schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105376",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "medium",
"timestamp": "2026-01-04T17:36:00Z",
"trace_id": "33d2c450-cfa7-aa39-f5ef-cfb47bae0c6d"
} | {
"account_age_days": 213,
"account_id": "ACCT-45A396A5EC74",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.537
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 859,
"timestamp": "2026-01-04T17:36:00Z",
"transaction_amount_usd": 1949065.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2116240.42,
"financial_exposure_usd": 2689011.14,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101454",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "low",
"timestamp": "2026-01-02T00:14:00Z",
"trace_id": "e056cc1d-1fde-01de-5113-fd2b68c016e3"
} | {
"account_age_days": 1286,
"account_id": "ACCT-C7B8EC3F1DB8",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_1",
"session_entropy": 0.109
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 229,
"timestamp": "2026-01-01T17:03:00Z",
"transaction_amount_usd": 22.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 467952.78,
"financial_exposure_usd": 572516.13,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101719",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-02T04:39:00Z",
"trace_id": "aabcee40-0a97-099f-937a-ec16a0a51095"
} | {
"account_age_days": 63,
"account_id": "ACCT-4C562A22C089",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_3",
"session_entropy": 0.532
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 699,
"timestamp": "2026-01-02T04:39:00Z",
"transaction_amount_usd": 109873.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 502880.9,
"financial_exposure_usd": 523687.04,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101896",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "high",
"timestamp": "2026-01-02T07:36:00Z",
"trace_id": "5b8e425d-567b-bda9-ce16-b68cd254049a"
} | {
"account_age_days": 892,
"account_id": "ACCT-834784E94CD7",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_1",
"session_entropy": 0.914
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 383,
"timestamp": "2026-01-02T07:36:00Z",
"transaction_amount_usd": 25171.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.855,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 741226.9,
"financial_exposure_usd": 865198.34,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101912",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "critical",
"timestamp": "2026-01-02T07:52:00Z",
"trace_id": "762a264b-167b-e2f8-096a-2fba5fb71f23"
} | {
"account_age_days": 1917,
"account_id": "ACCT-0BB8D19A251A",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_2",
"session_entropy": 0.579
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 249,
"timestamp": "2026-01-02T06:15:00Z",
"transaction_amount_usd": 6.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 995800.14,
"financial_exposure_usd": 1106447.59,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109334",
"label": "benign",
"label_confidence": 0.578,
"severity": "low",
"timestamp": "2026-01-07T11:34:00Z",
"trace_id": "9abb4711-07d0-14a8-d2a8-9f5cd3bd2bee"
} | {
"account_age_days": 351,
"account_id": "ACCT-6BA73B8CB8BA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1054,
"timestamp": "2026-01-07T11:34:00Z",
"transaction_amount_usd": 1494.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5172.08,
"financial_exposure_usd": 5553.32,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100030",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-01T00:30:00Z",
"trace_id": "094d916d-eb6d-2fed-ef15-8d5b2d007d05"
} | {
"account_age_days": 245,
"account_id": "ACCT-3C7E5368B159",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_2",
"session_entropy": 0.153
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 98,
"timestamp": "2026-01-01T00:30:00Z",
"transaction_amount_usd": 22764.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.446,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 128899.41,
"financial_exposure_usd": 158319.2,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109740",
"label": "benign",
"label_confidence": 0.65,
"severity": "high",
"timestamp": "2026-01-07T18:20:00Z",
"trace_id": "cca11cc4-2c59-b5cc-de32-5f9e5cac226d"
} | {
"account_age_days": 1015,
"account_id": "ACCT-49BC221D2D75",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.618
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 237,
"timestamp": "2026-01-07T18:20:00Z",
"transaction_amount_usd": 6570.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2624.66,
"financial_exposure_usd": 2683.61,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109089",
"label": "benign",
"label_confidence": 0.501,
"severity": "high",
"timestamp": "2026-01-07T07:29:00Z",
"trace_id": "5c7e60d5-3652-d05d-da28-4cd9dc55d4c0"
} | {
"account_age_days": 685,
"account_id": "ACCT-11D3D4648F9D",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 754,
"timestamp": "2026-01-07T07:29:00Z",
"transaction_amount_usd": 5143.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1743.69,
"financial_exposure_usd": 1883.46,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102395",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-02T15:55:00Z",
"trace_id": "c21f57d0-cf17-ebc9-eb8e-4a66dc01abf5"
} | {
"account_age_days": 242,
"account_id": "ACCT-E94D2F0CF84D",
"baseline_risk_score": 0.488,
"kyc_tier": "tier_2",
"session_entropy": 0.762
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 111,
"timestamp": "2026-01-02T15:55:00Z",
"transaction_amount_usd": 63722.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 499942.9,
"financial_exposure_usd": 911484.49,
"recoverable_pct": 0.031
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106837",
"label": "benign",
"label_confidence": 0.577,
"severity": "critical",
"timestamp": "2026-01-05T17:57:00Z",
"trace_id": "25542cc9-134e-b07d-54eb-ece9cae13ac0"
} | {
"account_age_days": 728,
"account_id": "ACCT-A1F03DD6CE14",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.387
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 369,
"timestamp": "2026-01-05T08:01:00Z",
"transaction_amount_usd": 3.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2657.13,
"financial_exposure_usd": 3590.82,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107726",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-06T08:46:00Z",
"trace_id": "eb3d1352-a651-3af7-6bc5-4cc84360a334"
} | {
"account_age_days": 303,
"account_id": "ACCT-699A89834155",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.452
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1095,
"timestamp": "2026-01-06T08:46:00Z",
"transaction_amount_usd": 10005.08
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1793.1,
"financial_exposure_usd": 2190.6,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107901",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-06T11:41:00Z",
"trace_id": "fa505bbe-4f6c-8608-a2f9-12db2b917f62"
} | {
"account_age_days": 956,
"account_id": "ACCT-5B01932B01CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 589,
"timestamp": "2026-01-06T11:41:00Z",
"transaction_amount_usd": 5480.54
