schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104062",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "high",
"timestamp": "2026-01-03T19:42:00Z",
"trace_id": "94d3f4d4-b561-6ee5-d05d-8f410448b20a"
} | {
"account_age_days": 366,
"account_id": "ACCT-681768D80182",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_3",
"session_entropy": 0.154
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 234,
"timestamp": "2026-01-03T19:17:00Z",
"transaction_amount_usd": 12.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.582,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2872492.64,
"financial_exposure_usd": 3943653.6,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100454",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-01T07:34:00Z",
"trace_id": "034b1d43-0c33-35d6-b0a9-31d1353ee9c4"
} | {
"account_age_days": 59,
"account_id": "ACCT-BC006136C9ED",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 394,
"timestamp": "2026-01-01T07:34:00Z",
"transaction_amount_usd": 119525.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 220350.06,
"financial_exposure_usd": 317561.81,
"recoverable_pct": 0.254
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107951",
"label": "benign",
"label_confidence": 0.66,
"severity": "high",
"timestamp": "2026-01-06T12:31:00Z",
"trace_id": "018e7d8f-8377-48b5-e7f0-d71d69d25737"
} | {
"account_age_days": 22,
"account_id": "ACCT-E377A92F2400",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.1
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 602,
"timestamp": "2026-01-06T12:31:00Z",
"transaction_amount_usd": 5132.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1409.26,
"financial_exposure_usd": 2926.04,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103877",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "critical",
"timestamp": "2026-01-03T16:37:00Z",
"trace_id": "9c60ad95-4e48-edca-bfc6-8a075c769b0c"
} | {
"account_age_days": 970,
"account_id": "ACCT-FA1CD5A6C5A5",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_2",
"session_entropy": 0.149
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 367,
"timestamp": "2026-01-03T05:50:00Z",
"transaction_amount_usd": 1.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1407055.19,
"financial_exposure_usd": 2002862.77,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108180",
"label": "benign",
"label_confidence": 0.587,
"severity": "medium",
"timestamp": "2026-01-06T16:20:00Z",
"trace_id": "679ddf6e-d445-9f5d-f8aa-dfa751fba113"
} | {
"account_age_days": 174,
"account_id": "ACCT-EC0D6147DDB6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.763
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1172,
"timestamp": "2026-01-06T16:20:00Z",
"transaction_amount_usd": 3106.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1581.07,
"financial_exposure_usd": 2495.9,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106278",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-05T08:38:00Z",
"trace_id": "a6edcfe9-d2ec-c312-e956-212547179b39"
} | {
"account_age_days": 1746,
"account_id": "ACCT-78B1DD3665C3",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 348,
"timestamp": "2026-01-05T08:38:00Z",
"transaction_amount_usd": 1768045.33
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.564,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4423315.9,
"financial_exposure_usd": 7623608.81,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105473",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "critical",
"timestamp": "2026-01-04T19:13:00Z",
"trace_id": "1560a50b-ea0d-08de-f71a-3c0d5ee25a1c"
} | {
"account_age_days": 1342,
"account_id": "ACCT-EFB61E6A4245",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_1",
"session_entropy": 0.698
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 462,
"timestamp": "2026-01-04T19:13:00Z",
"transaction_amount_usd": 1014462.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.739,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2081681.99,
"financial_exposure_usd": 4145468.07,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105359",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-04T17:19:00Z",
"trace_id": "3af8ffb7-0f6b-fced-26b0-b0d37fba2da5"
} | {
"account_age_days": 1417,
"account_id": "ACCT-BD291BF5AE84",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 188,
"timestamp": "2026-01-04T17:19:00Z",
"transaction_amount_usd": 2165039.07
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.798,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5564596.23,
"financial_exposure_usd": 6493867.86,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106309",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "low",
"timestamp": "2026-01-05T09:09:00Z",
"trace_id": "363189a0-1ce0-7ef1-5a56-9968cd330f4f"
} | {
"account_age_days": 1047,
"account_id": "ACCT-2B46B03FE4B3",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 561,
"timestamp": "2026-01-05T09:09:00Z",
"transaction_amount_usd": 1995063.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.886,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5580606.82,
"financial_exposure_usd": 6159212.7,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103752",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "medium",
"timestamp": "2026-01-03T14:32:00Z",
"trace_id": "f400d685-fa0a-eede-d431-d9569f7eb17c"
} | {
"account_age_days": 270,
"account_id": "ACCT-1156B78E8582",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_1",
"session_entropy": 0.687
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 286,
"timestamp": "2026-01-03T14:32:00Z",
"transaction_amount_usd": 1363100.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.644,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 766983.03,
"financial_exposure_usd": 1471409.09,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107687",
"label": "benign",
"label_confidence": 0.527,
"severity": "low",
"timestamp": "2026-01-06T08:07:00Z",
"trace_id": "1effee14-8a76-f17b-5342-8bb58a665cba"
} | {
"account_age_days": 1140,
"account_id": "ACCT-B700C4E54B12",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.251
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1115,
"timestamp": "2026-01-06T08:07:00Z",
"transaction_amount_usd": 1250.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 901.14,
"financial_exposure_usd": 1596.25,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101471",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-02T00:31:00Z",
"trace_id": "0eea9d80-3302-7713-fe57-9dce9fcfc907"
} | {
"account_age_days": 653,
"account_id": "ACCT-F16ED7D63800",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_3",
"session_entropy": 0.158
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 119,
"timestamp": "2026-01-01T19:08:00Z",
"transaction_amount_usd": 13.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 489533.58,
"financial_exposure_usd": 1143795.86,
"recoverable_pct": 0.046
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109449",
"label": "benign",
"label_confidence": 0.497,
"severity": "high",
"timestamp": "2026-01-07T13:29:00Z",
"trace_id": "b220a301-a7b9-a250-259b-0776a54bffa5"
} | {
"account_age_days": 1764,
