schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106712",
"label": "benign",
"label_confidence": 0.628,
"severity": "low",
"timestamp": "2026-01-05T15:52:00Z",
"trace_id": "d26b01dd-a442-e463-3306-41dda92276f8"
} | {
"account_age_days": 1581,
"account_id": "ACCT-CC8F2F9B15E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 106,
"timestamp": "2026-01-05T11:40:00Z",
"transaction_amount_usd": 16.5
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 635.91,
"financial_exposure_usd": 1458.32,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102717",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "critical",
"timestamp": "2026-01-02T21:17:00Z",
"trace_id": "3ba71112-2e30-e80f-4859-3f273afe251c"
} | {
"account_age_days": 337,
"account_id": "ACCT-CD4392FA0C7F",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 593,
"timestamp": "2026-01-02T21:17:00Z",
"transaction_amount_usd": 76496.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.778,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 744002.72,
"financial_exposure_usd": 852458.07,
"recoverable_pct": 0.164
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108042",
"label": "benign",
"label_confidence": 0.673,
"severity": "high",
"timestamp": "2026-01-06T14:02:00Z",
"trace_id": "dfac03b1-6994-6062-0e75-9351b52cdee8"
} | {
"account_age_days": 1165,
"account_id": "ACCT-BA0508EF1BBD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.692
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 240,
"timestamp": "2026-01-06T10:43:00Z",
"transaction_amount_usd": 10.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.553,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 524.56,
"financial_exposure_usd": 1001.31,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102209",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-02T12:49:00Z",
"trace_id": "501c2d85-4874-cbc6-9982-dbe4deeceaf0"
} | {
"account_age_days": 40,
"account_id": "ACCT-3D29B9743B82",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_1",
"session_entropy": 0.593
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 590,
"timestamp": "2026-01-02T12:49:00Z",
"transaction_amount_usd": 117703.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.806,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 481430.59,
"financial_exposure_usd": 1149926.45,
"recoverable_pct": 0.064
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109443",
"label": "benign",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-07T13:23:00Z",
"trace_id": "61551446-0c6a-3ee7-01d6-5dd0ca15fa4e"
} | {
"account_age_days": 1888,
"account_id": "ACCT-2BBBDE085D27",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.401
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 95,
"timestamp": "2026-01-07T13:23:00Z",
"transaction_amount_usd": 8513.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 598.02,
"financial_exposure_usd": 1396.1,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104703",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "high",
"timestamp": "2026-01-04T06:23:00Z",
"trace_id": "2b8bf4a3-5e8b-e3a3-a3a2-9344177387cd"
} | {
"account_age_days": 294,
"account_id": "ACCT-92E16CA7B15D",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_2",
"session_entropy": 0.436
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 84,
"timestamp": "2026-01-03T20:42:00Z",
"transaction_amount_usd": 14.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.438,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3350018.38,
"financial_exposure_usd": 5433456.34,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107872",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-06T11:12:00Z",
"trace_id": "1a2b8b7f-1fb5-39fb-6bf5-54b1aebc3186"
} | {
"account_age_days": 1930,
"account_id": "ACCT-AC31C5B8BE2F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.735
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 186,
"timestamp": "2026-01-06T09:06:00Z",
"transaction_amount_usd": 13.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.619,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4140.16,
"financial_exposure_usd": 5360.22,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109852",
"label": "benign",
"label_confidence": 0.479,
"severity": "medium",
"timestamp": "2026-01-07T20:12:00Z",
"trace_id": "9b78d429-ddaf-1aa1-a757-62f5233c8037"
} | {
"account_age_days": 1261,
"account_id": "ACCT-66E1162F2B15",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.441
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 440,
"timestamp": "2026-01-07T20:12:00Z",
"transaction_amount_usd": 8077.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1450.5,
"financial_exposure_usd": 3347.16,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104049",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "low",
"timestamp": "2026-01-03T19:29:00Z",
"trace_id": "c25e8f2c-3950-b639-37b4-8aa502ee3d2b"
} | {
"account_age_days": 990,
"account_id": "ACCT-2CC99F436002",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.308
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 423,
"timestamp": "2026-01-03T19:29:00Z",
"transaction_amount_usd": 1124818.5
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3852674.45,
"financial_exposure_usd": 4784446.91,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106570",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-05T13:30:00Z",
"trace_id": "44c121ff-2f45-81ce-9520-306448c0f46e"
} | {
"account_age_days": 1792,
"account_id": "ACCT-527160720273",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.686
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 429,
"timestamp": "2026-01-05T13:30:00Z",
"transaction_amount_usd": 1132720.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1176704.79,
"financial_exposure_usd": 1466314.58,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100736",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-01T12:16:00Z",
