schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100214",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-01T03:34:00Z",
"trace_id": "321e2462-55a0-db97-419b-73339b8ce31b"
} | {
"account_age_days": 1166,
"account_id": "ACCT-71EF7E0A4DAE",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_1",
"session_entropy": 0.424
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1128,
"timestamp": "2026-01-01T03:34:00Z",
"transaction_amount_usd": 47419.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1069892.34,
"financial_exposure_usd": 1358656.82,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102910",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-03T00:30:00Z",
"trace_id": "7bf19b1e-e34b-c839-6abf-dd905368276d"
} | {
"account_age_days": 1534,
"account_id": "ACCT-47DCB23CC524",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_1",
"session_entropy": 0.636
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 910,
"timestamp": "2026-01-03T00:30:00Z",
"transaction_amount_usd": 29861.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 357160.2,
"financial_exposure_usd": 572323.09,
"recoverable_pct": 0.326
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102008",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "critical",
"timestamp": "2026-01-02T09:28:00Z",
"trace_id": "5fab4fcd-1642-69ba-2757-4d61ebf4cce3"
} | {
"account_age_days": 1174,
"account_id": "ACCT-6BD320DABEA0",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.517
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 385,
"timestamp": "2026-01-02T09:28:00Z",
"transaction_amount_usd": 81847.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.531,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 748050.37,
"financial_exposure_usd": 873426.68,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106025",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-05T04:25:00Z",
"trace_id": "f18c2543-fbd8-0969-2592-fc7a167b88b7"
} | {
"account_age_days": 1498,
"account_id": "ACCT-D9DBB2CDBD7A",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_2",
"session_entropy": 0.522
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 108,
"timestamp": "2026-01-05T04:25:00Z",
"transaction_amount_usd": 2908395.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.707,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2706204.78,
"financial_exposure_usd": 5789217.31,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101705",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-02T04:25:00Z",
"trace_id": "8815174c-482c-44c8-8058-1737c9a50570"
} | {
"account_age_days": 1490,
"account_id": "ACCT-36079E8F5F96",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1168,
"timestamp": "2026-01-02T04:25:00Z",
"transaction_amount_usd": 116664.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.873,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 152757.62,
"financial_exposure_usd": 317607.76,
"recoverable_pct": 0.351
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104568",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "critical",
"timestamp": "2026-01-04T04:08:00Z",
"trace_id": "a2d49178-c0ae-9fdf-2be9-f28e444a6d94"
} | {
"account_age_days": 291,
"account_id": "ACCT-C10C3B217B60",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_3",
"session_entropy": 0.32
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 358,
"timestamp": "2026-01-03T17:29:00Z",
"transaction_amount_usd": 16.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.376,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3274096.9,
"financial_exposure_usd": 4955187.07,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102691",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-02T20:51:00Z",
"trace_id": "e7b4b41f-1b41-ee90-b7bf-4b6fc7f45b69"
} | {
"account_age_days": 1312,
"account_id": "ACCT-601435387992",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.386
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 817,
"timestamp": "2026-01-02T20:51:00Z",
"transaction_amount_usd": 110692.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.744,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 282348.05,
"financial_exposure_usd": 306528.81,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108862",
"label": "benign",
"label_confidence": 0.49,
"severity": "critical",
"timestamp": "2026-01-07T03:42:00Z",
"trace_id": "9b513786-8f7f-0dbf-bed2-180b4fd63fa7"
} | {
"account_age_days": 1755,
"account_id": "ACCT-8FB1184C8021",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.294
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 495,
"timestamp": "2026-01-07T03:42:00Z",
"transaction_amount_usd": 3793.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1931.07,
"financial_exposure_usd": 4214.43,
"recoverable_pct": 0.899
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104709",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-04T06:29:00Z",
"trace_id": "434ffcb6-3e26-447a-9513-3ed812f27923"
} | {
"account_age_days": 748,
"account_id": "ACCT-AEEA4AD9F359",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.731
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 246,
"timestamp": "2026-01-03T21:13:00Z",
"transaction_amount_usd": 5.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.798,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3958721.4,
"financial_exposure_usd": 5182138.96,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106853",
"label": "benign",
"label_confidence": 0.687,
"severity": "low",
"timestamp": "2026-01-05T18:13:00Z",
"trace_id": "7b64e506-b38d-3010-3c6c-7be68fe025bb"
} | {
"account_age_days": 829,
"account_id": "ACCT-68052AC69E17",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 90,
"timestamp": "2026-01-05T18:13:00Z",
"transaction_amount_usd": 6358.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2290.45,
"financial_exposure_usd": 5465.24,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104949",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-04T10:29:00Z",
"trace_id": "02513747-7633-4807-a9e4-92d043391558"
} | {
"account_age_days": 1793,
"account_id": "ACCT-BE7E25E1BC12",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.472
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 346,
"timestamp": "2026-01-04T10:29:00Z",
"transaction_amount_usd": 1956456.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.636,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1473681.41,
"financial_exposure_usd": 2691985.4,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101123",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "low",
"timestamp": "2026-01-01T18:43:00Z",
"trace_id": "1d681271-308b-4dc5-e9da-216508442fc1"
} | {
"account_age_days": 1279,
"account_id": "ACCT-3E875B982D47",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 315,
"timestamp": "2026-01-01T18:43:00Z",
"transaction_amount_usd": 108095.43
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 586262.38,
"financial_exposure_usd": 1049795.39,
"recoverable_pct": 0.085
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106676",
"label": "benign",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-05T15:16:00Z",
"trace_id": "18241a38-baa9-ce85-2c5a-7799f89e79d8"
} | {
"account_age_days": 926,
