schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107834",
"label": "benign",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-06T10:34:00Z",
"trace_id": "647e037b-8e61-1d0c-2d5a-70f4b33a20b9"
} | {
"account_age_days": 827,
"account_id": "ACCT-100476D0E761",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.921
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1121,
"timestamp": "2026-01-06T10:34:00Z",
"transaction_amount_usd": 6261.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2586.27,
"financial_exposure_usd": 3943.37,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104214",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-03T22:14:00Z",
"trace_id": "0984aef1-b126-353b-b105-22a127f733f0"
} | {
"account_age_days": 761,
"account_id": "ACCT-2199CD8714AB",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 176,
"timestamp": "2026-01-03T22:14:00Z",
"transaction_amount_usd": 905521.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2069664.06,
"financial_exposure_usd": 3613427.07,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104533",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "low",
"timestamp": "2026-01-04T03:33:00Z",
"trace_id": "f83def8e-9bfc-24a4-7d99-20065914fd26"
} | {
"account_age_days": 1297,
"account_id": "ACCT-534BEB5FFF08",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_3",
"session_entropy": 0.55
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1162,
"timestamp": "2026-01-04T03:33:00Z",
"transaction_amount_usd": 963801.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.517,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4356533.59,
"financial_exposure_usd": 5659751.39,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103095",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-03T03:35:00Z",
"trace_id": "3bff0848-fbee-0489-eaa9-2528245e5d86"
} | {
"account_age_days": 921,
"account_id": "ACCT-C11C96EFDC09",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_3",
"session_entropy": 0.149
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 342,
"timestamp": "2026-01-03T03:35:00Z",
"transaction_amount_usd": 117948.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.811,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 299552.86,
"financial_exposure_usd": 358302.76,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102563",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "critical",
"timestamp": "2026-01-02T18:43:00Z",
"trace_id": "6ef72adc-5d11-cf6c-11b1-8068754135f4"
} | {
"account_age_days": 326,
"account_id": "ACCT-CBC58E4D507F",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_1",
"session_entropy": 0.13
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 385,
"timestamp": "2026-01-02T10:07:00Z",
"transaction_amount_usd": 13.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 401805.23,
"financial_exposure_usd": 486916.76,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106142",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "critical",
"timestamp": "2026-01-05T06:22:00Z",
"trace_id": "cf3053ee-6635-66f4-7472-ea82600edcb9"
} | {
"account_age_days": 1874,
"account_id": "ACCT-DCB497226783",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_1",
"session_entropy": 0.556
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 329,
"timestamp": "2026-01-05T06:22:00Z",
"transaction_amount_usd": 96509.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2787307.03,
"financial_exposure_usd": 4359520.24,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100818",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-01T13:38:00Z",
"trace_id": "37866f34-5fa7-460b-8a49-a3b67ef8d75c"
} | {
"account_age_days": 1576,
"account_id": "ACCT-842EA0371C85",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.75
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 528,
"timestamp": "2026-01-01T13:38:00Z",
"transaction_amount_usd": 15302.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 637511.98,
"financial_exposure_usd": 1014765.83,
"recoverable_pct": 0.347
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108371",
"label": "benign",
"label_confidence": 0.451,
"severity": "high",
"timestamp": "2026-01-06T19:31:00Z",
"trace_id": "eda7a161-24e3-130e-b19a-4e0aae2f5cff"
} | {
"account_age_days": 508,
"account_id": "ACCT-B797F44175B3",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_3",
"session_entropy": 0.906
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 171,
"timestamp": "2026-01-06T09:53:00Z",
"transaction_amount_usd": 6.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1786.31,
"financial_exposure_usd": 1946.23,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105920",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-05T02:40:00Z",
"trace_id": "dace5063-7336-32a6-0a7d-917b5f3a3a2e"
} | {
"account_age_days": 626,
"account_id": "ACCT-F251263F33BB",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.83
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 123,
"timestamp": "2026-01-04T19:14:00Z",
"transaction_amount_usd": 0.72
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.766,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4156294.59,
"financial_exposure_usd": 5413859.76,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103592",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-03T11:52:00Z",
"trace_id": "99e0a69d-87d5-e749-1160-b8007e17f485"
} | {
"account_age_days": 1816,
"account_id": "ACCT-8507B024FCEE",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_2",
"session_entropy": 0.429
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 640,
"timestamp": "2026-01-03T11:52:00Z",
"transaction_amount_usd": 2404676.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2578611.93,
"financial_exposure_usd": 4437956.97,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109495",
"label": "benign",
"label_confidence": 0.527,
"severity": "low",
"timestamp": "2026-01-07T14:15:00Z",
"trace_id": "c14dc2b0-8a73-80f2-fa6f-25908c976ce6"
} | {
"account_age_days": 1114,
"account_id": "ACCT-BD20CB36AC74",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.323
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 137,
"timestamp": "2026-01-07T02:23:00Z",
"transaction_amount_usd": 6.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 736.5,
"financial_exposure_usd": 1292.75,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106803",
"label": "benign",
"label_confidence": 0.613,
"severity": "low",
"timestamp": "2026-01-05T17:23:00Z",
"trace_id": "4833de2e-fc00-731c-9245-b6d78b3ff4bc"
} | {
"account_age_days": 300,
"account_id": "ACCT-1AEE2287C60D",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.336
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 329,
"timestamp": "2026-01-05T17:23:00Z",
"transaction_amount_usd": 13129.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1656.71,
"financial_exposure_usd": 2578.3,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108153",
"label": "benign",
"label_confidence": 0.676,
"severity": "critical",
"timestamp": "2026-01-06T15:53:00Z",
"trace_id": "9ae2aa64-5bc4-c510-153c-5fd1705ccd25"
} | {
"account_age_days": 655,
"account_id": "ACCT-16DD0014C839",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.299
