schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108715",
"label": "benign",
"label_confidence": 0.454,
"severity": "low",
"timestamp": "2026-01-07T01:15:00Z",
"trace_id": "abac1ad9-510f-7713-42db-4e4d2ee559eb"
} | {
"account_age_days": 1176,
"account_id": "ACCT-A65607D60D7C",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.896
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 698,
"timestamp": "2026-01-07T01:15:00Z",
"transaction_amount_usd": 7042.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2796.72,
"financial_exposure_usd": 3009.02,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101131",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-01T18:51:00Z",
"trace_id": "c0b041cd-6db0-1f7a-9bc1-ff7bcab0f0e5"
} | {
"account_age_days": 486,
"account_id": "ACCT-19A2CABE8AB6",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 93,
"timestamp": "2026-01-01T18:51:00Z",
"transaction_amount_usd": 37645.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 502000.34,
"financial_exposure_usd": 749240.72,
"recoverable_pct": 0.292
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106674",
"label": "benign",
"label_confidence": 0.71,
"severity": "medium",
"timestamp": "2026-01-05T15:14:00Z",
"trace_id": "db69dff9-5a6a-94d6-94f7-6fe583b0bcd2"
} | {
"account_age_days": 1293,
"account_id": "ACCT-902069732151",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.144
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 397,
"timestamp": "2026-01-05T05:58:00Z",
"transaction_amount_usd": 6.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1637.83,
"financial_exposure_usd": 1990.67,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102792",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T22:32:00Z",
"trace_id": "ba941c6e-5c4a-08db-6789-54b4a3d6407f"
} | {
"account_age_days": 1764,
"account_id": "ACCT-E8D4561AC2C7",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.425
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 591,
"timestamp": "2026-01-02T22:32:00Z",
"transaction_amount_usd": 99366.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 215965.93,
"financial_exposure_usd": 361069.11,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103597",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-03T11:57:00Z",
"trace_id": "d485a9cf-9c9e-4c1e-1fda-f4a60eeef1a6"
} | {
"account_age_days": 1095,
"account_id": "ACCT-C4A43C3B4B80",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.425
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 944,
"timestamp": "2026-01-03T11:57:00Z",
"transaction_amount_usd": 2657623.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2893049.41,
"financial_exposure_usd": 3179029.64,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100249",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-01T04:09:00Z",
"trace_id": "1307afb6-728e-a994-37df-79d830bd373a"
} | {
"account_age_days": 1739,
"account_id": "ACCT-3E372C8D8A13",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 741,
"timestamp": "2026-01-01T04:09:00Z",
"transaction_amount_usd": 37198.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 338659.62,
"financial_exposure_usd": 525008.82,
"recoverable_pct": 0.288
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107169",
"label": "benign",
"label_confidence": 0.471,
"severity": "medium",
"timestamp": "2026-01-05T23:29:00Z",
"trace_id": "a8a03545-efcf-9f6b-0b94-253b6a3b3e93"
} | {
"account_age_days": 1815,
"account_id": "ACCT-562A451640B6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 135,
"timestamp": "2026-01-05T12:53:00Z",
"transaction_amount_usd": 22.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1588.56,
"financial_exposure_usd": 2415.9,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105342",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-04T17:02:00Z",
"trace_id": "72665983-5ef2-0fd4-7f8b-14197b35e7a8"
} | {
"account_age_days": 661,
"account_id": "ACCT-D1F4BAD0B8F1",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_2",
"session_entropy": 0.52
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 486,
"timestamp": "2026-01-04T17:02:00Z",
"transaction_amount_usd": 2868085.27
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.473,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2385036.98,
"financial_exposure_usd": 4593790.47,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106567",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "high",
"timestamp": "2026-01-05T13:27:00Z",
"trace_id": "db7ff817-0946-5928-42fa-b3bbbe37ea27"
} | {
"account_age_days": 1446,
"account_id": "ACCT-ED4B61D296B9",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_3",
"session_entropy": 0.901
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 341,
"timestamp": "2026-01-05T07:28:00Z",
"transaction_amount_usd": 19.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2266817.64,
"financial_exposure_usd": 5137780.41,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100515",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-01T08:35:00Z",
"trace_id": "a7811cde-d6ae-03b4-e672-3a7f75896aab"
} | {
"account_age_days": 456,
"account_id": "ACCT-DB1BDA7465EC",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.137
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 351,
"timestamp": "2026-01-01T08:35:00Z",
"transaction_amount_usd": 92111.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.402,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 666911.52,
"financial_exposure_usd": 679957.82,
"recoverable_pct": 0.289
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108597",
"label": "benign",
"label_confidence": 0.483,
"severity": "medium",
"timestamp": "2026-01-06T23:17:00Z",
"trace_id": "d07c562d-bfe6-ccdb-21de-903720d7d794"
} | {
"account_age_days": 906,
"account_id": "ACCT-6628703C507F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 681,
"timestamp": "2026-01-06T23:17:00Z",
"transaction_amount_usd": 2426.15
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.45,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 4783.98,
"financial_exposure_usd": 6084.14,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104913",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-04T09:53:00Z",
"trace_id": "33a66b28-6063-1427-a1e9-b35cae522a25"
} | {
"account_age_days": 1159,
"account_id": "ACCT-34288A3DC5AA",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_3",
"session_entropy": 0.664
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 271,
"timestamp": "2026-01-04T09:53:00Z",
"transaction_amount_usd": 577938.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1850339,
"financial_exposure_usd": 3703712.35,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100540",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "medium",
"timestamp": "2026-01-01T09:00:00Z",
"trace_id": "c0d0093d-f19a-bca9-2818-62b3df14caf2"
} | {
"account_age_days": 201,
"account_id": "ACCT-56BA41549673",
"baseline_risk_score": 0.523,
"kyc_tier": "tier_2",
"session_entropy": 0.589
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 742,
"timestamp": "2026-01-01T09:00:00Z",
"transaction_amount_usd": 101509.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 658265.64,