"account_id": "ACCT-6C243485A069",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_3",
"session_entropy": 0.139
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 312,
"timestamp": "2026-01-05T12:54:00Z",
"transaction_amount_usd": 8.08
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 924.99,
"financial_exposure_usd": 1855.31,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108757",
"label": "benign",
"label_confidence": 0.547,
"severity": "low",
"timestamp": "2026-01-07T01:57:00Z",
"trace_id": "ddbcdf2c-398a-09b9-eb47-5066d43a7d89"
} | {
"account_age_days": 1631,
"account_id": "ACCT-86204B2F17B9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.829
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 194,
"timestamp": "2026-01-07T01:57:00Z",
"transaction_amount_usd": 2294.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2935.65,
"financial_exposure_usd": 4635.7,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103610",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-03T12:10:00Z",
"trace_id": "3044669c-2e68-d643-ae70-26f40ed53453"
} | {
"account_age_days": 1571,
"account_id": "ACCT-E8AC93ECD385",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 966,
"timestamp": "2026-01-03T12:10:00Z",
"transaction_amount_usd": 250144.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.89,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4355218.59,
"financial_exposure_usd": 5848071.9,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104052",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "high",
"timestamp": "2026-01-03T19:32:00Z",
"trace_id": "f3b69560-d547-9b7a-e45d-b634777eb74d"
} | {
"account_age_days": 1674,
"account_id": "ACCT-39396B3D0A4E",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.871
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 365,
"timestamp": "2026-01-03T19:32:00Z",
"transaction_amount_usd": 64682.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.847,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2119301.61,
"financial_exposure_usd": 3491464.14,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107172",
"label": "benign",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-05T23:32:00Z",
"trace_id": "604b7491-4b90-34fb-fbea-a9996d79d301"
} | {
"account_age_days": 773,
"account_id": "ACCT-8830DB81C82C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 230,
"timestamp": "2026-01-05T23:32:00Z",
"transaction_amount_usd": 2445.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2846.5,
"financial_exposure_usd": 4475.16,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105579",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-04T20:59:00Z",
"trace_id": "a41a99f3-4bff-0644-59bf-adf0e0282433"
} | {
"account_age_days": 789,
"account_id": "ACCT-016EE54989CA",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_2",
"session_entropy": 0.439
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 269,
"timestamp": "2026-01-04T19:36:00Z",
"transaction_amount_usd": 7.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3524050.46,
"financial_exposure_usd": 5149753.86,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104466",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-04T02:26:00Z",
"trace_id": "5bfbc8a9-800e-deac-7ef9-07048860d8ab"
} | {
"account_age_days": 449,
"account_id": "ACCT-49880512711D",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_2",
"session_entropy": 0.105
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 291,
"timestamp": "2026-01-03T18:08:00Z",
"transaction_amount_usd": 16.42
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3077679.98,
"financial_exposure_usd": 5689182.5,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109148",
"label": "benign",
"label_confidence": 0.652,
"severity": "low",
"timestamp": "2026-01-07T08:28:00Z",
"trace_id": "f0133fb3-d057-ad46-24b6-7faf2a76cd3d"
} | {
"account_age_days": 82,
"account_id": "ACCT-09555A7FDC6E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.783
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 573,
"timestamp": "2026-01-07T08:28:00Z",
"transaction_amount_usd": 11281.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4802.07,
"financial_exposure_usd": 4915.42,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105890",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-05T02:10:00Z",
"trace_id": "8787903d-b0a6-1e9e-8907-b02e48dc6446"
} | {
"account_age_days": 378,
"account_id": "ACCT-C7C4EC21DB6B",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_2",
"session_entropy": 0.322
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 676,
"timestamp": "2026-01-05T02:10:00Z",
"transaction_amount_usd": 371268.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4694686.02,
"financial_exposure_usd": 5906556.34,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104641",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-04T05:21:00Z",
"trace_id": "4f7f9fc5-891c-a50e-fc00-1ef0a2bcd36d"
} | {
"account_age_days": 955,
"account_id": "ACCT-9CFE5803E994",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 128,
"timestamp": "2026-01-03T21:09:00Z",
"transaction_amount_usd": 13.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2650142.84,
"financial_exposure_usd": 5486278.27,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107874",
"label": "benign",
"label_confidence": 0.591,
"severity": "medium",
"timestamp": "2026-01-06T11:14:00Z",
"trace_id": "8adab21e-3d14-a05b-aeef-12b8f11b68be"
} | {
"account_age_days": 103,
"account_id": "ACCT-08F9C25B187C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.763
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 375,
"timestamp": "2026-01-06T11:14:00Z",
"transaction_amount_usd": 1021.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 567.63,
"financial_exposure_usd": 1296.1,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107107",
"label": "benign",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-05T22:27:00Z",
"trace_id": "2a61abcd-6abf-4223-7f39-cf2f1c4e572c"
} | {
"account_age_days": 1702,
"account_id": "ACCT-36632DC52EF7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 253,
"timestamp": "2026-01-05T22:27:00Z",
"transaction_amount_usd": 9339.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.494,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1581.67,
"financial_exposure_usd": 2202.46,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107571",
"label": "benign",
"label_confidence": 0.571,
"severity": "medium",
"timestamp": "2026-01-06T06:11:00Z",
"trace_id": "4d25e585-eed8-c26e-8255-821a7356cce0"
} | {
"account_age_days": 490,
"account_id": "ACCT-A799C80CABFF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 197,
"timestamp": "2026-01-06T03:54:00Z",
"transaction_amount_usd": 1.55
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3304.46,
"financial_exposure_usd": 5821.09,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101582",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-02T02:22:00Z",
"trace_id": "13d13180-9664-be4e-16cc-ac9f627e80ae"
} | {
"account_age_days": 1465,
"account_id": "ACCT-3F7D0217F1A8",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_3",
"session_entropy": 0.909
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 319,
"timestamp": "2026-01-02T02:22:00Z",