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 528,
"timestamp": "2026-01-06T15:53:00Z",
"transaction_amount_usd": 11857.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 386.09,
"financial_exposure_usd": 619.21,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104438",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-04T01:58:00Z",
"trace_id": "65055bf0-d323-d7b3-a6a4-8692d0aad59c"
} | {
"account_age_days": 1390,
"account_id": "ACCT-41D385838740",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 318,
"timestamp": "2026-01-03T18:21:00Z",
"transaction_amount_usd": 7.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.627,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4116776.44,
"financial_exposure_usd": 5445746.51,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104310",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-03T23:50:00Z",
"trace_id": "b15f87d7-a5df-6649-9abc-328949e030d6"
} | {
"account_age_days": 1459,
"account_id": "ACCT-131C7F73828C",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_1",
"session_entropy": 0.828
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 933,
"timestamp": "2026-01-03T23:50:00Z",
"transaction_amount_usd": 1775585.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4136278.26,
"financial_exposure_usd": 5052430.4,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100282",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-01T04:42:00Z",
"trace_id": "c105ab46-b8ee-0ec6-2b0a-0050235aa8e9"
} | {
"account_age_days": 475,
"account_id": "ACCT-B71A72C1582C",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 145,
"timestamp": "2025-12-31T19:35:00Z",
"transaction_amount_usd": 15.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.626,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 378093.66,
"financial_exposure_usd": 401434.67,
"recoverable_pct": 0.082
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101096",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "high",
"timestamp": "2026-01-01T18:16:00Z",
"trace_id": "92642b74-582a-ee02-30e9-a7f25d9c820b"
} | {
"account_age_days": 26,
"account_id": "ACCT-9402E6A982F5",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_3",
"session_entropy": 0.933
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 361,
"timestamp": "2026-01-01T10:51:00Z",
"transaction_amount_usd": 23.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 506119.5,
"financial_exposure_usd": 721601.59,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106269",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-05T08:29:00Z",
"trace_id": "a956ef6b-0053-a43d-b379-66c303bf1fdf"
} | {
"account_age_days": 1930,
"account_id": "ACCT-AC38996F912A",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 653,
"timestamp": "2026-01-05T08:29:00Z",
"transaction_amount_usd": 1609715.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.935,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7164938.04,
"financial_exposure_usd": 7659467.53,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101647",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-02T03:27:00Z",
"trace_id": "9d542507-c957-7ad6-cc94-575b4db436e2"
} | {
"account_age_days": 952,
"account_id": "ACCT-ABC209BDB15E",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 217,
"timestamp": "2026-01-02T03:27:00Z",
"transaction_amount_usd": 67682.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 51456.28,
"financial_exposure_usd": 71326.59,
"recoverable_pct": 0.391
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102240",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-02T13:20:00Z",
"trace_id": "9b818de2-219c-3c28-3fae-e7846510502f"
} | {
"account_age_days": 1525,
"account_id": "ACCT-EAC9B8AB3794",
"baseline_risk_score": 0.637,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1184,
"timestamp": "2026-01-02T13:20:00Z",
"transaction_amount_usd": 30526.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.699,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 531509.99,
"financial_exposure_usd": 822467.8,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101781",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-02T05:41:00Z",
"trace_id": "0292010d-9249-80fe-b0c8-ff865e58a1aa"
} | {
"account_age_days": 57,
"account_id": "ACCT-A116CB17A322",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.429
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 449,
"timestamp": "2026-01-02T05:41:00Z",
"transaction_amount_usd": 27488.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.37,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 269628.64,
"financial_exposure_usd": 492958.17,
"recoverable_pct": 0.361
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104482",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-04T02:42:00Z",
"trace_id": "ebfce517-5844-a818-145a-e96706244c92"
} | {
"account_age_days": 99,
"account_id": "ACCT-2143048726DB",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.587
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 347,
"timestamp": "2026-01-03T19:26:00Z",
"transaction_amount_usd": 24.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.591,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3996190.37,
"financial_exposure_usd": 5070538.47,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107743",
"label": "benign",
"label_confidence": 0.714,
"severity": "critical",
"timestamp": "2026-01-06T09:03:00Z",
"trace_id": "fe163b95-d925-c4e7-3964-d65ad9d90b23"
} | {
"account_age_days": 407,
"account_id": "ACCT-B0901E8A5802",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.319
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 203,
"timestamp": "2026-01-05T23:17:00Z",
"transaction_amount_usd": 20.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1726.22,
"financial_exposure_usd": 2313.52,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104530",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "critical",
"timestamp": "2026-01-04T03:30:00Z",
"trace_id": "13aac7ef-5a92-5c3a-bce8-934165fa5a1f"
} | {
"account_age_days": 1005,
"account_id": "ACCT-68A0DB9D0F2A",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 179,
"timestamp": "2026-01-03T23:56:00Z",
"transaction_amount_usd": 23.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.405,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6986813.34,
"financial_exposure_usd": 7572198.9,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104600",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "medium",
"timestamp": "2026-01-04T04:40:00Z",
"trace_id": "a337cf65-6b09-e03e-07f6-3b631eb017f8"
} | {
"account_age_days": 806,
"account_id": "ACCT-84E488DB9287",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 217,
"timestamp": "2026-01-04T04:40:00Z",
"transaction_amount_usd": 1035848.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3357488.76,
"financial_exposure_usd": 5076301.94,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109679",
"label": "benign",
"label_confidence": 0.65,
"severity": "low",
"timestamp": "2026-01-07T17:19:00Z",
"trace_id": "b898214e-1e0b-2fb1-593e-9321fdafe740"
} | {
"account_age_days": 1827,
"account_id": "ACCT-FAF530983B64",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.915
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 385,