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 860.79,
"financial_exposure_usd": 980.07,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102073",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-02T10:33:00Z",
"trace_id": "29cfe51b-513c-9933-414e-b97a2741316e"
} | {
"account_age_days": 1386,
"account_id": "ACCT-41D6F9F2F676",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.357
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 251,
"timestamp": "2026-01-02T07:41:00Z",
"transaction_amount_usd": 15.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.406,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1030566.23,
"financial_exposure_usd": 1241129.56,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102476",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "high",
"timestamp": "2026-01-02T17:16:00Z",
"trace_id": "6943b332-11bc-fbb2-9897-26bc98bece92"
} | {
"account_age_days": 577,
"account_id": "ACCT-6A02B94A7961",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_3",
"session_entropy": 0.756
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 692,
"timestamp": "2026-01-02T17:16:00Z",
"transaction_amount_usd": 80027.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.443,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 683969.79,
"financial_exposure_usd": 793177.14,
"recoverable_pct": 0.323
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100312",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-01T05:12:00Z",
"trace_id": "305c5d6f-0997-db9a-1fdb-482df69d1805"
} | {
"account_age_days": 46,
"account_id": "ACCT-4410D8927419",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_3",
"session_entropy": 0.855
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 372,
"timestamp": "2026-01-01T05:12:00Z",
"transaction_amount_usd": 646.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1012024.57,
"financial_exposure_usd": 1158848.72,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103157",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-03T04:37:00Z",
"trace_id": "19ba7d9d-25aa-ff94-a933-f65152be8e04"
} | {
"account_age_days": 1842,
"account_id": "ACCT-7BEA88137828",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 371,
"timestamp": "2026-01-03T04:37:00Z",
"transaction_amount_usd": 98431.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.486,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 295736.81,
"financial_exposure_usd": 328554.69,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103432",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-03T09:12:00Z",
"trace_id": "d9535515-14b9-9584-034c-8e4e5afac0f7"
} | {
"account_age_days": 1754,
"account_id": "ACCT-C7F697C45164",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.647
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 817,
"timestamp": "2026-01-03T09:12:00Z",
"transaction_amount_usd": 497064.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1452895.79,
"financial_exposure_usd": 1634080.91,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107509",
"label": "benign",
"label_confidence": 0.717,
"severity": "low",
"timestamp": "2026-01-06T05:09:00Z",
"trace_id": "c35c70ab-e683-8793-dd0d-57e59d847572"
} | {
"account_age_days": 1168,
"account_id": "ACCT-C18118CB272F",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_2",
"session_entropy": 0.439
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 148,
"timestamp": "2026-01-06T02:45:00Z",
"transaction_amount_usd": 24.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1691.15,
"financial_exposure_usd": 1717.78,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100293",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-01T04:53:00Z",
"trace_id": "6540ecd1-1f0e-523d-9cab-29544e2b952e"
} | {
"account_age_days": 273,
"account_id": "ACCT-78FD780C5630",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_1",
"session_entropy": 0.78
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 609,
"timestamp": "2026-01-01T04:53:00Z",
"transaction_amount_usd": 70896.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 548376.84,
"financial_exposure_usd": 943748.06,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104775",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "high",
"timestamp": "2026-01-04T07:35:00Z",
"trace_id": "285e413a-3382-da88-2d2e-3dae9a4416c2"
} | {
"account_age_days": 243,
"account_id": "ACCT-843E6ADCE123",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.712
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 579,
"timestamp": "2026-01-04T07:35:00Z",
"transaction_amount_usd": 2163708.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.454,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5009360.41,
"financial_exposure_usd": 8390787.05,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105078",
"label": "fraudulent",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-04T12:38:00Z",
"trace_id": "545673a7-a86d-279d-f71e-06946ffadda6"
} | {
"account_age_days": 333,
"account_id": "ACCT-74B2E6E04F8D",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_3",
"session_entropy": 0.249
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 773,
"timestamp": "2026-01-04T12:38:00Z",
"transaction_amount_usd": 1668392.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.845,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3230402.22,
"financial_exposure_usd": 5601592.03,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109261",
"label": "benign",
"label_confidence": 0.513,
"severity": "high",
"timestamp": "2026-01-07T10:21:00Z",
"trace_id": "c0f93b2c-8994-26af-6eb6-973cae63d0bd"
} | {
"account_age_days": 826,
"account_id": "ACCT-80881FE36DCF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.836
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 385,
"timestamp": "2026-01-07T10:21:00Z",
"transaction_amount_usd": 366.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4645.16,
"financial_exposure_usd": 5046.2,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107619",
"label": "benign",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-06T06:59:00Z",
"trace_id": "84807941-8256-0c6b-d3bd-5905b9bb18e8"
} | {
"account_age_days": 45,
"account_id": "ACCT-0FC5F39E1DC0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.209
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 187,
"timestamp": "2026-01-06T06:59:00Z",
"transaction_amount_usd": 869.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5191.68,
"financial_exposure_usd": 6094.12,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109945",
"label": "benign",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-07T21:45:00Z",
"trace_id": "d318c3b0-9577-d052-0388-29dba4596507"
} | {
"account_age_days": 1502,
"account_id": "ACCT-B19BFF111074",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_1",
"session_entropy": 0.655
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 791,
"timestamp": "2026-01-07T21:45:00Z",
"transaction_amount_usd": 851.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1123.5,
"financial_exposure_usd": 1203.54,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104593",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "medium",