"transaction_amount_usd": 81868.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 574517.05,
"financial_exposure_usd": 955068.93,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103820",
"label": "fraudulent",
"label_confidence": 0.611,
"severity": "high",
"timestamp": "2026-01-03T15:40:00Z",
"trace_id": "851b9934-a9e1-68ab-8283-f88d660c2ec9"
} | {
"account_age_days": 521,
"account_id": "ACCT-A59D44A85207",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.852
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1069,
"timestamp": "2026-01-03T15:40:00Z",
"transaction_amount_usd": 2739517.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.705,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1317836.87,
"financial_exposure_usd": 1338269.58,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103798",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-03T15:18:00Z",
"trace_id": "b2e66a8e-a772-a9d6-22e0-637bac7689a1"
} | {
"account_age_days": 1341,
"account_id": "ACCT-94A00A8F44C0",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 171,
"timestamp": "2026-01-03T15:18:00Z",
"transaction_amount_usd": 2802294.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1083158.55,
"financial_exposure_usd": 2623639.16,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109968",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-07T22:08:00Z",
"trace_id": "5aa9453c-1dc0-a3a6-110c-86e3f08155a8"
} | {
"account_age_days": 1582,
"account_id": "ACCT-6A077B87FB2A",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.248
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1020,
"timestamp": "2026-01-07T22:08:00Z",
"transaction_amount_usd": 3089.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3591.38,
"financial_exposure_usd": 4967.45,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109001",
"label": "benign",
"label_confidence": 0.474,
"severity": "medium",
"timestamp": "2026-01-07T06:01:00Z",
"trace_id": "9636a650-c605-0c0b-0a8f-9fb4603ca2ad"
} | {
"account_age_days": 1026,
"account_id": "ACCT-05C71C9DA37C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.619
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 400,
"timestamp": "2026-01-06T22:34:00Z",
"transaction_amount_usd": 22.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4520.47,
"financial_exposure_usd": 6722.65,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104239",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-03T22:39:00Z",
"trace_id": "63c9bd5e-2fbe-fe2e-9657-c415c2887ec1"
} | {
"account_age_days": 318,
"account_id": "ACCT-C9016F891266",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_1",
"session_entropy": 0.796
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 797,
"timestamp": "2026-01-03T22:39:00Z",
"transaction_amount_usd": 1902772.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.598,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3911290.41,
"financial_exposure_usd": 4208183.47,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104238",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-03T22:38:00Z",
"trace_id": "572033f2-fcec-b0b8-272c-226ff5029cd5"
} | {
"account_age_days": 1404,
"account_id": "ACCT-13DDDECCA837",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_3",
"session_entropy": 0.896
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 198,
"timestamp": "2026-01-03T22:38:00Z",
"transaction_amount_usd": 1102336.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.705,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2391036.26,
"financial_exposure_usd": 3387881.2,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100841",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "low",
"timestamp": "2026-01-01T14:01:00Z",
"trace_id": "7dcfeaf5-0203-c4d1-6fcc-67e292b5e051"
} | {
"account_age_days": 1828,
"account_id": "ACCT-B24884CFDDD8",
"baseline_risk_score": 0.459,
"kyc_tier": "tier_3",
"session_entropy": 0.917
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 547,
"timestamp": "2026-01-01T14:01:00Z",
"transaction_amount_usd": 11838.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.877,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1135436.91,
"financial_exposure_usd": 1155578.12,
"recoverable_pct": 0.138
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103379",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-03T08:19:00Z",
"trace_id": "3dbc80c1-1d20-2b8a-2396-0601971fc0d2"
} | {
"account_age_days": 95,
"account_id": "ACCT-E6DFDC2D4313",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 142,
"timestamp": "2026-01-03T03:28:00Z",
"transaction_amount_usd": 14.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3631893.24,
"financial_exposure_usd": 5784747.3,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109129",
"label": "benign",
"label_confidence": 0.653,
"severity": "high",
"timestamp": "2026-01-07T08:09:00Z",
"trace_id": "db61e74d-253c-c638-20c1-c1200529fcdb"
} | {
"account_age_days": 261,
"account_id": "ACCT-5ACB2B54DC0A",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.236
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 622,
"timestamp": "2026-01-07T08:09:00Z",
"transaction_amount_usd": 13862.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3128.07,
"financial_exposure_usd": 4571.26,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106385",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "medium",
"timestamp": "2026-01-05T10:25:00Z",
"trace_id": "afdc0f7f-e7c5-1e4c-7ac0-6f038349ea04"
} | {
"account_age_days": 150,
"account_id": "ACCT-69B666597912",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 238,
"timestamp": "2026-01-05T10:25:00Z",
"transaction_amount_usd": 150586.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2014970.89,
"financial_exposure_usd": 4007643.43,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105868",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "low",
"timestamp": "2026-01-05T01:48:00Z",
"trace_id": "73981e11-f8a7-a5ac-a49d-d30b9729c8a3"
} | {
"account_age_days": 1848,
"account_id": "ACCT-9EF4CBDCD8BB",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_2",
"session_entropy": 0.91
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 887,
"timestamp": "2026-01-05T01:48:00Z",
"transaction_amount_usd": 1606304.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.861,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1802858,
"financial_exposure_usd": 2707545.68,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102353",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "medium",
"timestamp": "2026-01-02T15:13:00Z",
"trace_id": "9389ca8e-1b03-5052-acda-a5490c2e87e9"
} | {
"account_age_days": 1968,
"account_id": "ACCT-60428EB44210",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.676
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 661,
"timestamp": "2026-01-02T15:13:00Z",
"transaction_amount_usd": 62727.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 468585.8,
"financial_exposure_usd": 472250.06,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108125",
"label": "benign",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-06T15:25:00Z",
"trace_id": "e4b7aca3-b55a-8401-b0e6-133f2c374b40"
} | {
"account_age_days": 868,
"account_id": "ACCT-6B5CF2B8A3C6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.664