"account_id": "ACCT-31A5768652D6",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1095,
"timestamp": "2026-01-07T13:29:00Z",
"transaction_amount_usd": 10523.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1968.6,
"financial_exposure_usd": 4159.26,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105216",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-04T14:56:00Z",
"trace_id": "b7b6a905-5b98-484d-3597-020652e55edc"
} | {
"account_age_days": 801,
"account_id": "ACCT-310595A82A82",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_1",
"session_entropy": 0.192
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 422,
"timestamp": "2026-01-04T14:56:00Z",
"transaction_amount_usd": 740815.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4392087.82,
"financial_exposure_usd": 4600064.37,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108670",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-07T00:30:00Z",
"trace_id": "20dfe0e8-7890-ffe8-9b26-3f74852fe9f7"
} | {
"account_age_days": 1239,
"account_id": "ACCT-49BD8EDCFF12",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_1",
"session_entropy": 0.672
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 282,
"timestamp": "2026-01-06T12:31:00Z",
"transaction_amount_usd": 23.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1972.29,
"financial_exposure_usd": 4170.04,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102403",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-02T16:03:00Z",
"trace_id": "13e13ba5-9a40-e9fb-94e3-acac1abaca56"
} | {
"account_age_days": 1734,
"account_id": "ACCT-B3B449FF2C60",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 260,
"timestamp": "2026-01-02T08:48:00Z",
"transaction_amount_usd": 0.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1038717.25,
"financial_exposure_usd": 1262753.5,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100648",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-01T10:48:00Z",
"trace_id": "9ac0ca40-fe4f-b7e1-74d2-bd8ec94318fb"
} | {
"account_age_days": 221,
"account_id": "ACCT-D748C6F4EC06",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_1",
"session_entropy": 0.305
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 366,
"timestamp": "2026-01-01T02:07:00Z",
"transaction_amount_usd": 13.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.791,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 512316.39,
"financial_exposure_usd": 1237853.9,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106901",
"label": "benign",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-05T19:01:00Z",
"trace_id": "ead03201-63ea-9483-f60c-821a9b609e2a"
} | {
"account_age_days": 766,
"account_id": "ACCT-70C17380944E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.89
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 109,
"timestamp": "2026-01-05T14:33:00Z",
"transaction_amount_usd": 19.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 331.12,
"financial_exposure_usd": 559.09,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100595",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-01T09:55:00Z",
"trace_id": "8176e002-24e9-6abe-421e-8ebfc6997fc4"
} | {
"account_age_days": 558,
"account_id": "ACCT-FF055ADA78C5",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_3",
"session_entropy": 0.226
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 106,
"timestamp": "2026-01-01T07:24:00Z",
"transaction_amount_usd": 4.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.9,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 338295.13,
"financial_exposure_usd": 611962.28,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105387",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "critical",
"timestamp": "2026-01-04T17:47:00Z",
"trace_id": "c9267524-ce22-e5d8-358e-45b172cfdc0e"
} | {
"account_age_days": 959,
"account_id": "ACCT-28A3F2EC0B46",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_1",
"session_entropy": 0.609
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 205,
"timestamp": "2026-01-04T17:47:00Z",
"transaction_amount_usd": 1388324.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.753,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5448409.54,
"financial_exposure_usd": 9043054.96,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104860",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-04T09:00:00Z",
"trace_id": "a119a497-dbfb-7f22-8b57-e8d7554604d1"
} | {
"account_age_days": 525,
"account_id": "ACCT-D9FCF64042E2",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.389
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 564,
"timestamp": "2026-01-04T09:00:00Z",
"transaction_amount_usd": 247551.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.408,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4220783.36,
"financial_exposure_usd": 8207343.97,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103037",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "critical",
"timestamp": "2026-01-03T02:37:00Z",
"trace_id": "fdb82fd8-fef4-99b2-660e-7156fae4c680"
} | {
"account_age_days": 1189,
"account_id": "ACCT-4D9652F07E19",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.912
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 104,
"timestamp": "2026-01-02T23:59:00Z",
"transaction_amount_usd": 1.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 190245.14,
"financial_exposure_usd": 310516.52,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106232",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-05T07:52:00Z",
"trace_id": "4e94f489-75ca-176f-27e7-38277b7c979e"
} | {
"account_age_days": 1718,
"account_id": "ACCT-DD76C21F05DA",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.402
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1180,
"timestamp": "2026-01-05T07:52:00Z",
"transaction_amount_usd": 1031749.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2813726.11,
"financial_exposure_usd": 3448391.77,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100572",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "critical",
"timestamp": "2026-01-01T09:32:00Z",
"trace_id": "9ba4f510-c42f-9691-2a8c-2b0a4a119d95"
} | {
"account_age_days": 1237,
"account_id": "ACCT-77753E37141F",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_1",
"session_entropy": 0.512
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 152,
"timestamp": "2026-01-01T09:32:00Z",
"transaction_amount_usd": 8253.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 520387.7,
"financial_exposure_usd": 824751.96,
"recoverable_pct": 0.194
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109467",
"label": "benign",
"label_confidence": 0.595,
"severity": "medium",
"timestamp": "2026-01-07T13:47:00Z",
"trace_id": "0fd1e8ca-2c91-fdaf-8370-6165ef076c96"
} | {
"account_age_days": 1300,
"account_id": "ACCT-AC1102968CC1",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.581
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 375,
"timestamp": "2026-01-07T10:07:00Z",
"transaction_amount_usd": 13.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 383.92,