"timestamp": "2026-01-04T04:33:00Z",
"trace_id": "75f0dff5-9266-a37e-c5b0-347965b1edf4"
} | {
"account_age_days": 32,
"account_id": "ACCT-4BC697B573EF",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.328
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 959,
"timestamp": "2026-01-04T04:33:00Z",
"transaction_amount_usd": 1600848.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.423,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2891442.92,
"financial_exposure_usd": 4809026.42,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108407",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-06T20:07:00Z",
"trace_id": "0efc8f0b-79eb-b07c-9405-b6d40b8792b3"
} | {
"account_age_days": 1731,
"account_id": "ACCT-340DD13B82A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.716
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 760,
"timestamp": "2026-01-06T20:07:00Z",
"transaction_amount_usd": 11679.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 853.26,
"financial_exposure_usd": 1829.95,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102585",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "medium",
"timestamp": "2026-01-02T19:05:00Z",
"trace_id": "a4019c98-ca29-461e-4b56-65927307db96"
} | {
"account_age_days": 1313,
"account_id": "ACCT-247ACE1216D6",
"baseline_risk_score": 0.547,
"kyc_tier": "tier_2",
"session_entropy": 0.693
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 380,
"timestamp": "2026-01-02T10:18:00Z",
"transaction_amount_usd": 5.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.846,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 444641.35,
"financial_exposure_usd": 898953.38,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102475",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "critical",
"timestamp": "2026-01-02T17:15:00Z",
"trace_id": "78613085-a06e-a6c6-7bf2-874967647612"
} | {
"account_age_days": 563,
"account_id": "ACCT-8FD89C1C148E",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 614,
"timestamp": "2026-01-02T17:15:00Z",
"transaction_amount_usd": 37447.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 870759.02,
"financial_exposure_usd": 1290149.95,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102210",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "medium",
"timestamp": "2026-01-02T12:50:00Z",
"trace_id": "684986f0-139d-668f-abbd-323d0fd74c0c"
} | {
"account_age_days": 1619,
"account_id": "ACCT-792981415D74",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.44
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 285,
"timestamp": "2026-01-02T12:50:00Z",
"transaction_amount_usd": 23895.23
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.559,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 609490.62,
"financial_exposure_usd": 671605.22,
"recoverable_pct": 0.372
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106604",
"label": "fraudulent",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-05T14:04:00Z",
"trace_id": "f1c8fbb6-bdc5-512f-a73d-7ab65d416819"
} | {
"account_age_days": 932,
"account_id": "ACCT-15E7B91510A5",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_3",
"session_entropy": 0.174
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 969,
"timestamp": "2026-01-05T14:04:00Z",
"transaction_amount_usd": 65472.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3968481.46,
"financial_exposure_usd": 6382339.45,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108669",
"label": "benign",
"label_confidence": 0.577,
"severity": "critical",
"timestamp": "2026-01-07T00:29:00Z",
"trace_id": "3b512e6c-d643-db6f-d843-3724b59dd83a"
} | {
"account_age_days": 1136,
"account_id": "ACCT-0431D5F0AEBD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.514
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1119,
"timestamp": "2026-01-07T00:29:00Z",
"transaction_amount_usd": 5160.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 745.68,
"financial_exposure_usd": 1727.95,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103810",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "medium",
"timestamp": "2026-01-03T15:30:00Z",
"trace_id": "10943f7b-1c0e-a632-6e80-b76fe50a2d27"
} | {
"account_age_days": 1311,
"account_id": "ACCT-4E33864FA120",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.802
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 191,
"timestamp": "2026-01-03T03:23:00Z",
"transaction_amount_usd": 20.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3869767.07,
"financial_exposure_usd": 7455444.07,
"recoverable_pct": 0.703
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103039",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-03T02:39:00Z",
"trace_id": "f779c936-ad94-6abc-eb64-74320c4e29bc"
} | {
"account_age_days": 803,
"account_id": "ACCT-78501B0317CB",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 171,
"timestamp": "2026-01-03T00:56:00Z",
"transaction_amount_usd": 23.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.526,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 185547.16,
"financial_exposure_usd": 381871.09,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105349",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-04T17:09:00Z",
"trace_id": "55a627ee-bec9-8115-72d8-1f4c3cebe37c"
} | {
"account_age_days": 445,
"account_id": "ACCT-6CA081E3C14E",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_3",
"session_entropy": 0.242
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 331,
"timestamp": "2026-01-04T13:08:00Z",
"transaction_amount_usd": 5.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4526980.65,
"financial_exposure_usd": 5433713.64,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102794",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "critical",
"timestamp": "2026-01-02T22:34:00Z",
"trace_id": "a54658bf-903e-36b6-98b6-a2df50c166aa"
} | {
"account_age_days": 1811,
"account_id": "ACCT-118D03A07F18",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_1",
"session_entropy": 0.538
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 256,
"timestamp": "2026-01-02T14:04:00Z",
"transaction_amount_usd": 22.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.683,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 328483.07,
"financial_exposure_usd": 349511.68,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106844",
"label": "benign",
"label_confidence": 0.631,
"severity": "medium",
"timestamp": "2026-01-05T18:04:00Z",
"trace_id": "2541f871-8d7c-eb0f-f55c-9d95b0d20343"
} | {
"account_age_days": 1203,
"account_id": "ACCT-7D91BA76CDD5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.591
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 796,
"timestamp": "2026-01-05T18:04:00Z",
"transaction_amount_usd": 6541.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1011.08,
"financial_exposure_usd": 2476.97,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102933",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-03T00:53:00Z",
"trace_id": "d4f80637-45de-1ca0-ab77-6b66aebfba9a"
} | {
"account_age_days": 843,
"account_id": "ACCT-CE2B2BFDB81D",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1059,