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 356,
"timestamp": "2026-01-06T11:34:00Z",
"transaction_amount_usd": 22.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.619,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2230.98,
"financial_exposure_usd": 2484.44,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100223",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "low",
"timestamp": "2026-01-01T03:43:00Z",
"trace_id": "71497c71-71b2-b47a-b661-7c506895b96f"
} | {
"account_age_days": 348,
"account_id": "ACCT-42862014FF41",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_1",
"session_entropy": 0.507
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 636,
"timestamp": "2026-01-01T03:43:00Z",
"transaction_amount_usd": 46444.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 309439.24,
"financial_exposure_usd": 340964.28,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107417",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-06T03:37:00Z",
"trace_id": "cec2ea27-06aa-dead-f069-a2ed9b7f92e1"
} | {
"account_age_days": 1363,
"account_id": "ACCT-8872F71C78C3",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_3",
"session_entropy": 0.349
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 484,
"timestamp": "2026-01-06T03:37:00Z",
"transaction_amount_usd": 14214.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1184.78,
"financial_exposure_usd": 1734.32,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101673",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-02T03:53:00Z",
"trace_id": "e966525a-4a69-becd-20d4-4d07a1cac7c7"
} | {
"account_age_days": 144,
"account_id": "ACCT-E4A327E0C41D",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 310,
"timestamp": "2026-01-01T18:21:00Z",
"transaction_amount_usd": 23.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.808,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 580271.11,
"financial_exposure_usd": 682836.01,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106286",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-05T08:46:00Z",
"trace_id": "c7db4cfa-187e-fcaf-6a1c-8ab707d5ef72"
} | {
"account_age_days": 1916,
"account_id": "ACCT-C0F0021A8ABA",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_1",
"session_entropy": 0.933
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 151,
"timestamp": "2026-01-04T20:03:00Z",
"transaction_amount_usd": 6.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.852,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5092086.02,
"financial_exposure_usd": 7356926.74,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102784",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-02T22:24:00Z",
"trace_id": "6a72abf0-0aa1-7862-e399-59eacdf8f0a0"
} | {
"account_age_days": 1746,
"account_id": "ACCT-47395AB88623",
"baseline_risk_score": 0.565,
"kyc_tier": "tier_1",
"session_entropy": 0.805
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 266,
"timestamp": "2026-01-02T22:24:00Z",
"transaction_amount_usd": 103786.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.38,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 878653.24,
"financial_exposure_usd": 1178285.42,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105449",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "critical",
"timestamp": "2026-01-04T18:49:00Z",
"trace_id": "0f11134d-137c-55ca-1553-311869e07775"
} | {
"account_age_days": 850,
"account_id": "ACCT-315AF894FA8D",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.114
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 100,
"timestamp": "2026-01-04T18:49:00Z",
"transaction_amount_usd": 474245.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1782203.29,
"financial_exposure_usd": 3787111.15,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108605",
"label": "benign",
"label_confidence": 0.457,
"severity": "high",
"timestamp": "2026-01-06T23:25:00Z",
"trace_id": "8738d0d3-825d-6842-12eb-2c1188826321"
} | {
"account_age_days": 1103,
"account_id": "ACCT-2FB88FD5877E",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_3",
"session_entropy": 0.542
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 473,
"timestamp": "2026-01-06T23:25:00Z",
"transaction_amount_usd": 3324.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 431.6,
"financial_exposure_usd": 861.17,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100499",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-01T08:19:00Z",
"trace_id": "2e550f0d-f790-d5c2-dd8e-877b1ec1e6f0"
} | {
"account_age_days": 245,
"account_id": "ACCT-F784E47A276D",
"baseline_risk_score": 0.643,
"kyc_tier": "tier_1",
"session_entropy": 0.322
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1111,
"timestamp": "2026-01-01T08:19:00Z",
"transaction_amount_usd": 15683.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.8,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 168330.27,
"financial_exposure_usd": 229208.46,
"recoverable_pct": 0.075
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104475",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "low",
"timestamp": "2026-01-04T02:35:00Z",
"trace_id": "11208a07-fe9d-7ac1-f9ff-2a86cd398c7a"
} | {
"account_age_days": 345,
"account_id": "ACCT-436718B7DD9D",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_1",
"session_entropy": 0.259
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 194,
"timestamp": "2026-01-04T02:35:00Z",
"transaction_amount_usd": 2160248.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3584407.98,
"financial_exposure_usd": 5293749.32,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106648",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-05T14:48:00Z",
"trace_id": "3dc28d8a-005b-e776-ce9f-5cae61655b14"
} | {
"account_age_days": 1604,
"account_id": "ACCT-36B7574431BD",
"baseline_risk_score": 0.249,
"kyc_tier": "tier_2",
"session_entropy": 0.888
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 328,
"timestamp": "2026-01-05T09:03:00Z",
"transaction_amount_usd": 17.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.712,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4476396.52,
"financial_exposure_usd": 6546332,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109009",
"label": "benign",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-07T06:09:00Z",
"trace_id": "eba577bd-15c8-21cc-f5c6-2b1b63709982"
} | {
"account_age_days": 260,
"account_id": "ACCT-42093459CD7A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.235
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 225,
"timestamp": "2026-01-07T06:09:00Z",
"transaction_amount_usd": 6435.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.748,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 553.05,
"financial_exposure_usd": 1340.54,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106532",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "low",
"timestamp": "2026-01-05T12:52:00Z",
"trace_id": "2153cf9e-175c-738e-e9e1-8f2f98bf69ed"
} | {
"account_age_days": 335,
"account_id": "ACCT-57456FF35444",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.311
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1065,
"timestamp": "2026-01-05T12:52:00Z",