"financial_exposure_usd": 478.36,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106473",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-05T11:53:00Z",
"trace_id": "a21cd4d8-faee-ef12-58a5-f0d8dda762dc"
} | {
"account_age_days": 410,
"account_id": "ACCT-D400D46A67AF",
"baseline_risk_score": 0.228,
"kyc_tier": "tier_2",
"session_entropy": 0.395
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 220,
"timestamp": "2026-01-05T03:10:00Z",
"transaction_amount_usd": 6.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1760756.46,
"financial_exposure_usd": 3332685.05,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101381",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "medium",
"timestamp": "2026-01-01T23:01:00Z",
"trace_id": "0b2e9701-3d6c-9b59-59eb-fc2cb6f86875"
} | {
"account_age_days": 1201,
"account_id": "ACCT-FDCB395687FC",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.791
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 763,
"timestamp": "2026-01-01T23:01:00Z",
"transaction_amount_usd": 94602.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.618,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 346308.3,
"financial_exposure_usd": 783018.37,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106046",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "critical",
"timestamp": "2026-01-05T04:46:00Z",
"trace_id": "a4c330d4-6983-28f0-5151-9a56cb5ea68d"
} | {
"account_age_days": 1667,
"account_id": "ACCT-30CCDCADAA10",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_3",
"session_entropy": 0.646
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1117,
"timestamp": "2026-01-05T04:46:00Z",
"transaction_amount_usd": 1648232.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5349855.83,
"financial_exposure_usd": 5857998.22,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102035",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "critical",
"timestamp": "2026-01-02T09:55:00Z",
"trace_id": "bf62fe8b-3e17-e76f-4b42-9680f6bcaafe"
} | {
"account_age_days": 614,
"account_id": "ACCT-CFDBB82BB275",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.638
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 310,
"timestamp": "2026-01-02T05:12:00Z",
"transaction_amount_usd": 23.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.516,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 334214.91,
"financial_exposure_usd": 463827.59,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108631",
"label": "benign",
"label_confidence": 0.664,
"severity": "low",
"timestamp": "2026-01-06T23:51:00Z",
"trace_id": "2f788151-e843-5665-9cbb-a52c4e0a9de7"
} | {
"account_age_days": 1988,
"account_id": "ACCT-90E38062915A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.462
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 856,
"timestamp": "2026-01-06T23:51:00Z",
"transaction_amount_usd": 5159.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4498.59,
"financial_exposure_usd": 5822.02,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106174",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-05T06:54:00Z",
"trace_id": "b1481b9f-c81f-6da4-8c09-c4f49ff92707"
} | {
"account_age_days": 412,
"account_id": "ACCT-0B08D91974D4",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.241
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 378,
"timestamp": "2026-01-05T06:54:00Z",
"transaction_amount_usd": 945772.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.84,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3273509.11,
"financial_exposure_usd": 6229705.25,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100685",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "low",
"timestamp": "2026-01-01T11:25:00Z",
"trace_id": "6b3441f7-9e76-37f1-6d23-117e864e9304"
} | {
"account_age_days": 1000,
"account_id": "ACCT-F01813FDA68D",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_1",
"session_entropy": 0.846
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 241,
"timestamp": "2026-01-01T00:40:00Z",
"transaction_amount_usd": 5.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1306378.96,
"financial_exposure_usd": 1458288.01,
"recoverable_pct": 0.18
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106766",
"label": "benign",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-05T16:46:00Z",
"trace_id": "c90747c3-0354-cf6a-4511-15c927a0da44"
} | {
"account_age_days": 1445,
"account_id": "ACCT-F5B031352143",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.844
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 319,
"timestamp": "2026-01-05T16:46:00Z",
"transaction_amount_usd": 5556.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.558,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 227.3,
"financial_exposure_usd": 381.54,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103065",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "critical",
"timestamp": "2026-01-03T03:05:00Z",
"trace_id": "ec4e3780-0515-ef82-6de4-b14fe5023bed"
} | {
"account_age_days": 527,
"account_id": "ACCT-F6C8AB482664",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_1",
"session_entropy": 0.296
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 262,
"timestamp": "2026-01-02T19:50:00Z",
"transaction_amount_usd": 21.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 342596.99,
"financial_exposure_usd": 675398.15,
"recoverable_pct": 0.205
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105845",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-05T01:25:00Z",
"trace_id": "6633ca97-8c03-fa4a-23ec-f2777d921d37"
} | {
"account_age_days": 1225,
"account_id": "ACCT-39CB10AAC38F",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 981,
"timestamp": "2026-01-05T01:25:00Z",
"transaction_amount_usd": 2912607.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.41,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2380661.5,
"financial_exposure_usd": 4829072.86,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105589",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "high",
"timestamp": "2026-01-04T21:09:00Z",
"trace_id": "9a7b1ee8-542d-83fc-e242-e40cad48bd43"
} | {
"account_age_days": 263,
"account_id": "ACCT-CFE92085D2DF",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_1",
"session_entropy": 0.41
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 282,
"timestamp": "2026-01-04T21:09:00Z",
"transaction_amount_usd": 1570572.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7129429.95,
"financial_exposure_usd": 7638722.39,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105782",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "medium",
"timestamp": "2026-01-05T00:22:00Z",
"trace_id": "c2b37a65-2bd1-ed93-8a87-ce87e9f105ef"
} | {
"account_age_days": 1853,
"account_id": "ACCT-AD753FCC418A",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_3",
"session_entropy": 0.379
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 690,
"timestamp": "2026-01-05T00:22:00Z",
"transaction_amount_usd": 1742772.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4848765.34,
"financial_exposure_usd": 5974493.63,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102148",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-02T11:48:00Z",
