
} | {
"account_age_days": 201,
"account_id": "ACCT-6779F6DF2DD4",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.177
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 826,
"timestamp": "2026-01-02T11:03:00Z",
"transaction_amount_usd": 93032.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 499115.19,
"financial_exposure_usd": 750559,
"recoverable_pct": 0.226
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105665",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-04T22:25:00Z",
"trace_id": "97deaff3-e4bd-8958-95b6-c39935920eab"
} | {
"account_age_days": 773,
"account_id": "ACCT-0097963670CE",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.122
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 373,
"timestamp": "2026-01-04T15:44:00Z",
"transaction_amount_usd": 3.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 925259.42,
"financial_exposure_usd": 1940369.32,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105426",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "critical",
"timestamp": "2026-01-04T18:26:00Z",
"trace_id": "7cb4ad35-b107-6014-8e43-0a9af1b8f677"
} | {
"account_age_days": 748,
"account_id": "ACCT-E69C2EAE282C",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_2",
"session_entropy": 0.604
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 84,
"timestamp": "2026-01-04T18:26:00Z",
"transaction_amount_usd": 1883907.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3086122.18,
"financial_exposure_usd": 4118847.3,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104514",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-04T03:14:00Z",
"trace_id": "af0b52fb-5471-fa8e-8729-41d4b487fddc"
} | {
"account_age_days": 719,
"account_id": "ACCT-C83B10B87AAF",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_2",
"session_entropy": 0.177
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 739,
"timestamp": "2026-01-04T03:14:00Z",
"transaction_amount_usd": 2851001.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 518863.34,
"financial_exposure_usd": 542578.19,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107329",
"label": "benign",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-06T02:09:00Z",
"trace_id": "2833029f-f72c-68dd-01cd-d01be4977511"
} | {
"account_age_days": 1436,
"account_id": "ACCT-BFDC7A892E9C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.316
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1173,
"timestamp": "2026-01-06T02:09:00Z",
"transaction_amount_usd": 14532.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 968.78,
"financial_exposure_usd": 1251.38,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104152",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "high",
"timestamp": "2026-01-03T21:12:00Z",
"trace_id": "c54eb4b3-566d-d83b-ccba-c4f0bb1ab8c1"
} | {
"account_age_days": 358,
"account_id": "ACCT-D29CBECB8ACA",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.128
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 304,
"timestamp": "2026-01-03T13:19:00Z",
"transaction_amount_usd": 4.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.427,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1493380.15,
"financial_exposure_usd": 1992669.34,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100032",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-01T00:32:00Z",
"trace_id": "a96b3c42-f6d2-2a7b-aec7-6a82148b4376"
} | {
"account_age_days": 99,
"account_id": "ACCT-6D5D0477ADC2",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 145,
"timestamp": "2025-12-31T14:17:00Z",
"transaction_amount_usd": 13.43
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 985257.81,
"financial_exposure_usd": 1204788.25,
"recoverable_pct": 0.347
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104008",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-03T18:48:00Z",
"trace_id": "5664e2d4-2ba3-be20-97a3-fb617ae8f070"
} | {
"account_age_days": 1093,
"account_id": "ACCT-186ADAE6DD9F",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 136,
"timestamp": "2026-01-03T18:48:00Z",
"transaction_amount_usd": 2401997.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.41,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3225499,
"financial_exposure_usd": 4831579.3,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100673",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-01T11:13:00Z",
"trace_id": "0d96c7d6-cfd5-c248-3998-4dc38a908312"
} | {
"account_age_days": 544,
"account_id": "ACCT-37EBB07079D2",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1052,
"timestamp": "2026-01-01T11:13:00Z",
"transaction_amount_usd": 63511.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.804,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 893339.3,
"financial_exposure_usd": 1108590.14,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107573",
"label": "benign",
"label_confidence": 0.541,
"severity": "critical",
"timestamp": "2026-01-06T06:13:00Z",
"trace_id": "9a38e14a-bd67-9cf9-a9a3-ab2d6c5b78ea"
} | {
"account_age_days": 1146,
"account_id": "ACCT-7AD14440C62B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.907
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1023,
"timestamp": "2026-01-06T06:13:00Z",
"transaction_amount_usd": 11723.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2264.5,
"financial_exposure_usd": 3920.17,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102623",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-02T19:43:00Z",
"trace_id": "cc61c4a8-1cc9-172d-494b-ede5742597d9"
} | {
"account_age_days": 933,
"account_id": "ACCT-EB1A426FD18F",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 967,
"timestamp": "2026-01-02T19:43:00Z",
"transaction_amount_usd": 91459.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 150011.9,
"financial_exposure_usd": 262966.15,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109677",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-07T17:17:00Z",
"trace_id": "b8a018bd-78d3-6313-4e7d-aa5bf885dced"
} | {
"account_age_days": 1071,
"account_id": "ACCT-CFD336D0654A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.822
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 331,
"timestamp": "2026-01-07T17:17:00Z",
"transaction_amount_usd": 10824.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4563.07,
"financial_exposure_usd": 5704.29,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106096",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "low",
"timestamp": "2026-01-05T05:36:00Z",
"trace_id": "02b9f778-c68b-4d5f-f5fc-3ac27e048420"
} | {
"account_age_days": 1525,
"account_id": "ACCT-FDCED3C8FD5F",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 939,
"timestamp": "2026-01-05T05:36:00Z",
"transaction_amount_usd": 1074558.64
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4440056.31,
"financial_exposure_usd": 5018882.4,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100497",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "low",
"timestamp": "2026-01-01T08:17:00Z",
"trace_id": "8e31aa5e-63d8-bdcc-e94b-5574b77f1264"
} | {
"account_age_days": 1231,
"account_id": "ACCT-4B63E19A39ED",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_2",