"transaction_amount_usd": 656469.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.935,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 769506.45,
"financial_exposure_usd": 1206370.87,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106027",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-05T04:27:00Z",
"trace_id": "58669401-9a6d-0830-122a-f57cfe53c383"
} | {
"account_age_days": 1617,
"account_id": "ACCT-3472DA22CA75",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 911,
"timestamp": "2026-01-05T04:27:00Z",
"transaction_amount_usd": 1238002.59
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.526,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1716233.57,
"financial_exposure_usd": 4233149.26,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103393",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-03T08:33:00Z",
"trace_id": "1656b3eb-5a89-a3c9-d978-0878ac712885"
} | {
"account_age_days": 1390,
"account_id": "ACCT-21E1D1D01843",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_3",
"session_entropy": 0.459
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 123,
"timestamp": "2026-01-03T00:54:00Z",
"transaction_amount_usd": 21.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.657,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4081264.64,
"financial_exposure_usd": 5385567.37,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105872",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "low",
"timestamp": "2026-01-05T01:52:00Z",
"trace_id": "99fff755-d1c1-c364-942c-940eab55a7e7"
} | {
"account_age_days": 598,
"account_id": "ACCT-AC47B8DA79A7",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.734
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 135,
"timestamp": "2026-01-05T01:52:00Z",
"transaction_amount_usd": 1919420.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.509,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4738502.29,
"financial_exposure_usd": 6403876.02,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101024",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-01T17:04:00Z",
"trace_id": "6761d7f0-c3d2-4f49-ba5d-db0a03375e28"
} | {
"account_age_days": 1828,
"account_id": "ACCT-5E1B47416ED9",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.608
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 698,
"timestamp": "2026-01-01T17:04:00Z",
"transaction_amount_usd": 18581.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.46,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 537066.43,
"financial_exposure_usd": 785322.39,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102971",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "high",
"timestamp": "2026-01-03T01:31:00Z",
"trace_id": "e39865e0-fc93-822c-9187-10198c64ce5d"
} | {
"account_age_days": 1102,
"account_id": "ACCT-ECEC65AB539C",
"baseline_risk_score": 0.552,
"kyc_tier": "tier_1",
"session_entropy": 0.878
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 395,
"timestamp": "2026-01-03T01:31:00Z",
"transaction_amount_usd": 103874.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 274387.93,
"financial_exposure_usd": 483819.83,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103397",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "high",
"timestamp": "2026-01-03T08:37:00Z",
"trace_id": "7373db4a-f165-f82a-e48f-39f70e478082"
} | {
"account_age_days": 1182,
"account_id": "ACCT-AA067EECA67D",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 144,
"timestamp": "2026-01-03T08:37:00Z",
"transaction_amount_usd": 1719983.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.95,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2712726.9,
"financial_exposure_usd": 4619756.14,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105522",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-04T20:02:00Z",
"trace_id": "e90f56fd-051a-a5af-3d6f-f68c8561d9c4"
} | {
"account_age_days": 1906,
"account_id": "ACCT-66B1A93EC72E",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.356
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 965,
"timestamp": "2026-01-04T20:02:00Z",
"transaction_amount_usd": 2877706.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.431,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3999736.18,
"financial_exposure_usd": 5284584.55,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104602",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-04T04:42:00Z",
"trace_id": "02afdc5c-e8aa-0ed0-db0e-483983bc7a3d"
} | {
"account_age_days": 1436,
"account_id": "ACCT-59AE4A593AE3",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.533
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 745,
"timestamp": "2026-01-04T04:42:00Z",
"transaction_amount_usd": 84607.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4201339.14,
"financial_exposure_usd": 5102035.55,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100474",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-01T07:54:00Z",
"trace_id": "ccec13a7-22e4-4299-16aa-995440bcc972"
} | {
"account_age_days": 223,
"account_id": "ACCT-1DF4D71F3031",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_3",
"session_entropy": 0.801
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 384,
"timestamp": "2025-12-31T19:53:00Z",
"transaction_amount_usd": 0.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.871,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 281862.03,
"financial_exposure_usd": 398176.48,
"recoverable_pct": 0.06
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101785",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-02T05:45:00Z",
"trace_id": "f2c75df0-700c-0448-e856-dad2ec40daa2"
} | {
"account_age_days": 125,
"account_id": "ACCT-B699E0535447",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.879
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1045,
"timestamp": "2026-01-02T05:45:00Z",
"transaction_amount_usd": 104337.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 530199.27,
"financial_exposure_usd": 833613.56,
"recoverable_pct": 0.154
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103109",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-03T03:49:00Z",
"trace_id": "aa13f8e8-9f1e-db3f-276c-b5f1dfb53b55"
} | {
"account_age_days": 57,
"account_id": "ACCT-D6DC7EC2AC73",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_2",
"session_entropy": 0.305
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 312,
"timestamp": "2026-01-03T03:49:00Z",
"transaction_amount_usd": 103710.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.608,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 698484.85,
"financial_exposure_usd": 725247.99,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100623",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-01T10:23:00Z",
"trace_id": "f1001fd6-f303-a65f-ce83-7e3c84bdb077"
} | {
"account_age_days": 564,
"account_id": "ACCT-3A384FA686E2",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.936
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 651,
"timestamp": "2026-01-01T10:23:00Z",
"transaction_amount_usd": 12186.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.73,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 697599.41,
"financial_exposure_usd": 890663.73,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106995",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-05T20:35:00Z",