"trace_id": "7f089d1f-a281-b915-0de6-a933fcc51153"
} | {
"account_age_days": 156,
"account_id": "ACCT-66917B85FB46",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_2",
"session_entropy": 0.59
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 341,
"timestamp": "2026-01-02T07:45:00Z",
"transaction_amount_usd": 13.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 219408.52,
"financial_exposure_usd": 433521,
"recoverable_pct": 0.376
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104398",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "low",
"timestamp": "2026-01-04T01:18:00Z",
"trace_id": "85659633-8de1-92b3-4dfb-93e66ac8820c"
} | {
"account_age_days": 101,
"account_id": "ACCT-CB0F5229C640",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_1",
"session_entropy": 0.563
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 937,
"timestamp": "2026-01-04T01:18:00Z",
"transaction_amount_usd": 2854816.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.579,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1628397.55,
"financial_exposure_usd": 1704695.68,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105828",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-05T01:08:00Z",
"trace_id": "75510bb3-d65c-f731-178f-e8356d3cbad7"
} | {
"account_age_days": 1848,
"account_id": "ACCT-C211BA719204",
"baseline_risk_score": 0.218,
"kyc_tier": "tier_1",
"session_entropy": 0.307
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 413,
"timestamp": "2026-01-05T01:08:00Z",
"transaction_amount_usd": 2952010.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.794,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2529662.95,
"financial_exposure_usd": 3589133.39,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101758",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-02T05:18:00Z",
"trace_id": "0d508388-504d-4109-33d1-e1ba6ccb78e4"
} | {
"account_age_days": 1338,
"account_id": "ACCT-28F36AE94F62",
"baseline_risk_score": 0.56,
"kyc_tier": "tier_2",
"session_entropy": 0.461
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 793,
"timestamp": "2026-01-02T05:18:00Z",
"transaction_amount_usd": 18111.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 198090.41,
"financial_exposure_usd": 234120.66,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101868",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-02T07:08:00Z",
"trace_id": "7f472d06-87e7-55c5-1486-7893266a9b30"
} | {
"account_age_days": 730,
"account_id": "ACCT-9FC09FB6C802",
"baseline_risk_score": 0.493,
"kyc_tier": "tier_1",
"session_entropy": 0.933
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 142,
"timestamp": "2026-01-02T01:55:00Z",
"transaction_amount_usd": 3.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 149275.17,
"financial_exposure_usd": 180195.98,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104893",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-04T09:33:00Z",
"trace_id": "67f85d56-59c0-3fa1-933f-327cf8dfd1d0"
} | {
"account_age_days": 831,
"account_id": "ACCT-801C52D3AEC8",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.929
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 527,
"timestamp": "2026-01-04T09:33:00Z",
"transaction_amount_usd": 2724266.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5121758.3,
"financial_exposure_usd": 7252050.51,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101252",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "low",
"timestamp": "2026-01-01T20:52:00Z",
"trace_id": "5ac784a1-278d-232f-76ad-8d894b4b5d7a"
} | {
"account_age_days": 234,
"account_id": "ACCT-D7CB2A2E180C",
"baseline_risk_score": 0.545,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 240,
"timestamp": "2026-01-01T13:47:00Z",
"transaction_amount_usd": 20.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.928,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 834223.42,
"financial_exposure_usd": 1092655.2,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101591",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "low",
"timestamp": "2026-01-02T02:31:00Z",
"trace_id": "f7437b13-3fad-3a60-0a93-4db4f0d514bf"
} | {
"account_age_days": 1165,
"account_id": "ACCT-A0146CDFF264",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_3",
"session_entropy": 0.147
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 826,
"timestamp": "2026-01-02T02:31:00Z",
"transaction_amount_usd": 73257.36
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.585,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 505378.92,
"financial_exposure_usd": 533615.17,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102267",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-02T13:47:00Z",
"trace_id": "162aeb17-d79d-f76c-0e6f-88537a9d9776"
} | {
"account_age_days": 1116,
"account_id": "ACCT-1BDC783D5D15",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_2",
"session_entropy": 0.132
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 955,
"timestamp": "2026-01-02T13:47:00Z",
"transaction_amount_usd": 7056.11
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.755,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 596584.68,
"financial_exposure_usd": 815661.38,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108852",
"label": "benign",
"label_confidence": 0.699,
"severity": "medium",
"timestamp": "2026-01-07T03:32:00Z",
"trace_id": "96a96249-fd50-b73b-bc4d-ef0ceb2e7a8c"
} | {
"account_age_days": 1841,
"account_id": "ACCT-23EF51B58C5B",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.506
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 734,
"timestamp": "2026-01-07T03:32:00Z",
"transaction_amount_usd": 7539.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2596.07,
"financial_exposure_usd": 3753.03,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103248",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-03T06:08:00Z",
"trace_id": "3b335d40-4b95-aa39-0281-c070b5d5b6e8"
} | {
"account_age_days": 1487,
"account_id": "ACCT-5A922DE31806",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 428,
"timestamp": "2026-01-03T06:08:00Z",
"transaction_amount_usd": 119176.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 764096.5,
"financial_exposure_usd": 834873.7,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107987",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-06T13:07:00Z",
"trace_id": "beb5441f-dbf1-2e41-7462-1bb3b003b683"
} | {
"account_age_days": 1677,
"account_id": "ACCT-59AE49278F5A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.741
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 666,
"timestamp": "2026-01-06T13:07:00Z",
"transaction_amount_usd": 11073.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2419.31,
"financial_exposure_usd": 3119.81,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102669",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-02T20:29:00Z",
"trace_id": "8c6bba2b-afb2-67a6-e788-ce9919ddb97b"
} | {
"account_age_days": 973,
"account_id": "ACCT-96C64F233193",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_2",
"session_entropy": 0.239
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 256,
"timestamp": "2026-01-02T10:14:00Z",