"timestamp": "2026-01-07T17:19:00Z",
"transaction_amount_usd": 13326.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5046.61,
"financial_exposure_usd": 5793.88,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102832",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "medium",
"timestamp": "2026-01-02T23:12:00Z",
"trace_id": "04053bc9-afc5-56ac-5406-3722f26303d4"
} | {
"account_age_days": 1508,
"account_id": "ACCT-5610816F274A",
"baseline_risk_score": 0.64,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 695,
"timestamp": "2026-01-02T23:12:00Z",
"transaction_amount_usd": 105704.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 741873.13,
"financial_exposure_usd": 995810.02,
"recoverable_pct": 0.271
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105575",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "high",
"timestamp": "2026-01-04T20:55:00Z",
"trace_id": "67ad56bc-35f0-208b-0232-c48c8338869c"
} | {
"account_age_days": 459,
"account_id": "ACCT-8D0312D9E316",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_3",
"session_entropy": 0.688
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 665,
"timestamp": "2026-01-04T20:55:00Z",
"transaction_amount_usd": 1760883.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.42,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4277272.47,
"financial_exposure_usd": 4405990.2,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100956",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "high",
"timestamp": "2026-01-01T15:56:00Z",
"trace_id": "becc0ec8-d39e-97fd-8301-7e5a2b9105db"
} | {
"account_age_days": 573,
"account_id": "ACCT-AFFC4C908096",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_2",
"session_entropy": 0.659
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 933,
"timestamp": "2026-01-01T15:56:00Z",
"transaction_amount_usd": 64144.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1174231.99,
"financial_exposure_usd": 1414780.97,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101393",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-01T23:13:00Z",
"trace_id": "643a685e-490c-56f0-6695-8d4124d0b5a5"
} | {
"account_age_days": 1828,
"account_id": "ACCT-2823F7B17778",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_1",
"session_entropy": 0.712
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 219,
"timestamp": "2026-01-01T16:38:00Z",
"transaction_amount_usd": 2.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 643286.74,
"financial_exposure_usd": 1002386.49,
"recoverable_pct": 0.371
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105075",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-04T12:35:00Z",
"trace_id": "f63a63aa-62da-902c-6e31-b8fd4089458e"
} | {
"account_age_days": 1682,
"account_id": "ACCT-C38744D32143",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.194
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 261,
"timestamp": "2026-01-04T12:35:00Z",
"transaction_amount_usd": 825061.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.924,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2151263.57,
"financial_exposure_usd": 5106075.61,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108615",
"label": "benign",
"label_confidence": 0.587,
"severity": "medium",
"timestamp": "2026-01-06T23:35:00Z",
"trace_id": "01e901db-4073-cfc1-4b8a-515e16a659a5"
} | {
"account_age_days": 1174,
"account_id": "ACCT-D6467AED26C0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.887
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 213,
"timestamp": "2026-01-06T23:35:00Z",
"transaction_amount_usd": 719.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 861.34,
"financial_exposure_usd": 1969.38,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105524",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-04T20:04:00Z",
"trace_id": "ea203106-c64c-587e-0d81-684ee7ffde15"
} | {
"account_age_days": 29,
"account_id": "ACCT-B4CF469F1873",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_2",
"session_entropy": 0.109
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 148,
"timestamp": "2026-01-04T17:31:00Z",
"transaction_amount_usd": 17.87
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.513,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1256553.6,
"financial_exposure_usd": 3058976.87,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108707",
"label": "benign",
"label_confidence": 0.47,
"severity": "medium",
"timestamp": "2026-01-07T01:07:00Z",
"trace_id": "16861ed3-e7b3-f5e6-5681-b1896c7dad6d"
} | {
"account_age_days": 1360,
"account_id": "ACCT-FA438409995C",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_1",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1138,
"timestamp": "2026-01-07T01:07:00Z",
"transaction_amount_usd": 11072.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 959.62,
"financial_exposure_usd": 1584.47,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107293",
"label": "benign",
"label_confidence": 0.593,
"severity": "low",
"timestamp": "2026-01-06T01:33:00Z",
"trace_id": "5be2be7e-3266-8cc9-6895-4e8a0051a391"
} | {
"account_age_days": 377,
"account_id": "ACCT-AC3D766F5BBE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.269
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 335,
"timestamp": "2026-01-05T19:01:00Z",
"transaction_amount_usd": 23.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 481.07,
"financial_exposure_usd": 1005.4,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104579",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "low",
"timestamp": "2026-01-04T04:19:00Z",
"trace_id": "30856b7c-8dcc-b595-c675-2d484be2369c"
} | {
"account_age_days": 1679,
"account_id": "ACCT-88294A4E60FE",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.549
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1035,
"timestamp": "2026-01-04T04:19:00Z",
"transaction_amount_usd": 2410692.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.395,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6891264.27,
"financial_exposure_usd": 9570500.35,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103406",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "medium",
"timestamp": "2026-01-03T08:46:00Z",
"trace_id": "61d2d47b-6cae-de32-e027-4343ca77d7e3"
} | {
"account_age_days": 362,
"account_id": "ACCT-655C02EBE0B3",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 488,
"timestamp": "2026-01-03T08:46:00Z",
"transaction_amount_usd": 1929103.75
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.718,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7440677.71,
"financial_exposure_usd": 8204664.76,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106556",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-05T13:16:00Z",
"trace_id": "292af2a3-b4ef-561e-1cc3-7aa4ebb1e24c"
} | {
"account_age_days": 81,
"account_id": "ACCT-461C8B2DF1A5",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_1",
"session_entropy": 0.582
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 376,
"timestamp": "2026-01-05T09:04:00Z",
"transaction_amount_usd": 13.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.923,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6039298.44,