"trace_id": "dd43bb63-58ad-6e95-7f32-8d478d2a09fd"
} | {
"account_age_days": 1314,
"account_id": "ACCT-A24E7647A468",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_3",
"session_entropy": 0.644
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 218,
"timestamp": "2026-01-01T12:16:00Z",
"transaction_amount_usd": 3255.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 206646.68,
"financial_exposure_usd": 296350.63,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109235",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-07T09:55:00Z",
"trace_id": "836fe222-74cd-b16b-0ffb-5b93f28588d5"
} | {
"account_age_days": 75,
"account_id": "ACCT-1D3C7F3924DB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.759
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 672,
"timestamp": "2026-01-07T09:55:00Z",
"transaction_amount_usd": 5763.37
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4131.77,
"financial_exposure_usd": 4335.9,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108885",
"label": "benign",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-07T04:05:00Z",
"trace_id": "130381d5-afce-8b97-ad09-85bd0acac9e0"
} | {
"account_age_days": 826,
"account_id": "ACCT-C325914DE2C9",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_3",
"session_entropy": 0.814
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 840,
"timestamp": "2026-01-07T04:05:00Z",
"transaction_amount_usd": 9543.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6671.19,
"financial_exposure_usd": 7690.07,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104296",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "critical",
"timestamp": "2026-01-03T23:36:00Z",
"trace_id": "8dab2c3d-72cc-be64-a919-158cb2930cdd"
} | {
"account_age_days": 360,
"account_id": "ACCT-86F6683D3C55",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.57
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 338,
"timestamp": "2026-01-03T15:08:00Z",
"transaction_amount_usd": 8.68
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1845935.75,
"financial_exposure_usd": 3075825.95,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101299",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T21:39:00Z",
"trace_id": "ee0dca04-1f66-02ec-7d56-cd9bec624a7e"
} | {
"account_age_days": 1850,
"account_id": "ACCT-2D89D794ECB6",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_2",
"session_entropy": 0.455
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 301,
"timestamp": "2026-01-01T10:03:00Z",
"transaction_amount_usd": 14.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 358651.84,
"financial_exposure_usd": 457318.39,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104408",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-04T01:28:00Z",
"trace_id": "9622e760-92b4-2021-7927-9e978af4ebd3"
} | {
"account_age_days": 1765,
"account_id": "ACCT-C4294B19A5D5",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_2",
"session_entropy": 0.413
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 237,
"timestamp": "2026-01-03T20:16:00Z",
"transaction_amount_usd": 12.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.381,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3392030.18,
"financial_exposure_usd": 4221666.79,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108331",
"label": "benign",
"label_confidence": 0.634,
"severity": "medium",
"timestamp": "2026-01-06T18:51:00Z",
"trace_id": "9b91fe1a-2f82-af66-37e5-ee08796fd60c"
} | {
"account_age_days": 1452,
"account_id": "ACCT-0DC2665E85FC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 233,
"timestamp": "2026-01-06T17:11:00Z",
"transaction_amount_usd": 23.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 489.17,
"financial_exposure_usd": 1198.95,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106117",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-05T05:57:00Z",
"trace_id": "b70f1b3f-ed9f-0fec-30db-440814260964"
} | {
"account_age_days": 321,
"account_id": "ACCT-CE201F472636",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.696
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 762,
"timestamp": "2026-01-05T05:57:00Z",
"transaction_amount_usd": 458754.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.378,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4977942.6,
"financial_exposure_usd": 5307745.16,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100990",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-01T16:30:00Z",
"trace_id": "c73d1dcd-e0fa-1a0d-bfa1-21f2e7cd126b"
} | {
"account_age_days": 760,
"account_id": "ACCT-D09B3F65430A",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_2",
"session_entropy": 0.265
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 382,
"timestamp": "2026-01-01T05:39:00Z",
"transaction_amount_usd": 1.55
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 316078.29,
"financial_exposure_usd": 771015.8,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101887",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "high",
"timestamp": "2026-01-02T07:27:00Z",
"trace_id": "7401b8b2-fc1b-bdbb-5d47-c941a7e04dcc"
} | {
"account_age_days": 222,
"account_id": "ACCT-F02B670A450B",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_2",
"session_entropy": 0.929
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 349,
"timestamp": "2026-01-02T01:45:00Z",
"transaction_amount_usd": 23.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 573080.1,
"financial_exposure_usd": 818066.21,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104339",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-04T00:19:00Z",
"trace_id": "f88eb3b3-b580-6c4b-89ad-afd7870836fe"
} | {
"account_age_days": 1558,
"account_id": "ACCT-B89B97475C26",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_1",