"transaction_amount_usd": 18.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 631993.67,
"financial_exposure_usd": 646413.62,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102040",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "critical",
"timestamp": "2026-01-02T10:00:00Z",
"trace_id": "554ada2c-9e4d-0d78-eccf-8f7031a19501"
} | {
"account_age_days": 1922,
"account_id": "ACCT-8AABE2DCF947",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_1",
"session_entropy": 0.488
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 359,
"timestamp": "2026-01-02T04:48:00Z",
"transaction_amount_usd": 0.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 494165.8,
"financial_exposure_usd": 799342.23,
"recoverable_pct": 0.023
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105568",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-04T20:48:00Z",
"trace_id": "04cafe4e-8dcc-329a-c0c4-d38cbab050da"
} | {
"account_age_days": 1341,
"account_id": "ACCT-C03A4CCEA7B0",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.57
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 251,
"timestamp": "2026-01-04T10:14:00Z",
"transaction_amount_usd": 17
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1815801.36,
"financial_exposure_usd": 4411805.06,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109811",
"label": "benign",
"label_confidence": 0.649,
"severity": "high",
"timestamp": "2026-01-07T19:31:00Z",
"trace_id": "58da0858-e200-2090-a828-7861887cff71"
} | {
"account_age_days": 1312,
"account_id": "ACCT-AFF411ED81D7",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_3",
"session_entropy": 0.245
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 372,
"timestamp": "2026-01-07T10:49:00Z",
"transaction_amount_usd": 23.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2591.78,
"financial_exposure_usd": 2697.74,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106233",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-05T07:53:00Z",
"trace_id": "6458bfd2-f6c0-236f-6eb5-c848d2abbbf2"
} | {
"account_age_days": 706,
"account_id": "ACCT-CD477FCFAD04",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 895,
"timestamp": "2026-01-05T07:53:00Z",
"transaction_amount_usd": 2456257.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3093596.42,
"financial_exposure_usd": 3159423.43,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105924",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-05T02:44:00Z",
"trace_id": "f9847f1a-e1f8-b502-ebec-b0e9fb13895e"
} | {
"account_age_days": 1383,
"account_id": "ACCT-3173960453DB",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_1",
"session_entropy": 0.617
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 300,
"timestamp": "2026-01-05T00:51:00Z",
"transaction_amount_usd": 23.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2632725.56,
"financial_exposure_usd": 4060718.56,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103964",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "low",
"timestamp": "2026-01-03T18:04:00Z",
"trace_id": "7afdf2c4-d060-9177-1024-7f3d5acc74f0"
} | {
"account_age_days": 1044,
"account_id": "ACCT-59DBED7F6804",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.628
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 761,
"timestamp": "2026-01-03T18:04:00Z",
"transaction_amount_usd": 2574533.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.914,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4892686.51,
"financial_exposure_usd": 4979285.17,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103419",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "critical",
"timestamp": "2026-01-03T08:59:00Z",
"trace_id": "43b2475f-8a34-b08c-199b-fb4dbabeff3b"
} | {
"account_age_days": 1772,
"account_id": "ACCT-ED387A34534D",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_2",
"session_entropy": 0.934
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 509,
"timestamp": "2026-01-03T08:59:00Z",
"transaction_amount_usd": 1868017.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4694543.22,
"financial_exposure_usd": 4764962.34,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102130",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-02T11:30:00Z",
"trace_id": "1636e79c-a0fa-2e8e-70f5-56090673d276"
} | {
"account_age_days": 986,
"account_id": "ACCT-85743ABAD95D",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_2",
"session_entropy": 0.736
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 826,
"timestamp": "2026-01-02T11:30:00Z",
"transaction_amount_usd": 89087.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 300688.25,
"financial_exposure_usd": 724993.45,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100138",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-01T02:18:00Z",
"trace_id": "1febc9af-b2a8-6456-884b-fa8ce3593ee9"
} | {
"account_age_days": 844,
"account_id": "ACCT-83AA622F8772",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.864
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 256,
"timestamp": "2025-12-31T19:06:00Z",
"transaction_amount_usd": 17.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.354,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 277501.41,
"financial_exposure_usd": 518057.9,
"recoverable_pct": 0.336
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104656",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "medium",
"timestamp": "2026-01-04T05:36:00Z",
"trace_id": "5c325f3c-a46b-5811-a395-0f16c06223e1"
} | {
"account_age_days": 27,
"account_id": "ACCT-C9A1B2DF7B7D",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_3",
"session_entropy": 0.892
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 384,
"timestamp": "2026-01-03T23:51:00Z",
"transaction_amount_usd": 7.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.621,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1489343.4,
"financial_exposure_usd": 2136118.5,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106561",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-05T13:21:00Z",
"trace_id": "1b05d6c9-03f0-81ce-d4c5-4d67aaafae0f"
} | {
"account_age_days": 1070,
"account_id": "ACCT-FE032A433004",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_2",
"session_entropy": 0.207
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 224,
"timestamp": "2026-01-05T13:21:00Z",
"transaction_amount_usd": 2995756.15
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 939415.66,
"financial_exposure_usd": 1563866.08,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100520",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "critical",
"timestamp": "2026-01-01T08:40:00Z",
"trace_id": "cc5402b4-b203-60ba-63ed-8c865cad2517"
} | {
"account_age_days": 1430,
"account_id": "ACCT-9C940C89148B",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_2",
"session_entropy": 0.27
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 326,
"timestamp": "2026-01-01T08:40:00Z",
"transaction_amount_usd": 118863.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.605,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 424926.37,