"timestamp": "2026-01-03T00:53:00Z",
"transaction_amount_usd": 105232.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1021725.81,
"financial_exposure_usd": 1291558.55,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108824",
"label": "benign",
"label_confidence": 0.49,
"severity": "low",
"timestamp": "2026-01-07T03:04:00Z",
"trace_id": "00a7dfe5-09c4-e3ad-ff87-143e759fc514"
} | {
"account_age_days": 953,
"account_id": "ACCT-CFF4C0B887D7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.429
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 392,
"timestamp": "2026-01-06T18:33:00Z",
"transaction_amount_usd": 20
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6812.68,
"financial_exposure_usd": 7656.4,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103354",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "high",
"timestamp": "2026-01-03T07:54:00Z",
"trace_id": "2a7f1a75-1d13-7bf9-6b96-faecb6e094d9"
} | {
"account_age_days": 1845,
"account_id": "ACCT-511754BA793C",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1114,
"timestamp": "2026-01-03T07:54:00Z",
"transaction_amount_usd": 727809.98
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.872,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4135981.51,
"financial_exposure_usd": 5920240.21,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105888",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "low",
"timestamp": "2026-01-05T02:08:00Z",
"trace_id": "8f1680bd-e501-445a-d315-f5d6349b45d0"
} | {
"account_age_days": 1776,
"account_id": "ACCT-C2A46BEA0BB9",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_3",
"session_entropy": 0.238
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 609,
"timestamp": "2026-01-05T02:08:00Z",
"transaction_amount_usd": 741964.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.946,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3082638.45,
"financial_exposure_usd": 5350441.4,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105874",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-05T01:54:00Z",
"trace_id": "61d33f5c-4c90-2d59-72a7-91e4e490e01c"
} | {
"account_age_days": 1476,
"account_id": "ACCT-9A32BD2D9782",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.812
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 130,
"timestamp": "2026-01-04T15:04:00Z",
"transaction_amount_usd": 0.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.605,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3501803.56,
"financial_exposure_usd": 3922288.33,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109435",
"label": "benign",
"label_confidence": 0.476,
"severity": "low",
"timestamp": "2026-01-07T13:15:00Z",
"trace_id": "7996b078-e418-107a-ead3-e49579833ba8"
} | {
"account_age_days": 1115,
"account_id": "ACCT-BB6A226912C4",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.173
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 169,
"timestamp": "2026-01-07T13:15:00Z",
"transaction_amount_usd": 4138.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.608,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1022.14,
"financial_exposure_usd": 1257.93,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106188",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "low",
"timestamp": "2026-01-05T07:08:00Z",
"trace_id": "b883eb41-1617-d4d1-7993-7fe16891aa5b"
} | {
"account_age_days": 594,
"account_id": "ACCT-3BC4A1805B9E",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.73
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1061,
"timestamp": "2026-01-05T07:08:00Z",
"transaction_amount_usd": 1837697.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3469728.41,
"financial_exposure_usd": 3582141.86,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106084",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "critical",
"timestamp": "2026-01-05T05:24:00Z",
"trace_id": "a6318552-f10b-3987-bf71-07ca1dbdda69"
} | {
"account_age_days": 1064,
"account_id": "ACCT-432F3B1842DB",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_1",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 455,
"timestamp": "2026-01-05T05:24:00Z",
"transaction_amount_usd": 271903.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2110062.53,
"financial_exposure_usd": 3733481.84,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100773",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "low",
"timestamp": "2026-01-01T12:53:00Z",
"trace_id": "a2b3fe51-cf39-c8cf-3b96-2ef833ab6ceb"
} | {
"account_age_days": 1002,
"account_id": "ACCT-0916047B03DF",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_1",
"session_entropy": 0.218
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1066,
"timestamp": "2026-01-01T12:53:00Z",
"transaction_amount_usd": 9250.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.8,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 84479.64,
"financial_exposure_usd": 140439.2,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101886",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-02T07:26:00Z",
"trace_id": "b09fb603-fc60-7198-4b27-2b0ab54a95f4"
} | {
"account_age_days": 478,
"account_id": "ACCT-16FA7C2EDC6A",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_2",
"session_entropy": 0.834
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 516,
"timestamp": "2026-01-02T07:26:00Z",
"transaction_amount_usd": 72904.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 459640.55,
"financial_exposure_usd": 1137547.08,
"recoverable_pct": 0.158
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106195",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "medium",
"timestamp": "2026-01-05T07:15:00Z",
"trace_id": "ee8f4e50-316f-8389-bf10-1f1c541a64ba"
} | {
"account_age_days": 1320,
"account_id": "ACCT-301950170BAD",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.325
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1162,
"timestamp": "2026-01-05T07:15:00Z",
"transaction_amount_usd": 676219.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.809,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1758024.22,
"financial_exposure_usd": 2950374.26,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107165",
"label": "benign",
"label_confidence": 0.62,
"severity": "high",
"timestamp": "2026-01-05T23:25:00Z",
"trace_id": "23abcd94-1152-d3cc-0fba-aa60c616f57f"
} | {
"account_age_days": 1528,
"account_id": "ACCT-62EA00C5C707",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.613
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1191,
"timestamp": "2026-01-05T23:25:00Z",
"transaction_amount_usd": 13311.74
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4127.75,
"financial_exposure_usd": 7150.07,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100470",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "critical",
"timestamp": "2026-01-01T07:50:00Z",
"trace_id": "a21fa4ab-a342-0fdb-4415-f0cb38cc1827"
} | {
"account_age_days": 215,
"account_id": "ACCT-09E6C510A634",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_2",
"session_entropy": 0.349
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 780,
"timestamp": "2026-01-01T07:50:00Z",