"trace_id": "a5758b32-2c2c-d9d0-c48c-f4e55505483a"
} | {
"account_age_days": 1523,
"account_id": "ACCT-625EFE070813",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.948
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 119,
"timestamp": "2026-01-05T11:30:00Z",
"transaction_amount_usd": 13.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.453,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3918.65,
"financial_exposure_usd": 6446.3,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102388",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-02T15:48:00Z",
"trace_id": "ce359d32-781d-8347-143a-a3b4792400be"
} | {
"account_age_days": 1445,
"account_id": "ACCT-674818EB7078",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 80,
"timestamp": "2026-01-02T15:48:00Z",
"transaction_amount_usd": 28931.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 748030.28,
"financial_exposure_usd": 811486.66,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102645",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "critical",
"timestamp": "2026-01-02T20:05:00Z",
"trace_id": "fb973250-53fd-6e70-6443-daff33dccc07"
} | {
"account_age_days": 473,
"account_id": "ACCT-0F32775B46C2",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_2",
"session_entropy": 0.597
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 667,
"timestamp": "2026-01-02T20:05:00Z",
"transaction_amount_usd": 104964.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 336397.26,
"financial_exposure_usd": 609676.16,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105647",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-04T22:07:00Z",
"trace_id": "9bb74d74-6ce6-d360-be1d-7c7c5b6c4415"
} | {
"account_age_days": 1474,
"account_id": "ACCT-CDEDDBD65A47",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_1",
"session_entropy": 0.531
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 365,
"timestamp": "2026-01-04T22:07:00Z",
"transaction_amount_usd": 1975317.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.538,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3729091.89,
"financial_exposure_usd": 4421569.29,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103559",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-03T11:19:00Z",
"trace_id": "c5f6d931-ac5a-c2b4-3015-4e6d18e95409"
} | {
"account_age_days": 1624,
"account_id": "ACCT-84D15D519FB9",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_3",
"session_entropy": 0.355
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 832,
"timestamp": "2026-01-03T11:19:00Z",
"transaction_amount_usd": 1362346
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.364,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1146577.38,
"financial_exposure_usd": 1917728.52,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109685",
"label": "benign",
"label_confidence": 0.549,
"severity": "high",
"timestamp": "2026-01-07T17:25:00Z",
"trace_id": "df218506-1c2b-8d11-a997-ebb60aeaeb75"
} | {
"account_age_days": 1749,
"account_id": "ACCT-6ACB5ECC7A84",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 890,
"timestamp": "2026-01-07T17:25:00Z",
"transaction_amount_usd": 2892.76
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1083.38,
"financial_exposure_usd": 1980.57,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100981",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "high",
"timestamp": "2026-01-01T16:21:00Z",
"trace_id": "b00be074-4dfe-a1ad-a5cd-488d9e78bc4b"
} | {
"account_age_days": 1308,
"account_id": "ACCT-0D26C3B62053",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.732
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 1074,
"timestamp": "2026-01-01T16:21:00Z",
"transaction_amount_usd": 68736.38
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 797423.3,
"financial_exposure_usd": 1033850.63,
"recoverable_pct": 0.08
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105045",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-04T12:05:00Z",
"trace_id": "5cd47b43-38c7-553a-daa7-9d69ebafdc69"
} | {
"account_age_days": 1421,
"account_id": "ACCT-72C6840FD6FD",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_3",
"session_entropy": 0.822
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1091,
"timestamp": "2026-01-04T12:05:00Z",
"transaction_amount_usd": 674462.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.866,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3449886.8,
"financial_exposure_usd": 4088986.08,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104281",
"label": "fraudulent",
"label_confidence": 0.611,
"severity": "medium",
"timestamp": "2026-01-03T23:21:00Z",
"trace_id": "ed7daf87-d6a8-7d77-6f74-27ccb8537967"
} | {
"account_age_days": 1797,
"account_id": "ACCT-89C229403D0B",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 466,
"timestamp": "2026-01-03T23:21:00Z",
"transaction_amount_usd": 351412.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.907,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3104593.04,
"financial_exposure_usd": 4396744.86,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107159",
"label": "benign",
"label_confidence": 0.624,
"severity": "high",
"timestamp": "2026-01-05T23:19:00Z",
"trace_id": "7cb3fe28-b0e1-bd6e-8e87-bbed615d0499"
} | {
"account_age_days": 1211,
"account_id": "ACCT-E858003C847E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.949
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 208,
"timestamp": "2026-01-05T19:00:00Z",
"transaction_amount_usd": 2.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5010.65,
"financial_exposure_usd": 5331.67,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108880",
"label": "benign",
"label_confidence": 0.464,
"severity": "medium",
"timestamp": "2026-01-07T04:00:00Z",
"trace_id": "7f4e8005-af9c-8ace-13f1-952ed5c098ee"
} | {
"account_age_days": 1012,
"account_id": "ACCT-D812FF36C300",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.273
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 565,
"timestamp": "2026-01-07T04:00:00Z",
"transaction_amount_usd": 5586.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.716,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 682.27,
"financial_exposure_usd": 1637.34,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102804",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "medium",
"timestamp": "2026-01-02T22:44:00Z",
"trace_id": "ab7bcf02-5d40-0b20-5abd-96dae31a85af"
} | {
"account_age_days": 211,
"account_id": "ACCT-F387589EC67F",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_1",
"session_entropy": 0.218
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 581,
"timestamp": "2026-01-02T22:44:00Z",
"transaction_amount_usd": 6021.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.532,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 464391.37,
"financial_exposure_usd": 700938.01,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102091",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-02T10:51:00Z",
"trace_id": "b1c55e8b-8350-e9aa-26a6-93f5db93d5d2"
} | {
"account_age_days": 981,
"account_id": "ACCT-49CFA4E8D852",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_3",
"session_entropy": 0.287