"financial_exposure_usd": 868575.22,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100549",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "medium",
"timestamp": "2026-01-01T09:09:00Z",
"trace_id": "4f5b2740-520b-acdc-5669-e39739a97417"
} | {
"account_age_days": 1370,
"account_id": "ACCT-5CD56C6DC99A",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_1",
"session_entropy": 0.368
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 912,
"timestamp": "2026-01-01T09:09:00Z",
"transaction_amount_usd": 34928.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.831,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 935796.17,
"financial_exposure_usd": 1070873.59,
"recoverable_pct": 0.076
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100800",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-01T13:20:00Z",
"trace_id": "9036a459-f546-aabc-f61d-39e3358f4c9c"
} | {
"account_age_days": 1104,
"account_id": "ACCT-E9C80A349BF5",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_3",
"session_entropy": 0.624
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 790,
"timestamp": "2026-01-01T13:20:00Z",
"transaction_amount_usd": 92379.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 405142.46,
"financial_exposure_usd": 653066.24,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104756",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T07:16:00Z",
"trace_id": "23f05b0b-4771-5eca-0223-aeb8e6a22d22"
} | {
"account_age_days": 154,
"account_id": "ACCT-CBAA140B9B4E",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 268,
"timestamp": "2026-01-04T04:44:00Z",
"transaction_amount_usd": 6.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4138903.77,
"financial_exposure_usd": 8784076.87,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104899",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-04T09:39:00Z",
"trace_id": "ff5e8320-9df0-026d-d5fa-7c83fc3678b1"
} | {
"account_age_days": 1759,
"account_id": "ACCT-6A5D029E297B",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_3",
"session_entropy": 0.623
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 502,
"timestamp": "2026-01-04T09:39:00Z",
"transaction_amount_usd": 336044.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.786,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 183233.84,
"financial_exposure_usd": 438702.91,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103334",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-03T07:34:00Z",
"trace_id": "facaeebb-01ab-ac53-47fc-8b52ab9ed3b1"
} | {
"account_age_days": 121,
"account_id": "ACCT-99E0B52EC60D",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 390,
"timestamp": "2026-01-03T02:32:00Z",
"transaction_amount_usd": 3.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1802019.59,
"financial_exposure_usd": 3205854.94,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103124",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-03T04:04:00Z",
"trace_id": "e9f735e5-cf0f-80f3-0d1f-436c3f307664"
} | {
"account_age_days": 754,
"account_id": "ACCT-8D6C83D28DEC",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_2",
"session_entropy": 0.384
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 252,
"timestamp": "2026-01-02T19:58:00Z",
"transaction_amount_usd": 14.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 228156.21,
"financial_exposure_usd": 491223.79,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109313",
"label": "benign",
"label_confidence": 0.537,
"severity": "low",
"timestamp": "2026-01-07T11:13:00Z",
"trace_id": "b3d3d3d3-f73f-2bc9-5a28-c68257a249e1"
} | {
"account_age_days": 1814,
"account_id": "ACCT-43D5DD8BB9D7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 378,
"timestamp": "2026-01-07T11:13:00Z",
"transaction_amount_usd": 13451.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.615,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4286.37,
"financial_exposure_usd": 4841.1,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108704",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-07T01:04:00Z",
"trace_id": "3f720f85-3b8d-8f7d-34ea-bea89ee56429"
} | {
"account_age_days": 661,
"account_id": "ACCT-29B2C3D7F311",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.83
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 452,
"timestamp": "2026-01-07T01:04:00Z",
"transaction_amount_usd": 14278.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1655.61,
"financial_exposure_usd": 3016.61,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107194",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-05T23:54:00Z",
"trace_id": "f0a62da8-0bb0-f3b6-e231-c8d7632f2484"
} | {
"account_age_days": 1216,
"account_id": "ACCT-63A2A89EDEAA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.47
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 342,
"timestamp": "2026-01-05T20:55:00Z",
"transaction_amount_usd": 20.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 668.06,
"financial_exposure_usd": 1319.66,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109699",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-07T17:39:00Z",
"trace_id": "1817c3b7-5cb4-e2e7-97a0-2d210f7a9d9d"
} | {
"account_age_days": 1718,
"account_id": "ACCT-7C0B0CE8A691",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.774
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 764,
"timestamp": "2026-01-07T17:39:00Z",
"transaction_amount_usd": 12929.21
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1761.33,
"financial_exposure_usd": 2136.9,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108046",
"label": "benign",
"label_confidence": 0.565,
"severity": "medium",
"timestamp": "2026-01-06T14:06:00Z",
"trace_id": "d8b5763c-7988-0aa0-edc7-cce7597dd13e"
} | {
"account_age_days": 947,
"account_id": "ACCT-70CB9E89E03D",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.63
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 152,
"timestamp": "2026-01-06T06:42:00Z",
"transaction_amount_usd": 7.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3751.42,
"financial_exposure_usd": 5343.48,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100292",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-01T04:52:00Z",
"trace_id": "3388cf1b-d0f3-83cd-6b77-548916ca7742"
} | {
"account_age_days": 1546,
"account_id": "ACCT-4C6CED6D3F7D",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.927
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 147,
"timestamp": "2026-01-01T04:52:00Z",
"transaction_amount_usd": 51482.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.797,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 512563.75,
"financial_exposure_usd": 620971.75,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108461",
"label": "benign",
"label_confidence": 0.605,
"severity": "high",
"timestamp": "2026-01-06T21:01:00Z",
"trace_id": "5892fac9-42a2-c066-2e31-0f2c29478e15"
} | {
"account_age_days": 276,
"account_id": "ACCT-48A5709168EC",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.123
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 472,
"timestamp": "2026-01-06T21:01:00Z",
"transaction_amount_usd": 8971.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2311.51,
"financial_exposure_usd": 4858.98,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109803",