"financial_exposure_usd": 8171567.76,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108574",
"label": "benign",
"label_confidence": 0.559,
"severity": "high",
"timestamp": "2026-01-06T22:54:00Z",
"trace_id": "0faf1c12-0992-1e19-030e-cbc6d269f6da"
} | {
"account_age_days": 120,
"account_id": "ACCT-B9E069A5877C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.326
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 334,
"timestamp": "2026-01-06T17:56:00Z",
"transaction_amount_usd": 14.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.57,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 504.71,
"financial_exposure_usd": 876.99,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108087",
"label": "benign",
"label_confidence": 0.696,
"severity": "critical",
"timestamp": "2026-01-06T14:47:00Z",
"trace_id": "1ff26f13-bc2f-88d6-3d7b-797008564313"
} | {
"account_age_days": 1593,
"account_id": "ACCT-44109CD1D59D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.507
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 89,
"timestamp": "2026-01-06T14:47:00Z",
"transaction_amount_usd": 13133.39
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 111.2,
"financial_exposure_usd": 119.31,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105838",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-05T01:18:00Z",
"trace_id": "1c1a9320-c16a-3e6a-8611-832b8cf308f6"
} | {
"account_age_days": 1826,
"account_id": "ACCT-DC018734D340",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.44
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1170,
"timestamp": "2026-01-05T01:18:00Z",
"transaction_amount_usd": 1670860.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4609743.27,
"financial_exposure_usd": 5887717.33,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100610",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-01T10:10:00Z",
"trace_id": "3445b47c-8079-e2ec-ebdc-2c9daef7c60b"
} | {
"account_age_days": 178,
"account_id": "ACCT-0433D97C1D38",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 487,
"timestamp": "2026-01-01T10:10:00Z",
"transaction_amount_usd": 91673.6
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.824,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 486192.74,
"financial_exposure_usd": 650066.64,
"recoverable_pct": 0.099
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103753",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-03T14:33:00Z",
"trace_id": "7b3dca28-471f-220c-fef5-373b418bfcc0"
} | {
"account_age_days": 1413,
"account_id": "ACCT-F16BC0246F44",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 316,
"timestamp": "2026-01-03T02:56:00Z",
"transaction_amount_usd": 22.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2300326.59,
"financial_exposure_usd": 2925872.54,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106180",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-05T07:00:00Z",
"trace_id": "48647646-5e5a-3769-b817-3e99c896da27"
} | {
"account_age_days": 1898,
"account_id": "ACCT-88C55F85DDEC",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.458
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 188,
"timestamp": "2026-01-05T05:59:00Z",
"transaction_amount_usd": 15.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.535,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6757420.97,
"financial_exposure_usd": 7509033.39,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107782",
"label": "benign",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-06T09:42:00Z",
"trace_id": "0eab4843-060e-9443-b40d-e583f89fd5b7"
} | {
"account_age_days": 1771,
"account_id": "ACCT-07AB1202CD92",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.887
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 173,
"timestamp": "2026-01-06T09:42:00Z",
"transaction_amount_usd": 10464.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2994.64,
"financial_exposure_usd": 3046.52,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101891",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-02T07:31:00Z",
"trace_id": "ee3e2b23-40d5-3971-5239-d9b4c2358189"
} | {
"account_age_days": 1326,
"account_id": "ACCT-90FC8DA9D581",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 234,
"timestamp": "2026-01-01T23:04:00Z",
"transaction_amount_usd": 5.29
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 824141.33,
"financial_exposure_usd": 913233.74,
"recoverable_pct": 0.325
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100982",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-01T16:22:00Z",
"trace_id": "125d65fd-d731-d6eb-f235-265571d65ce5"
} | {
"account_age_days": 1064,
"account_id": "ACCT-CC1C1EB757AB",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_1",
"session_entropy": 0.56
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 118,
"timestamp": "2026-01-01T16:22:00Z",
"transaction_amount_usd": 97014.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.804,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 154633.32,
"financial_exposure_usd": 379107.81,
"recoverable_pct": 0.282
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103321",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-03T07:21:00Z",
"trace_id": "9a198adb-d92b-920b-b610-d630ed800b73"
} | {
"account_age_days": 1732,
"account_id": "ACCT-E02A6E73D764",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_1",
"session_entropy": 0.667
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 973,
"timestamp": "2026-01-03T07:21:00Z",
"transaction_amount_usd": 68638.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 540596.85,
"financial_exposure_usd": 582386.99,
"recoverable_pct": 0.083
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100405",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "low",
"timestamp": "2026-01-01T06:45:00Z",
"trace_id": "a618a46b-1991-9b61-8b55-cfe6e43d482d"
} | {
"account_age_days": 362,
"account_id": "ACCT-BFD554FF2E65",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_1",
"session_entropy": 0.591
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 159,
"timestamp": "2026-01-01T00:36:00Z",
"transaction_amount_usd": 13.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.495,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 681925.89,
"financial_exposure_usd": 824902.04,
"recoverable_pct": 0.368
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104340",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-04T00:20:00Z",
"trace_id": "58da916c-f659-fea7-9a32-819dfd723a30"
} | {
"account_age_days": 367,
"account_id": "ACCT-B6F54F4BD354",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.937
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 802,
"timestamp": "2026-01-04T00:20:00Z",
"transaction_amount_usd": 1756859.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.359,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3960374.23,
"financial_exposure_usd": 5067900.5,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107275",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-06T01:15:00Z",
"trace_id": "1de0f67d-5d50-9ef0-ddbb-653955805bdb"
} | {
"account_age_days": 108,
"account_id": "ACCT-E1156C2DAD7A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.481
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1031,