"financial_exposure_usd": 1301987.27,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104111",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "low",
"timestamp": "2026-01-03T20:31:00Z",
"trace_id": "54412efb-989a-eb0b-e297-f529a375e3d2"
} | {
"account_age_days": 1777,
"account_id": "ACCT-0EE7C3BDAC7F",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_1",
"session_entropy": 0.628
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 340,
"timestamp": "2026-01-03T20:31:00Z",
"transaction_amount_usd": 952470.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3362150.6,
"financial_exposure_usd": 4252209.39,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100529",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "critical",
"timestamp": "2026-01-01T08:49:00Z",
"trace_id": "809894c9-d7e1-128a-7ca3-25a0b3ba5df7"
} | {
"account_age_days": 484,
"account_id": "ACCT-D49D3C77AC5F",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_3",
"session_entropy": 0.122
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 433,
"timestamp": "2026-01-01T08:49:00Z",
"transaction_amount_usd": 114955.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.656,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 346030.47,
"financial_exposure_usd": 633671.26,
"recoverable_pct": 0.355
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100322",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-01T05:22:00Z",
"trace_id": "a8f0d513-6650-bc24-f84b-241f0466b04d"
} | {
"account_age_days": 1434,
"account_id": "ACCT-33DFEFF60EF6",
"baseline_risk_score": 0.507,
"kyc_tier": "tier_1",
"session_entropy": 0.239
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 393,
"timestamp": "2025-12-31T17:06:00Z",
"transaction_amount_usd": 19.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 238689.23,
"financial_exposure_usd": 532658.69,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101192",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-01T19:52:00Z",
"trace_id": "3c1db4bc-c009-62b6-1f7d-a28ae35a41fd"
} | {
"account_age_days": 658,
"account_id": "ACCT-073C1185BC51",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.385
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 652,
"timestamp": "2026-01-01T19:52:00Z",
"transaction_amount_usd": 82371.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.492,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 615635.99,
"financial_exposure_usd": 1361835.97,
"recoverable_pct": 0.155
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101118",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-01T18:38:00Z",
"trace_id": "80ec4df6-c8db-b191-d24b-ccb38ea6a65a"
} | {
"account_age_days": 1627,
"account_id": "ACCT-AE520D8BAFB1",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 786,
"timestamp": "2026-01-01T18:38:00Z",
"transaction_amount_usd": 57169.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.601,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 625769.38,
"financial_exposure_usd": 862106.54,
"recoverable_pct": 0.307
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109823",
"label": "benign",
"label_confidence": 0.634,
"severity": "high",
"timestamp": "2026-01-07T19:43:00Z",
"trace_id": "f0c55b3d-7c6e-ebdf-b4a4-6bd0417f6e33"
} | {
"account_age_days": 567,
"account_id": "ACCT-D19B02AD4DFC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.351
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 460,
"timestamp": "2026-01-07T19:43:00Z",
"transaction_amount_usd": 9531.43
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 889.21,
"financial_exposure_usd": 1317.9,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101615",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-02T02:55:00Z",
"trace_id": "6d701cb4-2845-4a4d-b1e0-ee1d63922685"
} | {
"account_age_days": 1345,
"account_id": "ACCT-D173CF765538",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.586
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 98,
"timestamp": "2026-01-02T02:55:00Z",
"transaction_amount_usd": 3138.86
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.437,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1138805.79,
"financial_exposure_usd": 1185205.71,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101924",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "low",
"timestamp": "2026-01-02T08:04:00Z",
"trace_id": "6b2f1590-24a3-9101-8a5f-2ee8a8653e07"
} | {
"account_age_days": 1553,
"account_id": "ACCT-5DCF11141DEB",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_1",
"session_entropy": 0.276
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 338,
"timestamp": "2026-01-02T08:04:00Z",
"transaction_amount_usd": 93114.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.517,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 374906.47,
"financial_exposure_usd": 565454.31,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102707",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-02T21:07:00Z",
"trace_id": "3c60929f-7245-ec6f-10af-47df70de3983"
} | {
"account_age_days": 1724,
"account_id": "ACCT-8120B5871142",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_2",
"session_entropy": 0.494
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 817,
"timestamp": "2026-01-02T21:07:00Z",
"transaction_amount_usd": 117458.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 714735.87,
"financial_exposure_usd": 941052.95,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107081",
"label": "benign",
"label_confidence": 0.712,
"severity": "high",
"timestamp": "2026-01-05T22:01:00Z",
"trace_id": "ac13f4c7-3fef-7a7f-c9e0-1d3cae3198d3"
} | {
"account_age_days": 34,
"account_id": "ACCT-0FF76F58E508",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.631
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 163,
"timestamp": "2026-01-05T10:00:00Z",
"transaction_amount_usd": 4.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1359.03,
"financial_exposure_usd": 3242.95,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109866",
"label": "benign",
"label_confidence": 0.523,
"severity": "high",
"timestamp": "2026-01-07T20:26:00Z",
"trace_id": "a704acd4-9b8c-2684-4db7-62b962a2ca36"
} | {
"account_age_days": 1208,
"account_id": "ACCT-275C8712DF75",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1043,
"timestamp": "2026-01-07T20:26:00Z",
"transaction_amount_usd": 2538.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 428.75,
"financial_exposure_usd": 462.98,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105154",
"label": "fraudulent",
"label_confidence": 0.62,
"severity": "medium",
"timestamp": "2026-01-04T13:54:00Z",
"trace_id": "bc4b513e-3ea1-362c-8431-194317084995"
} | {
"account_age_days": 1497,
"account_id": "ACCT-90060B80EA1F",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 464,
"timestamp": "2026-01-04T13:54:00Z",
"transaction_amount_usd": 558696.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1798171.05,
"financial_exposure_usd": 3058868.94,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106102",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "critical",
"timestamp": "2026-01-05T05:42:00Z",
"trace_id": "255a2cd3-3359-c001-3516-690d81f345e1"
} | {
"account_age_days": 1478,