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 97,
"timestamp": "2026-01-02T03:07:00Z",
"transaction_amount_usd": 12.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.564,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 493224.9,
"financial_exposure_usd": 625816.35,
"recoverable_pct": 0.184
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107084",
"label": "benign",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-05T22:04:00Z",
"trace_id": "c705e0a4-8c64-aac2-02d9-a81f49e89a2e"
} | {
"account_age_days": 1944,
"account_id": "ACCT-736C5BC0022F",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.841
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1141,
"timestamp": "2026-01-05T22:04:00Z",
"transaction_amount_usd": 4433.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1008.59,
"financial_exposure_usd": 1312.86,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109197",
"label": "benign",
"label_confidence": 0.666,
"severity": "low",
"timestamp": "2026-01-07T09:17:00Z",
"trace_id": "89a07662-38cd-1ccd-8d3e-4b6a7c5b7476"
} | {
"account_age_days": 1335,
"account_id": "ACCT-E3875AEB936A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1091,
"timestamp": "2026-01-07T09:17:00Z",
"transaction_amount_usd": 328.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3343.74,
"financial_exposure_usd": 5888.64,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101455",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-02T00:15:00Z",
"trace_id": "343a9156-6cff-aea1-86eb-fff85e6a77a5"
} | {
"account_age_days": 1987,
"account_id": "ACCT-61EEC40CD955",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_3",
"session_entropy": 0.448
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 346,
"timestamp": "2026-01-01T16:55:00Z",
"transaction_amount_usd": 2.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 377337.7,
"financial_exposure_usd": 593812.98,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109238",
"label": "benign",
"label_confidence": 0.604,
"severity": "high",
"timestamp": "2026-01-07T09:58:00Z",
"trace_id": "a57fc4b6-53e7-252d-cb24-09275b943a52"
} | {
"account_age_days": 433,
"account_id": "ACCT-4D3E9F4DBF4E",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.789
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 218,
"timestamp": "2026-01-07T06:59:00Z",
"transaction_amount_usd": 7.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2764.79,
"financial_exposure_usd": 3132.94,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101159",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "critical",
"timestamp": "2026-01-01T19:19:00Z",
"trace_id": "fd1de5d6-653d-457d-2197-62ab8184b5a2"
} | {
"account_age_days": 190,
"account_id": "ACCT-2EAA6A7BD8FE",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_3",
"session_entropy": 0.474
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 358,
"timestamp": "2026-01-01T19:19:00Z",
"transaction_amount_usd": 36368.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.948,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 343259.08,
"financial_exposure_usd": 566132.53,
"recoverable_pct": 0.031
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105987",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "high",
"timestamp": "2026-01-05T03:47:00Z",
"trace_id": "82a00f85-96e2-769f-fa58-e5abc00e651e"
} | {
"account_age_days": 1752,
"account_id": "ACCT-895DFAF9F3EA",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.251
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 317,
"timestamp": "2026-01-05T03:47:00Z",
"transaction_amount_usd": 1848946.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.42,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 818113.09,
"financial_exposure_usd": 1626800.93,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103678",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-03T13:18:00Z",
"trace_id": "6f38fd9b-a898-9bb9-67ce-2870108ee989"
} | {
"account_age_days": 472,
"account_id": "ACCT-8E3857983847",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_2",
"session_entropy": 0.305
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 110,
"timestamp": "2026-01-03T13:18:00Z",
"transaction_amount_usd": 2808011.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.357,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2216991.67,
"financial_exposure_usd": 3383134.59,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102830",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-02T23:10:00Z",
"trace_id": "b8f22eb0-f507-c610-3c61-d2790e9516a3"
} | {
"account_age_days": 531,
"account_id": "ACCT-E321A5C3B824",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_3",
"session_entropy": 0.274
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 374,
"timestamp": "2026-01-02T12:44:00Z",
"transaction_amount_usd": 9.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.375,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 719326.31,
"financial_exposure_usd": 792346.27,
"recoverable_pct": 0.205
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106579",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-05T13:39:00Z",
"trace_id": "af0a58c3-80eb-f38c-e535-ec764dbcc857"
} | {
"account_age_days": 721,
"account_id": "ACCT-A20923DA6820",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_3",
"session_entropy": 0.319
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 839,
"timestamp": "2026-01-05T13:39:00Z",
"transaction_amount_usd": 1224485.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2180758.55,
"financial_exposure_usd": 3128192.8,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104801",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "low",
"timestamp": "2026-01-04T08:01:00Z",
"trace_id": "d1e00c6f-2627-ce39-cf40-deda018d06b3"
} | {
"account_age_days": 1864,
"account_id": "ACCT-814DD774DB68",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_2",
"session_entropy": 0.678
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 333,
"timestamp": "2026-01-04T08:01:00Z",
"transaction_amount_usd": 148057.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2506943.02,
"financial_exposure_usd": 3000934.52,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102170",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-02T12:10:00Z",
"trace_id": "5068314c-38fe-9c53-30bc-ca40cc4050a2"
} | {
"account_age_days": 1092,
"account_id": "ACCT-522604175215",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_1",
"session_entropy": 0.861
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 783,
"timestamp": "2026-01-02T12:10:00Z",
"transaction_amount_usd": 75614.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.667,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 280596.59,
"financial_exposure_usd": 494609.6,
"recoverable_pct": 0.281
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100237",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "low",
"timestamp": "2026-01-01T03:57:00Z",
"trace_id": "12962c6d-bd15-e59b-fef6-f9d788f47eed"
} | {
"account_age_days": 324,
"account_id": "ACCT-314A9ACE4677",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_1",
"session_entropy": 0.246
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 519,
"timestamp": "2026-01-01T03:57:00Z",