"timestamp": "2026-01-06T01:15:00Z",
"transaction_amount_usd": 11156.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1220.91,
"financial_exposure_usd": 2213.23,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106392",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "critical",
"timestamp": "2026-01-05T10:32:00Z",
"trace_id": "1e05e281-2286-0010-2dca-274171007116"
} | {
"account_age_days": 190,
"account_id": "ACCT-387F0FBB2338",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.442
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 483,
"timestamp": "2026-01-05T10:32:00Z",
"transaction_amount_usd": 2577257.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.573,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7208577.49,
"financial_exposure_usd": 7268709.35,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101819",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-02T06:19:00Z",
"trace_id": "cc66dd79-c51f-3f11-6a1f-36bf393035a4"
} | {
"account_age_days": 1834,
"account_id": "ACCT-E956BE0C9501",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_2",
"session_entropy": 0.887
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 580,
"timestamp": "2026-01-02T06:19:00Z",
"transaction_amount_usd": 34425.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 806256.64,
"financial_exposure_usd": 1076966.55,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102059",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "critical",
"timestamp": "2026-01-02T10:19:00Z",
"trace_id": "4517daa7-3849-8c30-690f-601f1fdaf401"
} | {
"account_age_days": 727,
"account_id": "ACCT-DE72C1501998",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_2",
"session_entropy": 0.784
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 435,
"timestamp": "2026-01-02T10:19:00Z",
"transaction_amount_usd": 119220.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.848,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 470864,
"financial_exposure_usd": 1069494.48,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106805",
"label": "benign",
"label_confidence": 0.513,
"severity": "high",
"timestamp": "2026-01-05T17:25:00Z",
"trace_id": "3bd2c2c7-643c-7811-0dcf-aac0abfd150e"
} | {
"account_age_days": 740,
"account_id": "ACCT-F80B2AE542E3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.471
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 103,
"timestamp": "2026-01-05T17:25:00Z",
"transaction_amount_usd": 8691.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3973.25,
"financial_exposure_usd": 4335.35,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108137",
"label": "benign",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-06T15:37:00Z",
"trace_id": "dc7d92c6-b7ad-8260-0468-f11024c6683d"
} | {
"account_age_days": 781,
"account_id": "ACCT-987C8EEE94B5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.445
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 187,
"timestamp": "2026-01-06T03:36:00Z",
"transaction_amount_usd": 5.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2451.65,
"financial_exposure_usd": 2758.67,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105145",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "low",
"timestamp": "2026-01-04T13:45:00Z",
"trace_id": "8135d407-cd06-c617-7972-a7558b6f4289"
} | {
"account_age_days": 331,
"account_id": "ACCT-9E60FE470355",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_1",
"session_entropy": 0.255
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 375,
"timestamp": "2026-01-04T13:45:00Z",
"transaction_amount_usd": 1935700
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.393,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2995995.28,
"financial_exposure_usd": 5046155.19,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100551",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "critical",
"timestamp": "2026-01-01T09:11:00Z",
"trace_id": "5ea3182c-6709-672f-489f-aa3a54a91f62"
} | {
"account_age_days": 647,
"account_id": "ACCT-380BA8C8B491",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_1",
"session_entropy": 0.481
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 136,
"timestamp": "2026-01-01T09:11:00Z",
"transaction_amount_usd": 57792.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.692,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 928709.47,
"financial_exposure_usd": 1102904.3,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107528",
"label": "benign",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-06T05:28:00Z",
"trace_id": "54ebdf54-6e09-a977-1572-a55b265dafa2"
} | {
"account_age_days": 1894,
"account_id": "ACCT-3D481B1629B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.711
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 806,
"timestamp": "2026-01-06T05:28:00Z",
"transaction_amount_usd": 9333.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2514.37,
"financial_exposure_usd": 4312.79,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104972",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-04T10:52:00Z",
"trace_id": "0cec7b5d-a8e0-bbab-c011-124144e58b29"
} | {
"account_age_days": 1101,
"account_id": "ACCT-6111004D633A",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.101
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 830,
"timestamp": "2026-01-04T10:52:00Z",
"transaction_amount_usd": 1505768.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3313228.17,
"financial_exposure_usd": 7166912.16,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106193",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "critical",
"timestamp": "2026-01-05T07:13:00Z",
"trace_id": "38a0c8f6-f74b-a0a2-19e5-42fcd1e082c0"
} | {
"account_age_days": 1745,
"account_id": "ACCT-C5083DE48221",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.169
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 167,
"timestamp": "2026-01-05T03:30:00Z",
"transaction_amount_usd": 0.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 6554842.81,
"financial_exposure_usd": 9263452.82,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102973",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-03T01:33:00Z",
"trace_id": "99c56b66-3bd7-f504-6028-88cb7b1c0b47"
} | {
"account_age_days": 70,
"account_id": "ACCT-FBD6F0E0192F",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_1",
"session_entropy": 0.721
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 121,
"timestamp": "2026-01-02T16:32:00Z",
"transaction_amount_usd": 15.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.723,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 228035.62,
"financial_exposure_usd": 401493.95,
"recoverable_pct": 0.191
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104222",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "high",
"timestamp": "2026-01-03T22:22:00Z",
"trace_id": "1d0fef10-8860-40e3-2de6-5debf84dbdec"
} | {
"account_age_days": 1848,
"account_id": "ACCT-69C1331CD207",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.199
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 517,
"timestamp": "2026-01-03T22:22:00Z",
"transaction_amount_usd": 2367664.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.851,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1046600.31,