"account_id": "ACCT-0CB757B7F3A7",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_1",
"session_entropy": 0.15
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1111,
"timestamp": "2026-01-05T05:42:00Z",
"transaction_amount_usd": 137388.62
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3796514.62,
"financial_exposure_usd": 5911330.89,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109719",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-07T17:59:00Z",
"trace_id": "cf9dd40f-de7e-52c8-e878-a20d74c56622"
} | {
"account_age_days": 1042,
"account_id": "ACCT-183F5AB739C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.51
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 856,
"timestamp": "2026-01-07T17:59:00Z",
"transaction_amount_usd": 2913.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2212.93,
"financial_exposure_usd": 4109.17,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105605",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-04T21:25:00Z",
"trace_id": "47083d39-102c-56a1-919b-93014c919d13"
} | {
"account_age_days": 271,
"account_id": "ACCT-5478BC3D1275",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.604
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 254,
"timestamp": "2026-01-04T12:15:00Z",
"transaction_amount_usd": 2.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.467,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2602720.05,
"financial_exposure_usd": 6377557.63,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103875",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "low",
"timestamp": "2026-01-03T16:35:00Z",
"trace_id": "a6e5449b-fcb3-5ce0-fa2f-3f71a4df2058"
} | {
"account_age_days": 712,
"account_id": "ACCT-7635849D7465",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_2",
"session_entropy": 0.403
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 779,
"timestamp": "2026-01-03T16:35:00Z",
"transaction_amount_usd": 2031636.93
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.843,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3567447.76,
"financial_exposure_usd": 5330900.99,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106720",
"label": "benign",
"label_confidence": 0.652,
"severity": "high",
"timestamp": "2026-01-05T16:00:00Z",
"trace_id": "031ee2af-9d71-0a70-e5c6-b455d40f5e7c"
} | {
"account_age_days": 1484,
"account_id": "ACCT-8478D53D4DEF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.182
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 127,
"timestamp": "2026-01-05T12:44:00Z",
"transaction_amount_usd": 10.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.46,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3665.24,
"financial_exposure_usd": 3727.51,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105167",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "critical",
"timestamp": "2026-01-04T14:07:00Z",
"trace_id": "f5e7c171-36e1-eda3-2c57-207d067c4693"
} | {
"account_age_days": 679,
"account_id": "ACCT-13A8964708C0",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.832
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 589,
"timestamp": "2026-01-04T14:07:00Z",
"transaction_amount_usd": 517387.42
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.535,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1762944.46,
"financial_exposure_usd": 2058423.89,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100371",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-01T06:11:00Z",
"trace_id": "fe752dea-12eb-fd94-09a6-86a9376d353d"
} | {
"account_age_days": 1812,
"account_id": "ACCT-1950555F7B05",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_1",
"session_entropy": 0.827
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 250,
"timestamp": "2026-01-01T06:11:00Z",
"transaction_amount_usd": 11391.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.42,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 909562.75,
"financial_exposure_usd": 1045937.84,
"recoverable_pct": 0.083
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107108",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-05T22:28:00Z",
"trace_id": "a83c716d-14f4-8a2a-d574-233626ef0aeb"
} | {
"account_age_days": 1210,
"account_id": "ACCT-0BAAE2559AD4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.477
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 835,
"timestamp": "2026-01-05T22:28:00Z",
"transaction_amount_usd": 13334.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 616.03,
"financial_exposure_usd": 977.28,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100794",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "medium",
"timestamp": "2026-01-01T13:14:00Z",
"trace_id": "92abccc7-79ee-9683-cdee-e1e2d379fa2d"
} | {
"account_age_days": 1631,
"account_id": "ACCT-88B4F4C67DA3",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_1",
"session_entropy": 0.883
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 391,
"timestamp": "2026-01-01T13:14:00Z",
"transaction_amount_usd": 111246.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1036197.54,
"financial_exposure_usd": 1177333.84,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107105",
"label": "benign",
"label_confidence": 0.469,
"severity": "low",
"timestamp": "2026-01-05T22:25:00Z",
"trace_id": "1731dd4a-35e9-4c7f-4b42-f99837a422fc"
} | {
"account_age_days": 1657,
"account_id": "ACCT-855C21B38D82",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.325
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1123,
"timestamp": "2026-01-05T22:25:00Z",
"transaction_amount_usd": 6899.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 3985.56,
"financial_exposure_usd": 4547.93,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100048",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-01T00:48:00Z",
"trace_id": "2167c35e-ce73-34f2-3393-2b6c9d37efb6"
} | {
"account_age_days": 657,
"account_id": "ACCT-3CED4D1F13EB",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 382,
"timestamp": "2026-01-01T00:48:00Z",
"transaction_amount_usd": 110294.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.843,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 821266.6,
"financial_exposure_usd": 1229481.59,
"recoverable_pct": 0.225
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105988",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "medium",
"timestamp": "2026-01-05T03:48:00Z",
"trace_id": "5aff5b51-e9d5-4b0b-6677-5624ee3cf2bb"
} | {
"account_age_days": 1828,
"account_id": "ACCT-19E5E84DB525",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_1",
"session_entropy": 0.243
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 761,
"timestamp": "2026-01-05T03:48:00Z",
"transaction_amount_usd": 142421.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.667,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 57300.74,
"financial_exposure_usd": 117569.47,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100348",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-01T05:48:00Z",
"trace_id": "e538ef54-a3fc-8e0d-eb25-09272338e0b5"
} | {
"account_age_days": 1652,
"account_id": "ACCT-FD0A2EB01E46",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.24
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 373,