"transaction_amount_usd": 90649.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.933,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 440368.72,
"financial_exposure_usd": 715103.61,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106550",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "medium",
"timestamp": "2026-01-05T13:10:00Z",
"trace_id": "4b1fc30f-6034-f8f9-0088-2ea7f74dc979"
} | {
"account_age_days": 1198,
"account_id": "ACCT-DCE613D177DB",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1177,
"timestamp": "2026-01-05T13:10:00Z",
"transaction_amount_usd": 1398677.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.516,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3170578.6,
"financial_exposure_usd": 4038422.42,
"recoverable_pct": 0.921
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103596",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "low",
"timestamp": "2026-01-03T11:56:00Z",
"trace_id": "d1c2fbec-3b66-2cbd-b63a-64acaa40603d"
} | {
"account_age_days": 400,
"account_id": "ACCT-9BE5D5494B98",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.878
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 574,
"timestamp": "2026-01-03T11:56:00Z",
"transaction_amount_usd": 1038635.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.786,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6253178.82,
"financial_exposure_usd": 11366723.87,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104908",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "low",
"timestamp": "2026-01-04T09:48:00Z",
"trace_id": "397afd3b-5990-29ef-21a1-8b6609a0330e"
} | {
"account_age_days": 1522,
"account_id": "ACCT-119C7C1F7CA4",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.559
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 308,
"timestamp": "2026-01-03T21:51:00Z",
"transaction_amount_usd": 7.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4060775.76,
"financial_exposure_usd": 5949151.94,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100717",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-01T11:57:00Z",
"trace_id": "732dded9-17fb-0786-f20b-435bd66bfdad"
} | {
"account_age_days": 427,
"account_id": "ACCT-D392D5ECC336",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.708
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 270,
"timestamp": "2026-01-01T03:21:00Z",
"transaction_amount_usd": 10.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 390714.18,
"financial_exposure_usd": 832359.15,
"recoverable_pct": 0.212
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108521",
"label": "benign",
"label_confidence": 0.542,
"severity": "medium",
"timestamp": "2026-01-06T22:01:00Z",
"trace_id": "9b2768c0-62e0-4f56-c8c3-331f7caf9b61"
} | {
"account_age_days": 1372,
"account_id": "ACCT-BEE2F5C33258",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 636,
"timestamp": "2026-01-06T22:01:00Z",
"transaction_amount_usd": 7562.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2182.07,
"financial_exposure_usd": 3535.55,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108382",
"label": "benign",
"label_confidence": 0.592,
"severity": "low",
"timestamp": "2026-01-06T19:42:00Z",
"trace_id": "578a3915-9519-7301-93ba-89ad93eb0adf"
} | {
"account_age_days": 1947,
"account_id": "ACCT-C86DB245A64D",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_2",
"session_entropy": 0.574
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 564,
"timestamp": "2026-01-06T19:42:00Z",
"transaction_amount_usd": 2110.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.749,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2753.26,
"financial_exposure_usd": 5367.4,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102361",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-02T15:21:00Z",
"trace_id": "35226c0a-01bf-8295-2c39-7cebe905bf49"
} | {
"account_age_days": 812,
"account_id": "ACCT-70119C495ED3",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_1",
"session_entropy": 0.522
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 364,
"timestamp": "2026-01-02T15:21:00Z",
"transaction_amount_usd": 56624.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 1329837.64,
"financial_exposure_usd": 1636865.61,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100863",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-01T14:23:00Z",
"trace_id": "a34b0f88-6bd6-ba48-0231-3061894d34c9"
} | {
"account_age_days": 1198,
"account_id": "ACCT-652B32F0FC8A",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_3",
"session_entropy": 0.202
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 722,
"timestamp": "2026-01-01T14:23:00Z",
"transaction_amount_usd": 66496.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.399,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 982378.54,
"financial_exposure_usd": 1142764.18,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103890",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "low",
"timestamp": "2026-01-03T16:50:00Z",
"trace_id": "24541a56-2042-fb13-7b87-7ce5e0aa19f2"
} | {
"account_age_days": 1393,
"account_id": "ACCT-8C81DDB98E1E",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1053,
"timestamp": "2026-01-03T16:50:00Z",
"transaction_amount_usd": 2990603.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.92,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2626334.58,
"financial_exposure_usd": 4950717.13,
"recoverable_pct": 0.932
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100664",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "medium",
"timestamp": "2026-01-01T11:04:00Z",
"trace_id": "efe47a7e-33ee-ae36-c177-af2424c3532a"
} | {
"account_age_days": 349,
"account_id": "ACCT-6229BA7FED40",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_1",
"session_entropy": 0.231
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 269,
"timestamp": "2025-12-31T23:03:00Z",
"transaction_amount_usd": 0.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1246242.59,
"financial_exposure_usd": 1430891,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106203",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-05T07:23:00Z",
"trace_id": "ff799bbb-e450-dbf5-7295-215bd5e09389"
} | {
"account_age_days": 1012,
"account_id": "ACCT-1EAD699CDB48",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.379
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 256,
"timestamp": "2026-01-05T07:23:00Z",
"transaction_amount_usd": 774586.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.704,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5973570.39,
"financial_exposure_usd": 6702892.56,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103423",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-03T09:03:00Z",
"trace_id": "e246afb1-9289-70b3-91cb-4579467d1997"
} | {
"account_age_days": 1751,
"account_id": "ACCT-6E2490B68EDC",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_2",
"session_entropy": 0.706
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 901,
"timestamp": "2026-01-03T09:03:00Z",
"transaction_amount_usd": 1167662.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7896375.59,