"transaction_amount_usd": 117123.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 295938.04,
"financial_exposure_usd": 330152.95,
"recoverable_pct": 0.168
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105740",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-04T23:40:00Z",
"trace_id": "d392e56b-f629-ab2c-c865-28757cec0b1f"
} | {
"account_age_days": 1768,
"account_id": "ACCT-C3B7E6C9A38E",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_2",
"session_entropy": 0.426
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1140,
"timestamp": "2026-01-04T23:40:00Z",
"transaction_amount_usd": 1565412.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.775,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3162874.85,
"financial_exposure_usd": 3300900.62,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105115",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-04T13:15:00Z",
"trace_id": "ef5fd3ff-0911-38a2-88b7-da3c86fa2d1f"
} | {
"account_age_days": 762,
"account_id": "ACCT-BFEC6D0892FB",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.642
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 113,
"timestamp": "2026-01-04T03:20:00Z",
"transaction_amount_usd": 18.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1642625,
"financial_exposure_usd": 3097159.72,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104560",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "medium",
"timestamp": "2026-01-04T04:00:00Z",
"trace_id": "cd462c42-ca55-3f67-450f-23ef0c2fb765"
} | {
"account_age_days": 872,
"account_id": "ACCT-9DE041074E59",
"baseline_risk_score": 0.249,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 274,
"timestamp": "2026-01-04T04:00:00Z",
"transaction_amount_usd": 2153046.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.764,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3411893.51,
"financial_exposure_usd": 4767397.75,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104839",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-04T08:39:00Z",
"trace_id": "5c69af1c-2c06-1789-3bb8-4343211a483c"
} | {
"account_age_days": 1102,
"account_id": "ACCT-6F710430E278",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_3",
"session_entropy": 0.768
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 200,
"timestamp": "2026-01-04T04:12:00Z",
"transaction_amount_usd": 5.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4413066.85,
"financial_exposure_usd": 5474000.05,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103459",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-03T09:39:00Z",
"trace_id": "7abd0298-5c1a-bcbb-2ee8-1ccaeb7883e4"
} | {
"account_age_days": 1374,
"account_id": "ACCT-7FE94EBFAEC6",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_1",
"session_entropy": 0.44
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 321,
"timestamp": "2026-01-02T22:15:00Z",
"transaction_amount_usd": 17.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.437,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4900939.17,
"financial_exposure_usd": 10045756.39,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108177",
"label": "benign",
"label_confidence": 0.567,
"severity": "low",
"timestamp": "2026-01-06T16:17:00Z",
"trace_id": "6b06a788-4b80-db1a-a7b1-68e51291b6d3"
} | {
"account_age_days": 507,
"account_id": "ACCT-2F3E15EE5EE6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.142
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 855,
"timestamp": "2026-01-06T16:17:00Z",
"transaction_amount_usd": 6248.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1763.27,
"financial_exposure_usd": 2348.14,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104246",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-03T22:46:00Z",
"trace_id": "a4ad6c1d-eda6-dd5a-06ba-f85ce773bc55"
} | {
"account_age_days": 1595,
"account_id": "ACCT-E7ECF954F505",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_1",
"session_entropy": 0.101
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 272,
"timestamp": "2026-01-03T22:46:00Z",
"transaction_amount_usd": 189072.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.382,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1761526.2,
"financial_exposure_usd": 2046000.27,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104476",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-04T02:36:00Z",
"trace_id": "f727c4fd-098a-65eb-fb10-a8388f611d64"
} | {
"account_age_days": 1416,
"account_id": "ACCT-C57BD99C491B",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.763
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 197,
"timestamp": "2026-01-04T02:36:00Z",
"transaction_amount_usd": 2791510.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3505574.87,
"financial_exposure_usd": 6700249.36,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101725",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "critical",
"timestamp": "2026-01-02T04:45:00Z",
"trace_id": "6e9f365e-eb4d-32cf-c934-07fc6f13b0fc"
} | {
"account_age_days": 93,
"account_id": "ACCT-C40C519763AF",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_1",
"session_entropy": 0.793
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1074,
"timestamp": "2026-01-02T04:45:00Z",
"transaction_amount_usd": 118110.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.389,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 620968.45,
"financial_exposure_usd": 799999.18,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100001",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-01T00:01:00Z",
"trace_id": "a3d70628-ece6-6fa2-fd51-66e6451b4cf3"
} | {
"account_age_days": 1028,
"account_id": "ACCT-B83CFE0BE037",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.324
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 145,
"timestamp": "2026-01-01T00:01:00Z",
"transaction_amount_usd": 82311.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 510319.18,
"financial_exposure_usd": 563887.59,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104999",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "medium",
"timestamp": "2026-01-04T11:19:00Z",
"trace_id": "175dbcd7-964b-37b3-31e2-e304c94a44b5"
} | {
"account_age_days": 773,
"account_id": "ACCT-9CF60C237D37",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_3",
"session_entropy": 0.586
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1163,
"timestamp": "2026-01-04T11:19:00Z",
"transaction_amount_usd": 2798669.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.705,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4050402.96,
"financial_exposure_usd": 4582232.73,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100164",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-01T02:44:00Z",
"trace_id": "090d7d2f-ceb7-803e-c3fc-ac0ed5c2c94d"
} | {
"account_age_days": 1791,
"account_id": "ACCT-FDAE29200BB8",
"baseline_risk_score": 0.551,
"kyc_tier": "tier_3",
"session_entropy": 0.782
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1060,
"timestamp": "2026-01-01T02:44:00Z",
"transaction_amount_usd": 114013.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 497925.86,
"financial_exposure_usd": 1147313.77,
"recoverable_pct": 0.373
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.