"timestamp": "2026-01-01T01:35:00Z",
"transaction_amount_usd": 1.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 327268.97,
"financial_exposure_usd": 528789.76,
"recoverable_pct": 0.02
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106155",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "high",
"timestamp": "2026-01-05T06:35:00Z",
"trace_id": "106a0a9c-717e-8e15-58e2-2b57474139c9"
} | {
"account_age_days": 1421,
"account_id": "ACCT-07AF7B17ADA1",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.124
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 373,
"timestamp": "2026-01-05T06:35:00Z",
"transaction_amount_usd": 2026127.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.493,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3753901.42,
"financial_exposure_usd": 4228262.95,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103082",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "critical",
"timestamp": "2026-01-03T03:22:00Z",
"trace_id": "79a192be-aaa5-6e7f-cd1f-e9c1904b1cdf"
} | {
"account_age_days": 1180,
"account_id": "ACCT-21B673374A61",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_3",
"session_entropy": 0.514
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 424,
"timestamp": "2026-01-03T03:22:00Z",
"transaction_amount_usd": 51915.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 255176.47,
"financial_exposure_usd": 588696.94,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100443",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-01T07:23:00Z",
"trace_id": "90471f74-aa72-6452-0956-9f9bb84cc165"
} | {
"account_age_days": 590,
"account_id": "ACCT-3975DDC52130",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_1",
"session_entropy": 0.862
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1018,
"timestamp": "2026-01-01T07:23:00Z",
"transaction_amount_usd": 101230.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.579,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 656428.01,
"financial_exposure_usd": 978334.58,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103272",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "low",
"timestamp": "2026-01-03T06:32:00Z",
"trace_id": "f0c9abbe-710c-8768-3d51-802f68074c01"
} | {
"account_age_days": 309,
"account_id": "ACCT-7D5B9C69A83D",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.44
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 377,
"timestamp": "2026-01-02T20:09:00Z",
"transaction_amount_usd": 5.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.371,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 772751.87,
"financial_exposure_usd": 1545388.32,
"recoverable_pct": 0.303
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109402",
"label": "benign",
"label_confidence": 0.521,
"severity": "medium",
"timestamp": "2026-01-07T12:42:00Z",
"trace_id": "80770d34-ff1d-a984-3c47-4f316fc08a99"
} | {
"account_age_days": 911,
"account_id": "ACCT-F244ECD41F6C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.284
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 229,
"timestamp": "2026-01-07T11:06:00Z",
"transaction_amount_usd": 1.84
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1325.26,
"financial_exposure_usd": 1527.47,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100178",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "high",
"timestamp": "2026-01-01T02:58:00Z",
"trace_id": "d67df90d-d795-70be-bf30-25c3a2a30071"
} | {
"account_age_days": 1104,
"account_id": "ACCT-95D12C70D5B0",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_3",
"session_entropy": 0.428
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 256,
"timestamp": "2026-01-01T02:58:00Z",
"transaction_amount_usd": 67486.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.946,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 299464.37,
"financial_exposure_usd": 492416.24,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102757",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "critical",
"timestamp": "2026-01-02T21:57:00Z",
"trace_id": "7c7b1f54-a522-ba1f-d8b3-514a7640867b"
} | {
"account_age_days": 1616,
"account_id": "ACCT-DAD22E5B95A0",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.825
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 942,
"timestamp": "2026-01-02T21:57:00Z",
"transaction_amount_usd": 61238.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.749,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 790918.17,
"financial_exposure_usd": 1007305.92,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103505",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-03T10:25:00Z",
"trace_id": "73d77fb9-fc7b-ab87-7a35-6e36444e04c1"
} | {
"account_age_days": 1476,
"account_id": "ACCT-84E76CDE2AE1",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_3",
"session_entropy": 0.673
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 800,
"timestamp": "2026-01-03T10:25:00Z",
"transaction_amount_usd": 1770347.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2160603.12,
"financial_exposure_usd": 2557926.36,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106153",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-05T06:33:00Z",
"trace_id": "9e93da00-05e6-14d2-69da-965e10df3cb3"
} | {
"account_age_days": 899,
"account_id": "ACCT-D8E5244947E5",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_1",
"session_entropy": 0.567
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 659,
"timestamp": "2026-01-05T06:33:00Z",
"transaction_amount_usd": 1348033.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.838,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1717426.24,
"financial_exposure_usd": 2411988.27,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106862",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-05T18:22:00Z",
"trace_id": "e6bbbaf6-7a3e-6c4b-93d6-4c4c50f312f8"
} | {
"account_age_days": 778,
"account_id": "ACCT-5CF5C341B748",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.212
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 840,
"timestamp": "2026-01-05T18:22:00Z",
"transaction_amount_usd": 1195.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.561,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1403.57,
"financial_exposure_usd": 3479.27,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108463",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-06T21:03:00Z",
"trace_id": "f9537673-a456-0c81-aa7e-1ca4559272ff"
} | {
"account_age_days": 305,
"account_id": "ACCT-8F9870222B1F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.273
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 733,
"timestamp": "2026-01-06T21:03:00Z",
"transaction_amount_usd": 12424.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1884.49,
"financial_exposure_usd": 3398.06,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100546",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-01T09:06:00Z",
"trace_id": "911152f4-fff4-8179-309e-7f64b2409091"
} | {
"account_age_days": 795,
"account_id": "ACCT-53B7A1D5240F",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_1",
"session_entropy": 0.903
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 214,
"timestamp": "2026-01-01T03:57:00Z",