"financial_exposure_usd": 8022430.33,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100338",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T05:38:00Z",
"trace_id": "a4728ffc-931b-5970-e946-033f79b22b20"
} | {
"account_age_days": 1973,
"account_id": "ACCT-29B12582C354",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_3",
"session_entropy": 0.591
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1118,
"timestamp": "2026-01-01T05:38:00Z",
"transaction_amount_usd": 73909.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.635,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 336638.36,
"financial_exposure_usd": 391420.56,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105709",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-04T23:09:00Z",
"trace_id": "f877d52b-22db-c57d-4eed-0ca737a1214e"
} | {
"account_age_days": 181,
"account_id": "ACCT-7C182255DB1C",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_2",
"session_entropy": 0.812
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1129,
"timestamp": "2026-01-04T23:09:00Z",
"transaction_amount_usd": 2545445.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2561830.66,
"financial_exposure_usd": 5986583.1,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100179",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "low",
"timestamp": "2026-01-01T02:59:00Z",
"trace_id": "f7eefd84-b31c-8349-5799-2f42351b3e63"
} | {
"account_age_days": 875,
"account_id": "ACCT-81C82E2BED48",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 608,
"timestamp": "2026-01-01T02:59:00Z",
"transaction_amount_usd": 89304.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.59,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 483544.58,
"financial_exposure_usd": 970163.45,
"recoverable_pct": 0.141
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102898",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "medium",
"timestamp": "2026-01-03T00:18:00Z",
"trace_id": "ee2d345b-c893-b4f6-b178-31ebe1bf08a9"
} | {
"account_age_days": 1533,
"account_id": "ACCT-5D34B0F7103C",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_1",
"session_entropy": 0.789
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1150,
"timestamp": "2026-01-03T00:18:00Z",
"transaction_amount_usd": 38527.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 744776.95,
"financial_exposure_usd": 1215158.35,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105796",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "critical",
"timestamp": "2026-01-05T00:36:00Z",
"trace_id": "ac1423f1-c5e9-0e6f-954f-7c445fcc224a"
} | {
"account_age_days": 860,
"account_id": "ACCT-2F03BD8321AD",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.769
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 141,
"timestamp": "2026-01-05T00:36:00Z",
"transaction_amount_usd": 2860740.15
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.787,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3963283.99,
"financial_exposure_usd": 6144089.98,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106772",
"label": "benign",
"label_confidence": 0.679,
"severity": "low",
"timestamp": "2026-01-05T16:52:00Z",
"trace_id": "72babaa6-1538-2cc7-fcf6-cdd65fc6463a"
} | {
"account_age_days": 1988,
"account_id": "ACCT-4D9C3FCF0F8D",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 163,
"timestamp": "2026-01-05T15:46:00Z",
"transaction_amount_usd": 15.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3267.29,
"financial_exposure_usd": 3730.98,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103053",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-03T02:53:00Z",
"trace_id": "6a96e94d-ecb5-d7f5-749f-60e0de2b1553"
} | {
"account_age_days": 551,
"account_id": "ACCT-926018D7E50C",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 329,
"timestamp": "2026-01-02T23:07:00Z",
"transaction_amount_usd": 19.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 565175.02,
"financial_exposure_usd": 1295426.13,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102420",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-02T16:20:00Z",
"trace_id": "59d8a17d-6f1d-fbd0-9b28-d976d057b154"
} | {
"account_age_days": 1053,
"account_id": "ACCT-F4267DB5B3D1",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_1",
"session_entropy": 0.219
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 313,
"timestamp": "2026-01-02T16:20:00Z",
"transaction_amount_usd": 32933.3
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.526,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 275503.97,
"financial_exposure_usd": 643333.77,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107816",
"label": "benign",
"label_confidence": 0.734,
"severity": "high",
"timestamp": "2026-01-06T10:16:00Z",
"trace_id": "df4ddb7f-d823-4669-c70a-cd755939dd67"
} | {
"account_age_days": 1784,
"account_id": "ACCT-F49A873A6003",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.719
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1017,
"timestamp": "2026-01-06T10:16:00Z",
"transaction_amount_usd": 6297.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1518.35,
"financial_exposure_usd": 1844.17,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106026",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "medium",
"timestamp": "2026-01-05T04:26:00Z",
"trace_id": "6c48d302-981e-29f4-d9ae-090c165f5239"
} | {
"account_age_days": 342,
"account_id": "ACCT-3DADA24811E0",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_3",
"session_entropy": 0.275
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 725,
"timestamp": "2026-01-05T04:26:00Z",
"transaction_amount_usd": 486893.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.846,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4733737.04,
"financial_exposure_usd": 5523386.45,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100189",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "low",
"timestamp": "2026-01-01T03:09:00Z",
"trace_id": "2bf998ad-c92a-eb0c-656f-fbd8c4329e78"
} | {
"account_age_days": 1941,
"account_id": "ACCT-784983FF97CA",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.909
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 933,
"timestamp": "2026-01-01T03:09:00Z",
"transaction_amount_usd": 19277.35
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.763,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 614709.66,
"financial_exposure_usd": 1117841.57,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109447",
"label": "benign",
"label_confidence": 0.566,
"severity": "high",
"timestamp": "2026-01-07T13:27:00Z",
"trace_id": "5d2bd4b9-1039-0901-402a-faed6c33bca6"
} | {
"account_age_days": 550,
"account_id": "ACCT-981C7060A1F8",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1170,
"timestamp": "2026-01-07T13:27:00Z",
"transaction_amount_usd": 7188.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1548,
"financial_exposure_usd": 1697.9,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109366",
"label": "benign",
"label_confidence": 0.525,
"severity": "medium",
"timestamp": "2026-01-07T12:06:00Z",
"trace_id": "8d92a8ff-2531-17d2-3382-0ceca34aaa8f"
} | {
"account_age_days": 893,