"financial_exposure_usd": 1130999.76,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107579",
"label": "benign",
"label_confidence": 0.559,
"severity": "low",
"timestamp": "2026-01-06T06:19:00Z",
"trace_id": "ee38f3e5-4ab2-114a-765f-bca6084825fd"
} | {
"account_age_days": 1136,
"account_id": "ACCT-EE3D60F64B6B",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_1",
"session_entropy": 0.942
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 123,
"timestamp": "2026-01-06T02:02:00Z",
"transaction_amount_usd": 17.89
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2729.02,
"financial_exposure_usd": 3632.69,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102266",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "high",
"timestamp": "2026-01-02T13:46:00Z",
"trace_id": "ba753470-b6f6-4ebb-19a2-3ca1849ba889"
} | {
"account_age_days": 1532,
"account_id": "ACCT-A747D705296D",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.82
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 688,
"timestamp": "2026-01-02T13:46:00Z",
"transaction_amount_usd": 83695.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1110360.88,
"financial_exposure_usd": 1422759.05,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108762",
"label": "benign",
"label_confidence": 0.519,
"severity": "low",
"timestamp": "2026-01-07T02:02:00Z",
"trace_id": "f0a79bb1-878c-47b0-bc0d-e55dcd7db92c"
} | {
"account_age_days": 219,
"account_id": "ACCT-E9454B2B12C0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.414
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1132,
"timestamp": "2026-01-07T02:02:00Z",
"transaction_amount_usd": 8153.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5072.38,
"financial_exposure_usd": 6222.59,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102472",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "low",
"timestamp": "2026-01-02T17:12:00Z",
"trace_id": "58bb4df6-d335-8d25-8ab9-16bef5b2258d"
} | {
"account_age_days": 1528,
"account_id": "ACCT-40328BF7249A",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_3",
"session_entropy": 0.881
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 463,
"timestamp": "2026-01-02T17:12:00Z",
"transaction_amount_usd": 89762.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 508279.31,
"financial_exposure_usd": 644296.16,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102693",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-02T20:53:00Z",
"trace_id": "7218ed35-153d-3c7e-d366-bb2022b94857"
} | {
"account_age_days": 1962,
"account_id": "ACCT-CAFD5B18D239",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_1",
"session_entropy": 0.11
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 905,
"timestamp": "2026-01-02T20:53:00Z",
"transaction_amount_usd": 65444.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 629765.21,
"financial_exposure_usd": 646312.01,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104916",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "low",
"timestamp": "2026-01-04T09:56:00Z",
"trace_id": "1492c9de-87cf-19a9-0852-b9df597e3efc"
} | {
"account_age_days": 1189,
"account_id": "ACCT-B1718FEA8A86",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_1",
"session_entropy": 0.462
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 138,
"timestamp": "2026-01-04T06:26:00Z",
"transaction_amount_usd": 3.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.416,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3176986.2,
"financial_exposure_usd": 6239975.67,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104057",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "medium",
"timestamp": "2026-01-03T19:37:00Z",
"trace_id": "dc05343e-48d3-7920-abcd-568e6c5f8081"
} | {
"account_age_days": 365,
"account_id": "ACCT-20515276EBCD",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.616
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 976,
"timestamp": "2026-01-03T19:37:00Z",
"transaction_amount_usd": 2025116.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2700935.55,
"financial_exposure_usd": 2749295.29,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105379",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-04T17:39:00Z",
"trace_id": "38725475-92f6-f352-465e-df389b62d1ae"
} | {
"account_age_days": 282,
"account_id": "ACCT-AEDFA555E6A9",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_2",
"session_entropy": 0.441
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 313,
"timestamp": "2026-01-04T05:23:00Z",
"transaction_amount_usd": 16.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.512,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2087200.51,
"financial_exposure_usd": 2313940.51,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100544",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-01T09:04:00Z",
"trace_id": "7d31417d-2b9b-65ba-4628-639e112b6856"
} | {
"account_age_days": 1679,
"account_id": "ACCT-19466804E456",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_3",
"session_entropy": 0.442
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1110,
"timestamp": "2026-01-01T09:04:00Z",
"transaction_amount_usd": 28447.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 311098.71,
"financial_exposure_usd": 447669.07,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107393",
"label": "benign",
"label_confidence": 0.513,
"severity": "medium",
"timestamp": "2026-01-06T03:13:00Z",
"trace_id": "361aab38-88a9-d998-e26a-d7398bf20b6f"
} | {
"account_age_days": 1092,
"account_id": "ACCT-8CB93F106DF8",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.373
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 952,
"timestamp": "2026-01-06T03:13:00Z",
"transaction_amount_usd": 10938.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2820,
"financial_exposure_usd": 5007.97,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107318",
"label": "benign",
"label_confidence": 0.551,
"severity": "medium",
"timestamp": "2026-01-06T01:58:00Z",
"trace_id": "8f74dc86-8a35-84fa-8b92-516dcc7ecfac"
} | {
"account_age_days": 480,
"account_id": "ACCT-9C324056561A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.518
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1154,
"timestamp": "2026-01-06T01:58:00Z",
"transaction_amount_usd": 14044.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.488,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 832.07,
"financial_exposure_usd": 1343.53,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101930",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "critical",
"timestamp": "2026-01-02T08:10:00Z",
"trace_id": "c1383803-895a-e15d-33a2-47f1c01a587a"
} | {
"account_age_days": 1353,
"account_id": "ACCT-84CD2DBD5674",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.305
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 313,
"timestamp": "2026-01-02T08:10:00Z",
"transaction_amount_usd": 102979.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 580123.09,
"financial_exposure_usd": 711670,
"recoverable_pct": 0.309
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105173",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "medium",
"timestamp": "2026-01-04T14:13:00Z",
"trace_id": "dd47d5bb-fe14-1241-09ac-f43d8fe55420"