"transaction_amount_usd": 2.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 866507.19,
"financial_exposure_usd": 1001802.54,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100624",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-01T10:24:00Z",
"trace_id": "b3bf145d-4478-9102-3cf5-4bcd3d8dccb5"
} | {
"account_age_days": 1243,
"account_id": "ACCT-BDB2DC52349A",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.847
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 964,
"timestamp": "2026-01-01T10:24:00Z",
"transaction_amount_usd": 78699.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.523,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1065613.48,
"financial_exposure_usd": 1105471.45,
"recoverable_pct": 0.081
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109372",
"label": "benign",
"label_confidence": 0.536,
"severity": "medium",
"timestamp": "2026-01-07T12:12:00Z",
"trace_id": "641aeee2-840d-0d1d-0862-42b5f7ae7f26"
} | {
"account_age_days": 1317,
"account_id": "ACCT-3C63548BFC48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.897
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 101,
"timestamp": "2026-01-07T09:07:00Z",
"transaction_amount_usd": 24.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1423.75,
"financial_exposure_usd": 2547.14,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108593",
"label": "benign",
"label_confidence": 0.555,
"severity": "low",
"timestamp": "2026-01-06T23:13:00Z",
"trace_id": "726354b6-e9d9-667a-1811-c735865d1814"
} | {
"account_age_days": 1805,
"account_id": "ACCT-58B27F72542C",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.166
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 942,
"timestamp": "2026-01-06T23:13:00Z",
"transaction_amount_usd": 2339.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1512.54,
"financial_exposure_usd": 3669.99,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102165",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "critical",
"timestamp": "2026-01-02T12:05:00Z",
"trace_id": "3e4bbc48-61c4-e193-a342-ce849701504f"
} | {
"account_age_days": 489,
"account_id": "ACCT-830813DED8C0",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_1",
"session_entropy": 0.193
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 154,
"timestamp": "2026-01-02T06:52:00Z",
"transaction_amount_usd": 18.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.947,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 453547.37,
"financial_exposure_usd": 1109597.01,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101415",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-01T23:35:00Z",
"trace_id": "0dcc191d-3c82-a108-d851-b7d43bfb72fe"
} | {
"account_age_days": 207,
"account_id": "ACCT-5D44162085BD",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_1",
"session_entropy": 0.51
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 553,
"timestamp": "2026-01-01T23:35:00Z",
"transaction_amount_usd": 48846.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 545409.4,
"financial_exposure_usd": 681653.74,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108879",
"label": "benign",
"label_confidence": 0.55,
"severity": "medium",
"timestamp": "2026-01-07T03:59:00Z",
"trace_id": "8bea81bd-32dd-f343-75ed-c4b7232f38ab"
} | {
"account_age_days": 552,
"account_id": "ACCT-987B410AF7BC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 553,
"timestamp": "2026-01-07T03:59:00Z",
"transaction_amount_usd": 4729.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3254.77,
"financial_exposure_usd": 3982.51,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103968",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-03T18:08:00Z",
"trace_id": "67ce6027-0c1d-fa0b-0b62-42db61d25de2"
} | {
"account_age_days": 520,
"account_id": "ACCT-AE037069B8D2",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.912
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 768,
"timestamp": "2026-01-03T18:08:00Z",
"transaction_amount_usd": 485241.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1846036.28,
"financial_exposure_usd": 3681294.92,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105272",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "low",
"timestamp": "2026-01-04T15:52:00Z",
"trace_id": "6ebb7c13-318f-39aa-0d8c-48504a165690"
} | {
"account_age_days": 1350,
"account_id": "ACCT-E9BA9778ADFF",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.708
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 681,
"timestamp": "2026-01-04T15:52:00Z",
"transaction_amount_usd": 1012797.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.384,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 739397.71,
"financial_exposure_usd": 1224564.07,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104906",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-04T09:46:00Z",
"trace_id": "4f2cc9e6-bd98-eb9c-68d6-7924f9513164"
} | {
"account_age_days": 1883,
"account_id": "ACCT-1DACEBF20D82",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.632
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 743,
"timestamp": "2026-01-04T09:46:00Z",
"transaction_amount_usd": 755557.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2576880.61,
"financial_exposure_usd": 3540304.08,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104946",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "medium",
"timestamp": "2026-01-04T10:26:00Z",
"trace_id": "e0b5d4a4-cea9-322c-328c-1fc94c397022"
} | {
"account_age_days": 764,
"account_id": "ACCT-056574F6091F",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 747,
"timestamp": "2026-01-04T10:26:00Z",
"transaction_amount_usd": 1506809.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.754,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5267581.49,
"financial_exposure_usd": 8033570.23,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104403",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "critical",
"timestamp": "2026-01-04T01:23:00Z",
"trace_id": "541c7968-6143-4e4b-205c-9e70705977e9"
} | {
"account_age_days": 1155,
"account_id": "ACCT-924FB756BEF2",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.601
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 409,
"timestamp": "2026-01-04T01:23:00Z",
"transaction_amount_usd": 1583582.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2443268.93,
"financial_exposure_usd": 3464960.38,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101848",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-02T06:48:00Z",
"trace_id": "5ac6761a-efad-d765-3b73-09b2879ccb01"
} | {
"account_age_days": 1910,
"account_id": "ACCT-4D6B869A93C9",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_3",
"session_entropy": 0.34
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 326,
"timestamp": "2026-01-01T19:48:00Z",
"transaction_amount_usd": 15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.936,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 575122.38,
"financial_exposure_usd": 873542.45,
"recoverable_pct": 0.073
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107739",
"label": "benign",
"label_confidence": 0.618,
"severity": "critical",
"timestamp": "2026-01-06T08:59:00Z",
"trace_id": "35389412-8f3f-477a-c5ed-49db03500b85"