"session_entropy": 0.356
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 275,
"timestamp": "2026-01-01T08:17:00Z",
"transaction_amount_usd": 12775.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 847266.21,
"financial_exposure_usd": 953877.51,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102401",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-02T16:01:00Z",
"trace_id": "e66e19b4-b41c-326b-b8b5-6d08602e30d9"
} | {
"account_age_days": 1307,
"account_id": "ACCT-EB27D25D2A77",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 235,
"timestamp": "2026-01-02T16:01:00Z",
"transaction_amount_usd": 12230.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.732,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 716324.34,
"financial_exposure_usd": 769391.03,
"recoverable_pct": 0.277
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104127",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-03T20:47:00Z",
"trace_id": "35f5363e-6450-48aa-1b2d-3f0e6ef9a018"
} | {
"account_age_days": 958,
"account_id": "ACCT-52FB72768406",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.863
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 589,
"timestamp": "2026-01-03T20:47:00Z",
"transaction_amount_usd": 2015189.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.469,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2718384.64,
"financial_exposure_usd": 4733853.01,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108198",
"label": "benign",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-06T16:38:00Z",
"trace_id": "c0720f75-6d59-2c07-d251-d9c443cab94c"
} | {
"account_age_days": 796,
"account_id": "ACCT-49147CDECB3F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.105
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 739,
"timestamp": "2026-01-06T16:38:00Z",
"transaction_amount_usd": 10173.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1759.27,
"financial_exposure_usd": 1810.68,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105140",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "critical",
"timestamp": "2026-01-04T13:40:00Z",
"trace_id": "8c29589a-58e1-de01-3cac-2e47652a8f49"
} | {
"account_age_days": 1782,
"account_id": "ACCT-31D327026EA0",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_3",
"session_entropy": 0.46
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1084,
"timestamp": "2026-01-04T13:40:00Z",
"transaction_amount_usd": 1118826.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2459066.74,
"financial_exposure_usd": 5748504.81,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109154",
"label": "benign",
"label_confidence": 0.701,
"severity": "low",
"timestamp": "2026-01-07T08:34:00Z",
"trace_id": "f7497f56-5d93-f8a6-44a0-747ed6c5b682"
} | {
"account_age_days": 1964,
"account_id": "ACCT-0A3AEAA41B8E",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.886
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1013,
"timestamp": "2026-01-07T08:34:00Z",
"transaction_amount_usd": 5110.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4963.46,
"financial_exposure_usd": 7786.33,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105386",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-04T17:46:00Z",
"trace_id": "0bab6dc9-7beb-c79c-e024-3a899f5b793f"
} | {
"account_age_days": 979,
"account_id": "ACCT-DE82C75B8942",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_1",
"session_entropy": 0.321
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 419,
"timestamp": "2026-01-04T17:46:00Z",
"transaction_amount_usd": 2936430.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.458,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6035332.4,
"financial_exposure_usd": 8068214.19,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108340",
"label": "benign",
"label_confidence": 0.517,
"severity": "medium",
"timestamp": "2026-01-06T19:00:00Z",
"trace_id": "f362ddde-d4a0-8fe1-0bdf-1cbd28b0466a"
} | {
"account_age_days": 259,
"account_id": "ACCT-093ED4D2D213",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_3",
"session_entropy": 0.27
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 515,
"timestamp": "2026-01-06T19:00:00Z",
"transaction_amount_usd": 8543.83
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 888.62,
"financial_exposure_usd": 1237.11,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101502",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-02T01:02:00Z",
"trace_id": "73de3b89-fb49-2a84-6778-ef0b47f2ed06"
} | {
"account_age_days": 1409,
"account_id": "ACCT-11EE47ECEF7D",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_1",
"session_entropy": 0.295
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 93,
"timestamp": "2026-01-02T01:02:00Z",
"transaction_amount_usd": 32689.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 213744.39,
"financial_exposure_usd": 360979.44,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100946",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "critical",
"timestamp": "2026-01-01T15:46:00Z",
"trace_id": "6171dc26-f3bd-e14b-b221-b4eb19a219ea"
} | {
"account_age_days": 1165,
"account_id": "ACCT-597BA302268F",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 668,
"timestamp": "2026-01-01T15:46:00Z",
"transaction_amount_usd": 3402.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 463807.69,
"financial_exposure_usd": 925965.99,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101716",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-02T04:36:00Z",
"trace_id": "bf915ce3-8d43-f20d-61dd-2acbb6d93fe2"
} | {
"account_age_days": 1187,
"account_id": "ACCT-9AA4AA06D74C",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.178
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 130,
"timestamp": "2026-01-02T04:36:00Z",
"transaction_amount_usd": 103410.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.698,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 744503.09,
"financial_exposure_usd": 865893.83,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100176",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "high",
"timestamp": "2026-01-01T02:56:00Z",
"trace_id": "c41c233d-a513-964e-965a-693e85b69e95"
} | {
"account_age_days": 1375,
"account_id": "ACCT-DAF9AE1B5D9D",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1049,
"timestamp": "2026-01-01T02:56:00Z",
"transaction_amount_usd": 92751.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.478,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 722630.69,
"financial_exposure_usd": 1147990.5,
"recoverable_pct": 0.152
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101623",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-02T03:03:00Z",
"trace_id": "b78aac9c-24d6-1c71-c92b-ef7c88729028"
} | {
"account_age_days": 1379,
"account_id": "ACCT-FDCD1EC804EE",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_3",
"session_entropy": 0.207
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 216,
"timestamp": "2026-01-02T03:03:00Z",
"transaction_amount_usd": 103177.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 749721.35,
"financial_exposure_usd": 753284.87,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.