} | {
"account_age_days": 1392,
"account_id": "ACCT-C7C516058C90",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_1",
"session_entropy": 0.446
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 144,
"timestamp": "2026-01-04T11:57:00Z",
"transaction_amount_usd": 22.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3258100.68,
"financial_exposure_usd": 4694546.74,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101285",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-01T21:25:00Z",
"trace_id": "4a9dbbbe-2407-2ab9-557d-5b80884144db"
} | {
"account_age_days": 1369,
"account_id": "ACCT-A2DF5745F96A",
"baseline_risk_score": 0.584,
"kyc_tier": "tier_3",
"session_entropy": 0.918
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 313,
"timestamp": "2026-01-01T12:39:00Z",
"transaction_amount_usd": 24.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 106509.88,
"financial_exposure_usd": 134327.64,
"recoverable_pct": 0.258
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103703",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-03T13:43:00Z",
"trace_id": "1cd03b0d-a314-d2c7-6b53-3230f847ed46"
} | {
"account_age_days": 1895,
"account_id": "ACCT-EE543B16C219",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.368
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 339,
"timestamp": "2026-01-03T01:48:00Z",
"transaction_amount_usd": 13.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.467,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1739960.83,
"financial_exposure_usd": 2871928.75,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105442",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-04T18:42:00Z",
"trace_id": "0913f75f-6b0a-9158-8d53-6a1bc653b3f6"
} | {
"account_age_days": 198,
"account_id": "ACCT-0F67511C3A8B",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_3",
"session_entropy": 0.934
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 468,
"timestamp": "2026-01-04T18:42:00Z",
"transaction_amount_usd": 487924.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2869519.88,
"financial_exposure_usd": 4785055.27,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102134",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-02T11:34:00Z",
"trace_id": "0cd83433-a230-afa0-110e-11ee8d2f8d92"
} | {
"account_age_days": 1937,
"account_id": "ACCT-4736FCC52D5A",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.928
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 109,
"timestamp": "2026-01-02T05:14:00Z",
"transaction_amount_usd": 24.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.906,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 373384.92,
"financial_exposure_usd": 603150.85,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102074",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-02T10:34:00Z",
"trace_id": "e74b67b9-805b-3688-1b5c-492e06aadd27"
} | {
"account_age_days": 1264,
"account_id": "ACCT-A7BFA86BFF0C",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 383,
"timestamp": "2026-01-01T23:05:00Z",
"transaction_amount_usd": 20.7
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.558,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 920361.55,
"financial_exposure_usd": 1019260.51,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105440",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "critical",
"timestamp": "2026-01-04T18:40:00Z",
"trace_id": "83c06ea0-090c-22e5-c825-69736b7c892e"
} | {
"account_age_days": 237,
"account_id": "ACCT-208767E9BA30",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_3",
"session_entropy": 0.771
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 587,
"timestamp": "2026-01-04T18:40:00Z",
"transaction_amount_usd": 388823.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1802802.9,
"financial_exposure_usd": 2187773.13,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103452",
"label": "fraudulent",
"label_confidence": 0.616,
"severity": "critical",
"timestamp": "2026-01-03T09:32:00Z",
"trace_id": "3d4ba516-3bb9-0659-f0ba-910b65a8a2ee"
} | {
"account_age_days": 1383,
"account_id": "ACCT-F8A94091E245",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_3",
"session_entropy": 0.232
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 188,
"timestamp": "2026-01-03T03:41:00Z",
"transaction_amount_usd": 10.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.56,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3410520.3,
"financial_exposure_usd": 5098812.51,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100901",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-01T15:01:00Z",
"trace_id": "ec9a8fea-18f3-ddd5-8eed-ee078885d603"
} | {
"account_age_days": 1716,
"account_id": "ACCT-7CF2787E39B5",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_2",
"session_entropy": 0.64
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 354,
"timestamp": "2026-01-01T07:49:00Z",
"transaction_amount_usd": 22.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.378,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 343017.48,
"financial_exposure_usd": 432007.31,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105895",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-05T02:15:00Z",
"trace_id": "78ce1215-779e-867b-afb0-a1bf4ef1ff99"
} | {
"account_age_days": 946,
"account_id": "ACCT-A211453ADC01",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.493
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 126,
"timestamp": "2026-01-05T01:20:00Z",
"transaction_amount_usd": 16.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.428,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1222269.3,
"financial_exposure_usd": 2731299.17,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105450",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "critical",
"timestamp": "2026-01-04T18:50:00Z",
"trace_id": "e7b0aa8a-6b05-1db1-503f-32f594b00231"
} | {
"account_age_days": 1874,
"account_id": "ACCT-A789F90E9ED1",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_3",
"session_entropy": 0.305
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 531,
"timestamp": "2026-01-04T18:50:00Z",
"transaction_amount_usd": 238668.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.701,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4980744.73,
"financial_exposure_usd": 7229050.5,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107977",
"label": "benign",
"label_confidence": 0.452,
"severity": "low",
"timestamp": "2026-01-06T12:57:00Z",
"trace_id": "d9c9756f-c18d-3a0c-ef54-43d81f26267d"
} | {
"account_age_days": 1920,
"account_id": "ACCT-CAC8D476C0E2",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_1",
"session_entropy": 0.862
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 911,
"timestamp": "2026-01-06T12:57:00Z",
"transaction_amount_usd": 1524.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 764.97,
"financial_exposure_usd": 1037.59,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104766",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-04T07:26:00Z",
"trace_id": "04c8017d-8869-c87f-4315-d7a24ac4877b"
} | {
"account_age_days": 1053,
"account_id": "ACCT-AABD202BC2DB",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.834