} | {
"account_age_days": 1446,
"account_id": "ACCT-2FA6ECED83A6",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_1",
"session_entropy": 0.338
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 917,
"timestamp": "2026-01-06T08:59:00Z",
"transaction_amount_usd": 10597.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2254.28,
"financial_exposure_usd": 3227.2,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101283",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "medium",
"timestamp": "2026-01-01T21:23:00Z",
"trace_id": "8ae89090-1fcd-4686-ee8b-e4ab1c0c7311"
} | {
"account_age_days": 399,
"account_id": "ACCT-904E0A0D8489",
"baseline_risk_score": 0.522,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 488,
"timestamp": "2026-01-01T21:23:00Z",
"transaction_amount_usd": 54604.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.916,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 395796.86,
"financial_exposure_usd": 466461.56,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109234",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-07T09:54:00Z",
"trace_id": "d402fd64-a890-b5a6-d666-16d6de2de5b8"
} | {
"account_age_days": 676,
"account_id": "ACCT-514B749AB508",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.365
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 562,
"timestamp": "2026-01-07T09:54:00Z",
"transaction_amount_usd": 2251.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 660.83,
"financial_exposure_usd": 1110.49,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101519",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "critical",
"timestamp": "2026-01-02T01:19:00Z",
"trace_id": "7d521537-e092-d8d0-c72d-f911a9b4e4b1"
} | {
"account_age_days": 1166,
"account_id": "ACCT-CEBD4A99D861",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_1",
"session_entropy": 0.264
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1119,
"timestamp": "2026-01-02T01:19:00Z",
"transaction_amount_usd": 33741.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 240982.84,
"financial_exposure_usd": 334589.04,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106845",
"label": "benign",
"label_confidence": 0.512,
"severity": "medium",
"timestamp": "2026-01-05T18:05:00Z",
"trace_id": "3eebf01c-5f30-3a6a-a786-13d1ced6c697"
} | {
"account_age_days": 1728,
"account_id": "ACCT-EDB27E7573D0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.407
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 281,
"timestamp": "2026-01-05T11:01:00Z",
"transaction_amount_usd": 23.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.58,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2352.18,
"financial_exposure_usd": 3504.26,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109829",
"label": "benign",
"label_confidence": 0.507,
"severity": "medium",
"timestamp": "2026-01-07T19:49:00Z",
"trace_id": "9e4166d1-62e7-12ce-b62e-a7fea6253b1e"
} | {
"account_age_days": 1606,
"account_id": "ACCT-57551BC58704",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.482
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 129,
"timestamp": "2026-01-07T19:49:00Z",
"transaction_amount_usd": 6205.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 779.61,
"financial_exposure_usd": 801.41,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102178",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-02T12:18:00Z",
"trace_id": "3ac7916e-dd1b-7874-45a1-c080150c4f26"
} | {
"account_age_days": 1960,
"account_id": "ACCT-CD7AB574C05F",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_1",
"session_entropy": 0.508
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 327,
"timestamp": "2026-01-02T12:18:00Z",
"transaction_amount_usd": 58903.69
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.547,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 164228.38,
"financial_exposure_usd": 317237.62,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105286",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "high",
"timestamp": "2026-01-04T16:06:00Z",
"trace_id": "4c909005-f9e0-028e-4c93-3414aba90811"
} | {
"account_age_days": 838,
"account_id": "ACCT-C6EB753AAAFB",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 330,
"timestamp": "2026-01-04T09:28:00Z",
"transaction_amount_usd": 14.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.369,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3454800.21,
"financial_exposure_usd": 3862070.91,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102211",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-02T12:51:00Z",
"trace_id": "eb58fe03-60b0-5c58-3d31-23869ee526ba"
} | {
"account_age_days": 1320,
"account_id": "ACCT-4868FD75309E",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_2",
"session_entropy": 0.37
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 167,
"timestamp": "2026-01-02T04:27:00Z",
"transaction_amount_usd": 16.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 337354.73,
"financial_exposure_usd": 811164.99,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103199",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "medium",
"timestamp": "2026-01-03T05:19:00Z",
"trace_id": "fd6fbcf7-3cbb-7496-4dae-2842addf12e9"
} | {
"account_age_days": 282,
"account_id": "ACCT-889CB6FFDD9F",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_3",
"session_entropy": 0.541
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 267,
"timestamp": "2026-01-03T05:19:00Z",
"transaction_amount_usd": 34220.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.664,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 639714.03,
"financial_exposure_usd": 996984.01,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107351",
"label": "benign",
"label_confidence": 0.515,
"severity": "medium",
"timestamp": "2026-01-06T02:31:00Z",
"trace_id": "ccbce21c-c203-cec2-5203-bcfb0900f5df"
} | {
"account_age_days": 375,
"account_id": "ACCT-FB8FECF8C251",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_1",
"session_entropy": 0.208
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 276,
"timestamp": "2026-01-06T02:31:00Z",
"transaction_amount_usd": 4928.52
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.536,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2692.86,
"financial_exposure_usd": 3215.72,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108626",
"label": "benign",
"label_confidence": 0.519,
"severity": "low",
"timestamp": "2026-01-06T23:46:00Z",
"trace_id": "c327a117-b993-20ce-6e94-5f7175399544"
} | {
"account_age_days": 1227,
"account_id": "ACCT-3550499EA6C1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.828
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 312,
"timestamp": "2026-01-06T23:46:00Z",
"transaction_amount_usd": 11165.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 134.86,
"financial_exposure_usd": 248.42,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105586",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "medium",
"timestamp": "2026-01-04T21:06:00Z",
"trace_id": "71dac812-29b0-113b-da83-6ce292d0c5df"
} | {
"account_age_days": 540,
"account_id": "ACCT-4C09968385C2",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.116