"session_entropy": 0.354
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 912,
"timestamp": "2026-01-04T00:19:00Z",
"transaction_amount_usd": 2517860.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.391,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 914933.76,
"financial_exposure_usd": 1722429.38,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103487",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "critical",
"timestamp": "2026-01-03T10:07:00Z",
"trace_id": "38672af3-3fb4-22ae-c83d-fdcd11998d7d"
} | {
"account_age_days": 373,
"account_id": "ACCT-D447B33C6F53",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_1",
"session_entropy": 0.936
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 275,
"timestamp": "2026-01-03T10:07:00Z",
"transaction_amount_usd": 619760.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2674644.06,
"financial_exposure_usd": 3328690.65,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101058",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-01T17:38:00Z",
"trace_id": "0cc4eab1-fe46-5a33-35b8-93f75986dca2"
} | {
"account_age_days": 801,
"account_id": "ACCT-0BF2667FFB29",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_2",
"session_entropy": 0.735
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 227,
"timestamp": "2026-01-01T17:38:00Z",
"transaction_amount_usd": 97082.12
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.552,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 164374.11,
"financial_exposure_usd": 406945.08,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107594",
"label": "benign",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-06T06:34:00Z",
"trace_id": "07cf6cae-ba80-34c6-8ab3-8c3eaf85bf2c"
} | {
"account_age_days": 1050,
"account_id": "ACCT-652E53A6B955",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.559
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 991,
"timestamp": "2026-01-06T06:34:00Z",
"transaction_amount_usd": 12116.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1359.43,
"financial_exposure_usd": 1548.56,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107434",
"label": "benign",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-06T03:54:00Z",
"trace_id": "1a179e37-9520-2a7f-8814-13e5bdd5dcb5"
} | {
"account_age_days": 1789,
"account_id": "ACCT-7DD814378B73",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_1",
"session_entropy": 0.83
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 698,
"timestamp": "2026-01-06T03:54:00Z",
"transaction_amount_usd": 4698.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1517.16,
"financial_exposure_usd": 3024.5,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108803",
"label": "benign",
"label_confidence": 0.662,
"severity": "high",
"timestamp": "2026-01-07T02:43:00Z",
"trace_id": "918a3799-5530-1501-ae6f-757637636635"
} | {
"account_age_days": 120,
"account_id": "ACCT-17A38E315518",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.291
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 546,
"timestamp": "2026-01-07T02:43:00Z",
"transaction_amount_usd": 3184.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1445.14,
"financial_exposure_usd": 1968.79,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101194",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-01T19:54:00Z",
"trace_id": "7337243c-1371-126e-56b6-98d8fa1de9e0"
} | {
"account_age_days": 194,
"account_id": "ACCT-58C294B91DAF",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_1",
"session_entropy": 0.351
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 145,
"timestamp": "2026-01-01T14:49:00Z",
"transaction_amount_usd": 23.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.628,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 848180.86,
"financial_exposure_usd": 867506.31,
"recoverable_pct": 0.052
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106090",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-05T05:30:00Z",
"trace_id": "f4ea375b-98a2-8611-cd33-e25ead6d8bbb"
} | {
"account_age_days": 1383,
"account_id": "ACCT-E595CD51F227",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_1",
"session_entropy": 0.463
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1135,
"timestamp": "2026-01-05T05:30:00Z",
"transaction_amount_usd": 2315558.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4393575.45,
"financial_exposure_usd": 8285794.55,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109689",
"label": "benign",
"label_confidence": 0.548,
"severity": "high",
"timestamp": "2026-01-07T17:29:00Z",
"trace_id": "5a4f6ad7-8ba3-599d-2ef9-f2810b01dbd9"
} | {
"account_age_days": 1441,
"account_id": "ACCT-C510556B8189",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.901
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 92,
"timestamp": "2026-01-07T08:06:00Z",
"transaction_amount_usd": 7.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2681.87,
"financial_exposure_usd": 4092.12,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104300",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "critical",
"timestamp": "2026-01-03T23:40:00Z",
"trace_id": "a499f91b-4c4c-d9ec-0470-71138135ef0a"
} | {
"account_age_days": 659,
"account_id": "ACCT-3B7077C6038F",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_2",
"session_entropy": 0.744
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 339,
"timestamp": "2026-01-03T22:58:00Z",
"transaction_amount_usd": 15.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2286348,
"financial_exposure_usd": 2586860.58,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108611",
"label": "benign",
"label_confidence": 0.547,
"severity": "medium",
"timestamp": "2026-01-06T23:31:00Z",
"trace_id": "d3eff728-6622-1c6c-fb93-99f3aa7b78a1"
} | {
"account_age_days": 542,