"account_id": "ACCT-BDC3DB405DF2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.592
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1072,
"timestamp": "2026-01-07T12:06:00Z",
"transaction_amount_usd": 3788.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3936.18,
"financial_exposure_usd": 5771.48,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109666",
"label": "benign",
"label_confidence": 0.616,
"severity": "high",
"timestamp": "2026-01-07T17:06:00Z",
"trace_id": "f9525ba1-7f7a-b250-3e9f-65a20de5749f"
} | {
"account_age_days": 1241,
"account_id": "ACCT-44BE5ACF0DCA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.794
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 289,
"timestamp": "2026-01-07T17:06:00Z",
"transaction_amount_usd": 9061.13
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1965.62,
"financial_exposure_usd": 3613.64,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108279",
"label": "benign",
"label_confidence": 0.714,
"severity": "high",
"timestamp": "2026-01-06T17:59:00Z",
"trace_id": "83a7e042-0adb-a980-8032-e0d593e9f5ca"
} | {
"account_age_days": 1272,
"account_id": "ACCT-61D48EC526B8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.127
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 152,
"timestamp": "2026-01-06T10:14:00Z",
"transaction_amount_usd": 5.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3628,
"financial_exposure_usd": 3952.01,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109350",
"label": "benign",
"label_confidence": 0.667,
"severity": "low",
"timestamp": "2026-01-07T11:50:00Z",
"trace_id": "900e6e73-7695-3cc0-6ee3-c1fe562f7cc1"
} | {
"account_age_days": 1656,
"account_id": "ACCT-B475CD03673B",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.73
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 245,
"timestamp": "2026-01-07T02:56:00Z",
"transaction_amount_usd": 4.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1924.79,
"financial_exposure_usd": 2111.08,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101559",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-02T01:59:00Z",
"trace_id": "47329faf-9143-6689-c702-e5c45d0dd068"
} | {
"account_age_days": 1428,
"account_id": "ACCT-274DA2F3AB7F",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 302,
"timestamp": "2026-01-02T01:59:00Z",
"transaction_amount_usd": 64174.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 631122.07,
"financial_exposure_usd": 898798.44,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100762",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "critical",
"timestamp": "2026-01-01T12:42:00Z",
"trace_id": "cbb7882c-fd03-87a0-c336-b2a4f87f1f37"
} | {
"account_age_days": 1492,
"account_id": "ACCT-5E9B6204C410",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 461,
"timestamp": "2026-01-01T12:42:00Z",
"transaction_amount_usd": 102291.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.664,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 842376.86,
"financial_exposure_usd": 1175417.72,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109746",
"label": "benign",
"label_confidence": 0.588,
"severity": "critical",
"timestamp": "2026-01-07T18:26:00Z",
"trace_id": "6f1974bc-ed10-b5ce-d912-0ccb7d5bb802"
} | {
"account_age_days": 97,
"account_id": "ACCT-AA0425A81C82",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.159
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 109,
"timestamp": "2026-01-07T07:17:00Z",
"transaction_amount_usd": 7.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1878.59,
"financial_exposure_usd": 2070.04,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108986",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-07T05:46:00Z",
"trace_id": "d41bd9f5-d2c5-73ee-f65c-81170fd1a063"
} | {
"account_age_days": 4,
"account_id": "ACCT-A827DAD96AD8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.161
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1023,
"timestamp": "2026-01-07T05:46:00Z",
"transaction_amount_usd": 14069.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1589.1,
"financial_exposure_usd": 2182.65,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107833",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-06T10:33:00Z",
"trace_id": "043097b2-c7c6-b7d5-0841-ef94da0a48af"
} | {
"account_age_days": 831,
"account_id": "ACCT-97FA5F4D9FCE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.365
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 682,
"timestamp": "2026-01-06T10:33:00Z",
"transaction_amount_usd": 12232.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.552,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1942.23,
"financial_exposure_usd": 2371.87,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107842",
"label": "benign",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-06T10:42:00Z",
"trace_id": "2f4cd52e-4765-c61b-6515-9b509703f14b"
} | {
"account_age_days": 1166,
"account_id": "ACCT-3F583B423B04",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.797
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1116,
"timestamp": "2026-01-06T10:42:00Z",
"transaction_amount_usd": 9655.88
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 704.85,
"financial_exposure_usd": 1506.77,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105324",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "low",
"timestamp": "2026-01-04T16:44:00Z",
"trace_id": "9b13f21e-7d8d-404a-8dd1-6fcb0c33d504"
} | {
"account_age_days": 162,
"account_id": "ACCT-EBF30A6031EE",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.296
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 393,
"timestamp": "2026-01-04T16:44:00Z",
"transaction_amount_usd": 1455114.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1557123.26,
"financial_exposure_usd": 3340643.42,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102010",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-02T09:30:00Z",
"trace_id": "c91e98ed-cff2-1af4-30ee-6afc954f5be5"
} | {
"account_age_days": 1602,
"account_id": "ACCT-C13F40125DD4",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_2",
"session_entropy": 0.701
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 644,
"timestamp": "2026-01-02T09:30:00Z",
"transaction_amount_usd": 8679.95
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.547,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 352351,
"financial_exposure_usd": 602677.85,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106601",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-05T14:01:00Z",
"trace_id": "0cf1cdc7-493d-a84f-9016-de98e7c2f451"
} | {
"account_age_days": 258,
"account_id": "ACCT-4BC7D00897D1",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_3",
"session_entropy": 0.105
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 375,
"timestamp": "2026-01-05T14:01:00Z",
"transaction_amount_usd": 1519670.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.486,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2266474.78,
"financial_exposure_usd": 2686834.85,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103336",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-03T07:36:00Z",
"trace_id": "df2f3095-36c2-7a9a-5c2f-f32649875dd1"