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 379,
"timestamp": "2026-01-04T21:06:00Z",
"transaction_amount_usd": 1335340.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1020287.44,
"financial_exposure_usd": 1707073.91,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108174",
"label": "benign",
"label_confidence": 0.638,
"severity": "medium",
"timestamp": "2026-01-06T16:14:00Z",
"trace_id": "3c1a6d07-4449-6bde-6ce9-2ca15887972d"
} | {
"account_age_days": 25,
"account_id": "ACCT-00CCD9BC54DF",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 398,
"timestamp": "2026-01-06T16:14:00Z",
"transaction_amount_usd": 8290.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.491,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2854.38,
"financial_exposure_usd": 3464.28,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107450",
"label": "benign",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-06T04:10:00Z",
"trace_id": "abfee5a7-f73e-0b1b-df2b-086e6ecb6ce4"
} | {
"account_age_days": 1558,
"account_id": "ACCT-F5401D9572F9",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.904
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1119,
"timestamp": "2026-01-06T04:10:00Z",
"transaction_amount_usd": 2435.77
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4128.72,
"financial_exposure_usd": 4749.07,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109357",
"label": "benign",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-07T11:57:00Z",
"trace_id": "474e912e-0a98-df93-b9e5-510da7a45c36"
} | {
"account_age_days": 1920,
"account_id": "ACCT-C465BDDA5831",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_2",
"session_entropy": 0.743
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 811,
"timestamp": "2026-01-07T11:57:00Z",
"transaction_amount_usd": 2167.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1801.01,
"financial_exposure_usd": 4185.11,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100734",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-01T12:14:00Z",
"trace_id": "5f74e071-b8bf-24cf-231e-a008613721c3"
} | {
"account_age_days": 1939,
"account_id": "ACCT-692F45DE9092",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 87,
"timestamp": "2026-01-01T07:20:00Z",
"transaction_amount_usd": 1.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 325718.24,
"financial_exposure_usd": 423245.04,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109753",
"label": "benign",
"label_confidence": 0.577,
"severity": "low",
"timestamp": "2026-01-07T18:33:00Z",
"trace_id": "c56a89c6-5345-9422-2a2a-e4d7afad2037"
} | {
"account_age_days": 126,
"account_id": "ACCT-6E4FF6267912",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 202,
"timestamp": "2026-01-07T16:51:00Z",
"transaction_amount_usd": 13.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 555.62,
"financial_exposure_usd": 787.81,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103257",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "high",
"timestamp": "2026-01-03T06:17:00Z",
"trace_id": "195d2e5f-5135-46b3-c397-deadf7bf7c01"
} | {
"account_age_days": 809,
"account_id": "ACCT-1D685C2B2FF5",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_1",
"session_entropy": 0.692
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 515,
"timestamp": "2026-01-03T06:17:00Z",
"transaction_amount_usd": 87763.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 228536.01,
"financial_exposure_usd": 468135.02,
"recoverable_pct": 0.215
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100789",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "critical",
"timestamp": "2026-01-01T13:09:00Z",
"trace_id": "a9a47ca4-6888-07e1-277d-a450b8387d96"
} | {
"account_age_days": 1937,
"account_id": "ACCT-057CFB054D17",
"baseline_risk_score": 0.552,
"kyc_tier": "tier_2",
"session_entropy": 0.44
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1015,
"timestamp": "2026-01-01T13:09:00Z",
"transaction_amount_usd": 64385.42
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 538044.51,
"financial_exposure_usd": 838371.41,
"recoverable_pct": 0.173
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100891",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-01T14:51:00Z",
"trace_id": "5a3b081d-a150-1014-e477-d800dec46536"
} | {
"account_age_days": 828,
"account_id": "ACCT-74C356920576",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_1",
"session_entropy": 0.342
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 927,
"timestamp": "2026-01-01T14:51:00Z",
"transaction_amount_usd": 15124.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 429695.95,
"financial_exposure_usd": 712942,
"recoverable_pct": 0.278
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102586",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-02T19:06:00Z",
"trace_id": "1afbc034-b179-b1e0-5927-7d2d0db12560"
} | {
"account_age_days": 1445,
"account_id": "ACCT-CBEE30AB0607",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_1",
"session_entropy": 0.8
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1173,
"timestamp": "2026-01-02T19:06:00Z",
"transaction_amount_usd": 29450.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 506013.43,
"financial_exposure_usd": 707911.77,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101779",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-02T05:39:00Z",
"trace_id": "11149370-d51b-0618-75e6-990ffcd44adc"
} | {
"account_age_days": 1262,
"account_id": "ACCT-A525FC6B2E8C",
"baseline_risk_score": 0.538,
"kyc_tier": "tier_1",
"session_entropy": 0.348
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 825,
"timestamp": "2026-01-02T05:39:00Z",
"transaction_amount_usd": 11451.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 175888.31,
"financial_exposure_usd": 438006.53,
"recoverable_pct": 0.186
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109413",
"label": "benign",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-07T12:53:00Z",
"trace_id": "8942c653-2d00-2b91-a32d-b4392b26824f"
} | {
"account_age_days": 1888,
"account_id": "ACCT-371AD98C7F54",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.643
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 234,
"timestamp": "2026-01-07T04:17:00Z",
"transaction_amount_usd": 20.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 673.55,
"financial_exposure_usd": 1204.81,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102663",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "critical",
"timestamp": "2026-01-02T20:23:00Z",
"trace_id": "1411ace4-0eb3-32cf-32be-cfc0f8485e5e"
} | {
"account_age_days": 1452,
"account_id": "ACCT-A99DA45CEC75",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.696
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 1125,
"timestamp": "2026-01-02T20:23:00Z",
"transaction_amount_usd": 49221.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 355659.93,
"financial_exposure_usd": 366289.8,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104623",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-04T05:03:00Z",
"trace_id": "63577250-a6ec-03e0-31b4-34b2ab43f172"
} | {
"account_age_days": 1184,
"account_id": "ACCT-10F9B9B5C727",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_2",