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 130,
"timestamp": "2026-01-04T02:55:00Z",
"transaction_amount_usd": 12.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.841,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3568374.56,
"financial_exposure_usd": 6177899.65,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109217",
"label": "benign",
"label_confidence": 0.554,
"severity": "critical",
"timestamp": "2026-01-07T09:37:00Z",
"trace_id": "a08886eb-81f1-6ae3-834f-b7b884f00cf5"
} | {
"account_age_days": 1358,
"account_id": "ACCT-C0F0F8A01CAB",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 615,
"timestamp": "2026-01-07T09:37:00Z",
"transaction_amount_usd": 871.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1046.48,
"financial_exposure_usd": 1353.54,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102864",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "medium",
"timestamp": "2026-01-02T23:44:00Z",
"trace_id": "ccfeb9d9-c84d-8387-9294-37a44164d811"
} | {
"account_age_days": 905,
"account_id": "ACCT-0B58A2C699E6",
"baseline_risk_score": 0.496,
"kyc_tier": "tier_2",
"session_entropy": 0.669
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 122,
"timestamp": "2026-01-02T20:40:00Z",
"transaction_amount_usd": 4.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 223555.59,
"financial_exposure_usd": 434481.77,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106258",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "critical",
"timestamp": "2026-01-05T08:18:00Z",
"trace_id": "f644ee9e-c11e-a20c-dadf-24377f9b022b"
} | {
"account_age_days": 366,
"account_id": "ACCT-DF6A6E36396D",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.767
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 117,
"timestamp": "2026-01-05T07:35:00Z",
"transaction_amount_usd": 19.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.485,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1851919.28,
"financial_exposure_usd": 4415750.79,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106275",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-05T08:35:00Z",
"trace_id": "06497398-b633-7777-a609-a33b7b0b5c04"
} | {
"account_age_days": 844,
"account_id": "ACCT-52CC8983533E",
"baseline_risk_score": 0.207,
"kyc_tier": "tier_1",
"session_entropy": 0.766
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 776,
"timestamp": "2026-01-05T08:35:00Z",
"transaction_amount_usd": 460771.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2051268.37,
"financial_exposure_usd": 2543251.57,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102196",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-02T12:36:00Z",
"trace_id": "c0eabb63-12ba-8b26-ef88-7a2cbb9ca96e"
} | {
"account_age_days": 1537,
"account_id": "ACCT-1042F940DE5D",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_1",
"session_entropy": 0.294
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 710,
"timestamp": "2026-01-02T12:36:00Z",
"transaction_amount_usd": 94901.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.461,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 281564.42,
"financial_exposure_usd": 334042.19,
"recoverable_pct": 0.067
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108595",
"label": "benign",
"label_confidence": 0.622,
"severity": "high",
"timestamp": "2026-01-06T23:15:00Z",
"trace_id": "7d4422bd-9faa-b4a6-24ce-779e2e6fe9b6"
} | {
"account_age_days": 1874,
"account_id": "ACCT-9E87D7622411",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.491
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1059,
"timestamp": "2026-01-06T23:15:00Z",
"transaction_amount_usd": 6319.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1999.7,
"financial_exposure_usd": 2012.24,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103756",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-03T14:36:00Z",
"trace_id": "8278933e-e694-e8c8-16b8-10a0cee902a1"
} | {
"account_age_days": 1340,
"account_id": "ACCT-055BB9F02AF5",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.475
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 252,
"timestamp": "2026-01-03T14:36:00Z",
"transaction_amount_usd": 699441.62
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.499,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2057528.61,
"financial_exposure_usd": 4966501.42,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103849",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-03T16:09:00Z",
"trace_id": "cd0b4099-a0df-dd44-7c60-abbba18ce7db"
} | {
"account_age_days": 1384,
"account_id": "ACCT-9C653C7E3E7E",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_1",
"session_entropy": 0.295
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1197,
"timestamp": "2026-01-03T16:09:00Z",
"transaction_amount_usd": 1060690.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4605204.77,
"financial_exposure_usd": 6609771.03,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107857",
"label": "benign",
"label_confidence": 0.555,
"severity": "low",
"timestamp": "2026-01-06T10:57:00Z",
"trace_id": "71a6ecca-8bc7-3ad3-8b62-e762dee9bb24"
} | {
"account_age_days": 125,
"account_id": "ACCT-B33575B63F35",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1080,
"timestamp": "2026-01-06T10:57:00Z",
"transaction_amount_usd": 1108.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2178.69,
"financial_exposure_usd": 2958.1,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102320",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-02T14:40:00Z",
"trace_id": "f69b95a5-8ae7-77e0-587b-80260e67c5c8"
} | {
"account_age_days": 132,
"account_id": "ACCT-CBF4A4FD0A54",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_2",
"session_entropy": 0.299
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 749,
"timestamp": "2026-01-02T14:40:00Z",
"transaction_amount_usd": 94892.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 580519.69,
"financial_exposure_usd": 728342.94,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107684",
"label": "benign",
"label_confidence": 0.699,
"severity": "critical",
"timestamp": "2026-01-06T08:04:00Z",
"trace_id": "8a92862a-6ca9-c2df-d0f7-0f67006c79a9"
} | {
"account_age_days": 447,
"account_id": "ACCT-406F34A79674",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_2",
"session_entropy": 0.124
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 423,
"timestamp": "2026-01-06T08:04:00Z",
"transaction_amount_usd": 12383.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1528.01,
"financial_exposure_usd": 2144.24,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104318",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "low",
"timestamp": "2026-01-03T23:58:00Z",
"trace_id": "6182d9c8-a983-64a0-5cc1-a2eeeb6b2555"
} | {
"account_age_days": 213,
"account_id": "ACCT-2529650B425C",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_2",
"session_entropy": 0.343
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 635,
"timestamp": "2026-01-03T23:58:00Z",
"transaction_amount_usd": 2742221.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.621,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4199255.03,
"financial_exposure_usd": 7114193.49,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.