} | {
"account_age_days": 1988,
"account_id": "ACCT-8CFAAFA29782",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.305
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 258,
"timestamp": "2026-01-03T07:36:00Z",
"transaction_amount_usd": 2849026.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.881,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5754839.2,
"financial_exposure_usd": 5862812.49,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109075",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-07T07:15:00Z",
"trace_id": "037d4863-e9e2-705e-3791-d147aa6df61f"
} | {
"account_age_days": 996,
"account_id": "ACCT-D461EA1A4803",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.282
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 101,
"timestamp": "2026-01-07T07:15:00Z",
"transaction_amount_usd": 9332.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.615,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3657.13,
"financial_exposure_usd": 7350.32,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105016",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-04T11:36:00Z",
"trace_id": "49a13182-b962-1e5c-d049-bf369bd16d45"
} | {
"account_age_days": 1344,
"account_id": "ACCT-F590C5AC1952",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_3",
"session_entropy": 0.227
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 574,
"timestamp": "2026-01-04T11:36:00Z",
"transaction_amount_usd": 523701.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.685,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4595303.2,
"financial_exposure_usd": 5872210.29,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108968",
"label": "benign",
"label_confidence": 0.464,
"severity": "medium",
"timestamp": "2026-01-07T05:28:00Z",
"trace_id": "a1fd3756-6404-cd57-1d8b-d947a4761333"
} | {
"account_age_days": 322,
"account_id": "ACCT-F9D1C447A16C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.582
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 186,
"timestamp": "2026-01-07T02:26:00Z",
"transaction_amount_usd": 11.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.657,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 338.5,
"financial_exposure_usd": 483.81,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106909",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-05T19:09:00Z",
"trace_id": "a2132869-7e59-1618-db29-bc17a484b5e5"
} | {
"account_age_days": 1840,
"account_id": "ACCT-CA9D7C78036B",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.6
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 280,
"timestamp": "2026-01-05T19:09:00Z",
"transaction_amount_usd": 2850.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2685.14,
"financial_exposure_usd": 3254.92,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100342",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "high",
"timestamp": "2026-01-01T05:42:00Z",
"trace_id": "601c5a40-3e06-4311-4b2c-4073c1143151"
} | {
"account_age_days": 1168,
"account_id": "ACCT-74260100F76C",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_3",
"session_entropy": 0.906
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 210,
"timestamp": "2025-12-31T23:09:00Z",
"transaction_amount_usd": 5.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.456,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 542931.67,
"financial_exposure_usd": 867063.08,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105373",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-04T17:33:00Z",
"trace_id": "5078ff3d-345d-5b8f-af86-d2927b0360bb"
} | {
"account_age_days": 1817,
"account_id": "ACCT-67D5F3AD33B8",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.37
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 272,
"timestamp": "2026-01-04T17:33:00Z",
"transaction_amount_usd": 2834864.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 687468.71,
"financial_exposure_usd": 890034.72,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108378",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-06T19:38:00Z",
"trace_id": "a5acacb5-68c0-8b3b-3c84-9c3fa463b6a8"
} | {
"account_age_days": 1229,
"account_id": "ACCT-304E6A88815D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 575,
"timestamp": "2026-01-06T19:38:00Z",
"transaction_amount_usd": 8943.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107722",
"label": "benign",
"label_confidence": 0.647,
"severity": "low",
"timestamp": "2026-01-06T08:42:00Z",
"trace_id": "aa2835b1-ec85-c793-9c3f-fead9af86eb4"
} | {
"account_age_days": 1447,
"account_id": "ACCT-69F5262F5042",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.496
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 331,
"timestamp": "2026-01-06T06:17:00Z",
"transaction_amount_usd": 6.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2870.95,
"financial_exposure_usd": 4479.99,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109263",
"label": "benign",
"label_confidence": 0.515,
"severity": "high",
"timestamp": "2026-01-07T10:23:00Z",
"trace_id": "125e4644-c814-5bb8-afbd-a497a8d19cec"
} | {
"account_age_days": 1296,
"account_id": "ACCT-D282AF7148A3",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.191
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 406,
"timestamp": "2026-01-07T10:23:00Z",
"transaction_amount_usd": 1173.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7565.98,
"financial_exposure_usd": 7630.07,
"recoverable_pct": 0.932
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109837",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-07T19:57:00Z",
"trace_id": "821f4818-df19-a2c5-5c4b-b8a9953054e4"
} | {
"account_age_days": 1082,
"account_id": "ACCT-80DAB00178D5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1183,
"timestamp": "2026-01-07T19:57:00Z",
"transaction_amount_usd": 8057.52
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 886.25,
"financial_exposure_usd": 1400.43,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101067",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "low",
"timestamp": "2026-01-01T17:47:00Z",
"trace_id": "3b79a324-d8c5-8aec-ca32-007ee6dffcff"
} | {
"account_age_days": 932,
"account_id": "ACCT-032F695B5218",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_3",
"session_entropy": 0.26
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1041,
"timestamp": "2026-01-01T17:47:00Z",
"transaction_amount_usd": 43240.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 452662.03,
"financial_exposure_usd": 893237.14,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106375",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-05T10:15:00Z",
"trace_id": "5d42a335-00a0-e90a-b59d-b371b8497bfc"
} | {
"account_age_days": 993,
"account_id": "ACCT-E5DF531B73AE",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.377
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1034,
"timestamp": "2026-01-05T10:15:00Z",
"transaction_amount_usd": 2282229.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.564,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2710664.36,
"financial_exposure_usd": 6022277.05,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.