"session_entropy": 0.71
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 195,
"timestamp": "2026-01-04T05:03:00Z",
"transaction_amount_usd": 1836599.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.423,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2472667.49,
"financial_exposure_usd": 6018991.99,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103541",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-03T11:01:00Z",
"trace_id": "701a9880-221c-9f47-00e5-e95128f45b09"
} | {
"account_age_days": 494,
"account_id": "ACCT-0D8BF465DE26",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.637
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1038,
"timestamp": "2026-01-03T11:01:00Z",
"transaction_amount_usd": 1887577.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2159496.21,
"financial_exposure_usd": 4084776.41,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101500",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-02T01:00:00Z",
"trace_id": "6e182709-0e37-9f2f-80f1-c003d2db425d"
} | {
"account_age_days": 1610,
"account_id": "ACCT-27E87DD93F54",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 212,
"timestamp": "2026-01-02T01:00:00Z",
"transaction_amount_usd": 25920.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.622,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 368281.19,
"financial_exposure_usd": 605581.58,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103186",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-03T05:06:00Z",
"trace_id": "26a04f11-2787-f08f-08db-d35db9737bb2"
} | {
"account_age_days": 123,
"account_id": "ACCT-C0628F7277BF",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.659
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 333,
"timestamp": "2026-01-02T19:58:00Z",
"transaction_amount_usd": 7.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 330172.39,
"financial_exposure_usd": 798209.99,
"recoverable_pct": 0.146
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105897",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-05T02:17:00Z",
"trace_id": "d7e2ba75-7a40-9836-3239-8af60871e4bf"
} | {
"account_age_days": 668,
"account_id": "ACCT-48B2270FD01D",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1086,
"timestamp": "2026-01-05T02:17:00Z",
"transaction_amount_usd": 1286325.73
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4789864.26,
"financial_exposure_usd": 8690662.66,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102725",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "high",
"timestamp": "2026-01-02T21:25:00Z",
"trace_id": "421c1e9b-d11d-ba11-31f4-35fdc8be3e54"
} | {
"account_age_days": 1349,
"account_id": "ACCT-773D6DBAC9DB",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_2",
"session_entropy": 0.49
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 197,
"timestamp": "2026-01-02T14:04:00Z",
"transaction_amount_usd": 20.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 587638.08,
"financial_exposure_usd": 992078.47,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104288",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-03T23:28:00Z",
"trace_id": "f98cda40-1ddc-bd74-eb35-4d4e550671eb"
} | {
"account_age_days": 583,
"account_id": "ACCT-71CDEBF9C2D1",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1153,
"timestamp": "2026-01-03T23:28:00Z",
"transaction_amount_usd": 2380570.17
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.907,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3400499.05,
"financial_exposure_usd": 5366903.35,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104767",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "low",
"timestamp": "2026-01-04T07:27:00Z",
"trace_id": "78b9dc04-1de5-402a-6b8e-480fd06fc8b3"
} | {
"account_age_days": 1771,
"account_id": "ACCT-069A91092602",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_1",
"session_entropy": 0.855
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 775,
"timestamp": "2026-01-04T07:27:00Z",
"transaction_amount_usd": 2001402.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1026914.7,
"financial_exposure_usd": 1473830.57,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102312",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-02T14:32:00Z",
"trace_id": "57d38e08-2ed1-173e-bbdc-1a7b1be1bbcf"
} | {
"account_age_days": 1621,
"account_id": "ACCT-F226D85E64B8",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.723
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 319,
"timestamp": "2026-01-02T14:32:00Z",
"transaction_amount_usd": 44875.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.926,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 567250.58,
"financial_exposure_usd": 795361.35,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102231",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-02T13:11:00Z",
"trace_id": "d3730c21-3a4b-c20e-0080-b1ed8d783681"
} | {
"account_age_days": 1838,
"account_id": "ACCT-73FF09EDE0EE",
"baseline_risk_score": 0.587,
"kyc_tier": "tier_1",
"session_entropy": 0.494
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 734,
"timestamp": "2026-01-02T13:11:00Z",
"transaction_amount_usd": 13509.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.563,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 252067.25,
"financial_exposure_usd": 517128.03,
"recoverable_pct": 0.335
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101153",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "high",
"timestamp": "2026-01-01T19:13:00Z",
"trace_id": "a79ef86c-9466-79eb-dadb-fba39e509c33"
} | {
"account_age_days": 115,
"account_id": "ACCT-C133C9411EA8",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_3",
"session_entropy": 0.566
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 209,
"timestamp": "2026-01-01T08:16:00Z",
"transaction_amount_usd": 12.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.875,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 853770.77,
"financial_exposure_usd": 989984.77,
"recoverable_pct": 0.386
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103132",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-03T04:12:00Z",
"trace_id": "ad49e035-2312-5b96-7a58-fdcab21ed7b3"
} | {
"account_age_days": 1176,
"account_id": "ACCT-B5C6CBC0BEF8",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 81,
"timestamp": "2026-01-02T15:28:00Z",
"transaction_amount_usd": 16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.355,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 795177.11,
"financial_exposure_usd": 1023745.26,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106024",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "low",
"timestamp": "2026-01-05T04:24:00Z",
"trace_id": "a529f6b9-8052-1c76-6e8d-5a65b9b2a782"
} | {
"account_age_days": 1213,
"account_id": "ACCT-A081077A5F95",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_1",
"session_entropy": 0.582
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 328,
"timestamp": "2026-01-05T04:24:00Z",
"transaction_amount_usd": 464622.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1380038.43,
"financial_exposure_usd": 1521381.85,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.