"label": "benign",
"label_confidence": 0.527,
"severity": "medium",
"timestamp": "2026-01-07T19:23:00Z",
"trace_id": "b9e8208d-ea06-07db-6513-dca0b9dec6e7"
} | {
"account_age_days": 281,
"account_id": "ACCT-8C211EFA6B95",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.417
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 237,
"timestamp": "2026-01-07T11:55:00Z",
"transaction_amount_usd": 11.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.739,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2808.7,
"financial_exposure_usd": 3608.97,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102004",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-02T09:24:00Z",
"trace_id": "f583ee0f-5d5c-104e-0594-46bdea7c9284"
} | {
"account_age_days": 31,
"account_id": "ACCT-FABC6C842628",
"baseline_risk_score": 0.61,
"kyc_tier": "tier_2",
"session_entropy": 0.893
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 205,
"timestamp": "2026-01-02T09:24:00Z",
"transaction_amount_usd": 111732.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 657253.12,
"financial_exposure_usd": 1074606.73,
"recoverable_pct": 0.137
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103392",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-03T08:32:00Z",
"trace_id": "eb9f20a6-0cb9-0d52-daa8-7f48e8efc758"
} | {
"account_age_days": 1543,
"account_id": "ACCT-F5E7FB372A44",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_1",
"session_entropy": 0.311
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 171,
"timestamp": "2026-01-03T08:32:00Z",
"transaction_amount_usd": 614705.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.918,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2501769.07,
"financial_exposure_usd": 2893310.31,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100103",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-01T01:43:00Z",
"trace_id": "13a0181b-cbaf-d542-58e9-bbad35b1773c"
} | {
"account_age_days": 1149,
"account_id": "ACCT-4F7F963ED3C5",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_2",
"session_entropy": 0.495
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 489,
"timestamp": "2026-01-01T01:43:00Z",
"transaction_amount_usd": 60804.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 313380.94,
"financial_exposure_usd": 601274.69,
"recoverable_pct": 0.232
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102891",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "critical",
"timestamp": "2026-01-03T00:11:00Z",
"trace_id": "ee58dab6-11e5-8164-9b6d-9eead8dc9f7c"
} | {
"account_age_days": 681,
"account_id": "ACCT-F972DB5473F6",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.13
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 218,
"timestamp": "2026-01-02T20:25:00Z",
"transaction_amount_usd": 12.38
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1056482.65,
"financial_exposure_usd": 1104556.7,
"recoverable_pct": 0.107
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106346",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-05T09:46:00Z",
"trace_id": "5b11fc6b-06e8-eb6f-f603-af3a112aab66"
} | {
"account_age_days": 1400,
"account_id": "ACCT-2A554187E311",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 250,
"timestamp": "2026-01-05T09:46:00Z",
"transaction_amount_usd": 1324490.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.549,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6538914.46,
"financial_exposure_usd": 7810352.54,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108081",
"label": "benign",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-06T14:41:00Z",
"trace_id": "8f7372f7-4188-c3ac-ea86-185fbea2b388"
} | {
"account_age_days": 1320,
"account_id": "ACCT-E6F30A293F62",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 685,
"timestamp": "2026-01-06T14:41:00Z",
"transaction_amount_usd": 4113.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 438.82,
"financial_exposure_usd": 996.83,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107750",
"label": "benign",
"label_confidence": 0.671,
"severity": "high",
"timestamp": "2026-01-06T09:10:00Z",
"trace_id": "1140bdb7-5c5e-2d03-6960-53edd29d80fa"
} | {
"account_age_days": 661,
"account_id": "ACCT-CA3733008DB2",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 412,
"timestamp": "2026-01-06T09:10:00Z",
"transaction_amount_usd": 14675.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3170.41,
"financial_exposure_usd": 3848.52,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103036",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-03T02:36:00Z",
"trace_id": "8cb8ceff-3a06-c22d-569e-0e6dac6dd783"
} | {
"account_age_days": 1128,
"account_id": "ACCT-1E3893B94DFE",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.325
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 976,
"timestamp": "2026-01-03T02:36:00Z",
"transaction_amount_usd": 58732.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.744,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 752874.42,
"financial_exposure_usd": 981706.92,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104032",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "high",
"timestamp": "2026-01-03T19:12:00Z",
"trace_id": "45d97a48-0485-3a2c-6df7-024e5984ae36"
} | {
"account_age_days": 287,
"account_id": "ACCT-D6CC10C188C9",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_1",
"session_entropy": 0.734
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 399,
"timestamp": "2026-01-03T09:14:00Z",
"transaction_amount_usd": 6.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4866492.06,
"financial_exposure_usd": 4938979.41,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104362",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-04T00:42:00Z",
"trace_id": "0e92a6f8-9f73-7156-b8fb-68e726f08ee0"
} | {
"account_age_days": 533,
"account_id": "ACCT-0FE92D7157FB",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.907
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 815,
"timestamp": "2026-01-04T00:42:00Z",
"transaction_amount_usd": 2450005.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.818,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2631522.57,
"financial_exposure_usd": 3218349.02,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104888",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-04T09:28:00Z",
"trace_id": "4394f957-548b-7ea1-07a3-014b0809c26a"
} | {
"account_age_days": 28,
"account_id": "ACCT-C33901FF93BA",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_3",
"session_entropy": 0.383
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 883,
"timestamp": "2026-01-04T09:28:00Z",
"transaction_amount_usd": 195488.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.654,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4526524.64,
"financial_exposure_usd": 7206871.89,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104548",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-04T03:48:00Z",
"trace_id": "b8226bb7-9bb6-4425-7d7a-f521bb476c47"
} | {
"account_age_days": 778,
"account_id": "ACCT-A49036C02611",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.587
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 929,
"timestamp": "2026-01-04T03:48:00Z",
"transaction_amount_usd": 2954551.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.657,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3094400.06,
"financial_exposure_usd": 3960205.77,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101119",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "low",
"timestamp": "2026-01-01T18:39:00Z",
"trace_id": "080510d1-ef4e-80a2-6a95-cd30b5dae589"
} | {
"account_age_days": 1122,
"account_id": "ACCT-AF886B9A7701",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.34
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 803,
"timestamp": "2026-01-01T18:39:00Z",
"transaction_amount_usd": 27841.08
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.372,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 748949.34,
"financial_exposure_usd": 1441590.39,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107752",
"label": "benign",
"label_confidence": 0.67,
"severity": "low",
"timestamp": "2026-01-06T09:12:00Z",
"trace_id": "34d558eb-7cd7-77a3-5377-421a7cf5ebcb"
} | {
"account_age_days": 519,
"account_id": "ACCT-E83D71B8203E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.331
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 95,
"timestamp": "2026-01-06T09:12:00Z",
"transaction_amount_usd": 12618.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 710.09,
"financial_exposure_usd": 761.52,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103510",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-03T10:30:00Z",
"trace_id": "2b43f834-c44a-698b-3417-d28668450457"
} | {
"account_age_days": 1316,
"account_id": "ACCT-7EB29587D7B5",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 368,
"timestamp": "2026-01-03T10:30:00Z",
"transaction_amount_usd": 1083159.79
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1343416.31,
"financial_exposure_usd": 1551926.3,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109470",
"label": "benign",
"label_confidence": 0.748,
"severity": "medium",
"timestamp": "2026-01-07T13:50:00Z",
"trace_id": "264f704c-ba41-9633-d436-df23d813cab2"
} | {
"account_age_days": 1302,
"account_id": "ACCT-375AF24A624D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 935,
"timestamp": "2026-01-07T13:50:00Z",
"transaction_amount_usd": 7114.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1415.58,
"financial_exposure_usd": 2223.46,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105922",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-05T02:42:00Z",
"trace_id": "3f2c9614-a90f-746b-93c2-41c0832a5503"
} | {
"account_age_days": 1922,
"account_id": "ACCT-C2FE3A9B6F93",
"baseline_risk_score": 0.216,
"kyc_tier": "tier_1",
"session_entropy": 0.229
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1032,
"timestamp": "2026-01-05T02:42:00Z",
"transaction_amount_usd": 2527366.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.505,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4512718.13,
"financial_exposure_usd": 6381878.96,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101403",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "medium",
"timestamp": "2026-01-01T23:23:00Z",
"trace_id": "ad0d0ba7-56fe-982a-0204-05a732598491"
} | {
"account_age_days": 1141,
"account_id": "ACCT-DA7F1A73F318",
"baseline_risk_score": 0.297,
"kyc_tier": "tier_2",
"session_entropy": 0.548
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 226,
"timestamp": "2026-01-01T17:27:00Z",
"transaction_amount_usd": 7.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.581,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 647659.58,
"financial_exposure_usd": 686809.32,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105788",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "critical",
"timestamp": "2026-01-05T00:28:00Z",
"trace_id": "675dee0f-dd9d-00b4-247f-aa0fb0e10435"
} | {
"account_age_days": 683,
"account_id": "ACCT-F2C9387E6252",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_2",
"session_entropy": 0.747
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 728,
"timestamp": "2026-01-05T00:28:00Z",
"transaction_amount_usd": 1160900.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5253956.5,
"financial_exposure_usd": 8182066.78,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102022",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-02T09:42:00Z",
"trace_id": "2a972784-6321-cd64-3fff-89118c1a6e52"
} | {
"account_age_days": 595,
"account_id": "ACCT-24128B885E66",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_3",
"session_entropy": 0.396
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 187,
"timestamp": "2026-01-02T09:42:00Z",
"transaction_amount_usd": 49890.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 423485.12,
"financial_exposure_usd": 577511.84,
"recoverable_pct": 0.239
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101926",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-02T08:06:00Z",
"trace_id": "fac90c31-e039-67f9-f399-afa0b7f15b2d"
} | {
"account_age_days": 1631,
"account_id": "ACCT-473A7CF2D748",
"baseline_risk_score": 0.534,
"kyc_tier": "tier_1",
"session_entropy": 0.135
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 120,
"timestamp": "2026-01-02T02:03:00Z",
"transaction_amount_usd": 2.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 577577.55,
"financial_exposure_usd": 923360.43,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103631",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-03T12:31:00Z",
"trace_id": "9070142b-1726-47db-8a50-a75af2c5cbc1"
} | {
"account_age_days": 1280,
"account_id": "ACCT-FADAF25D5DB4",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_2",
"session_entropy": 0.898
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 480,
"timestamp": "2026-01-03T12:31:00Z",
"transaction_amount_usd": 1266976.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2269468.55,
"financial_exposure_usd": 2977291.65,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108777",
"label": "benign",
"label_confidence": 0.577,
"severity": "high",
"timestamp": "2026-01-07T02:17:00Z",
"trace_id": "078c4284-b814-1066-78eb-41fb74d97874"
} | {
"account_age_days": 1727,
"account_id": "ACCT-696E469B09A8",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 581,
"timestamp": "2026-01-07T02:17:00Z",
"transaction_amount_usd": 13872.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 222.01,
"financial_exposure_usd": 452.65,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101646",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-02T03:26:00Z",
"trace_id": "8e775935-ed0f-73be-e5a2-32ceac96ef27"
} | {
"account_age_days": 1774,
"account_id": "ACCT-70341F99E70A",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_1",
"session_entropy": 0.42
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 86,
"timestamp": "2026-01-01T20:15:00Z",
"transaction_amount_usd": 0.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.506,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 474631.29,
"financial_exposure_usd": 523337.92,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.