"account_id": "ACCT-F0E3F9ABFA09",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.551
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1179,
"timestamp": "2026-01-06T23:31:00Z",
"transaction_amount_usd": 7193.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2184.09,
"financial_exposure_usd": 2882.37,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101106",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "high",
"timestamp": "2026-01-01T18:26:00Z",
"trace_id": "896fe8bc-cac6-b6dc-030b-79bc482edae9"
} | {
"account_age_days": 800,
"account_id": "ACCT-3A3D161F11C6",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_1",
"session_entropy": 0.391
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 534,
"timestamp": "2026-01-01T18:26:00Z",
"transaction_amount_usd": 93312.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 438270.12,
"financial_exposure_usd": 779571.08,
"recoverable_pct": 0.244
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109995",
"label": "benign",
"label_confidence": 0.626,
"severity": "high",
"timestamp": "2026-01-07T22:35:00Z",
"trace_id": "925541e4-bd3f-6a45-4d38-236acb72d3b6"
} | {
"account_age_days": 244,
"account_id": "ACCT-C771AD39C39E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.591
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 246,
"timestamp": "2026-01-07T18:47:00Z",
"transaction_amount_usd": 8.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 411.65,
"financial_exposure_usd": 933.54,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107404",
"label": "benign",
"label_confidence": 0.48,
"severity": "medium",
"timestamp": "2026-01-06T03:24:00Z",
"trace_id": "f7827ae7-6d47-67db-84be-9a022b79ad23"
} | {
"account_age_days": 1388,
"account_id": "ACCT-351ACE40744A",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.825
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 869,
"timestamp": "2026-01-06T03:24:00Z",
"transaction_amount_usd": 600.08
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4353.01,
"financial_exposure_usd": 6328.89,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104092",
"label": "fraudulent",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-03T20:12:00Z",
"trace_id": "93ba4882-a128-fc23-c8f5-b906bb3ffe99"
} | {
"account_age_days": 1319,
"account_id": "ACCT-CCF91E48D50C",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_1",
"session_entropy": 0.35
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 495,
"timestamp": "2026-01-03T20:12:00Z",
"transaction_amount_usd": 885454.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4407947.09,
"financial_exposure_usd": 5861040.41,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101514",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-02T01:14:00Z",
"trace_id": "d4ddedcd-05c3-e7fc-7d3b-df0d0abc7d44"
} | {
"account_age_days": 124,
"account_id": "ACCT-65B0439D9ED9",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_2",
"session_entropy": 0.778
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 422,
"timestamp": "2026-01-02T01:14:00Z",
"transaction_amount_usd": 77754.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 630444.27,
"financial_exposure_usd": 781168.36,
"recoverable_pct": 0.019
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102275",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-02T13:55:00Z",
"trace_id": "dcf8732c-10d0-ea8b-fe14-f5182f124dd3"
} | {
"account_age_days": 603,
"account_id": "ACCT-6D572693BFA6",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 536,
"timestamp": "2026-01-02T13:55:00Z",
"transaction_amount_usd": 64267.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.772,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 307731.02,
"financial_exposure_usd": 767306.47,
"recoverable_pct": 0.261
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104657",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-04T05:37:00Z",
"trace_id": "cea28168-6882-1c7d-08c4-26840bc12d2d"
} | {
"account_age_days": 656,
"account_id": "ACCT-494137A11F26",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_1",
"session_entropy": 0.859
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 705,
"timestamp": "2026-01-04T05:37:00Z",
"transaction_amount_usd": 458611.07
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1193468.65,
"financial_exposure_usd": 1436506.73,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108933",
"label": "benign",
"label_confidence": 0.565,
"severity": "medium",
"timestamp": "2026-01-07T04:53:00Z",
"trace_id": "b0f963a5-0cbb-93c8-a0f6-e592af16c0f5"
} | {
"account_age_days": 1162,
"account_id": "ACCT-DFAB1A168256",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.236
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1096,
"timestamp": "2026-01-07T04:53:00Z",
"transaction_amount_usd": 7166.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5008.39,
"financial_exposure_usd": 7022.29,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106129",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "low",
"timestamp": "2026-01-05T06:09:00Z",
"trace_id": "3aecf638-5b73-0e10-e492-db067b444e2b"
} | {
"account_age_days": 1425,
"account_id": "ACCT-B9CA0135192B",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.27
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 232,
"timestamp": "2026-01-05T04:27:00Z",
"transaction_amount_usd": 10.68
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.73,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3579324.35,
"financial_exposure_usd": 6231582.56,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106338",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "low",
"timestamp": "2026-01-05T09:38:00Z",
"trace_id": "2b4e9e4a-b625-499b-8b18-ed8835aaaef3"
} | {
"account_age_days": 454,
"account_id": "ACCT-14ACD18EC82E",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 718,
"timestamp": "2026-01-05T09:38:00Z",
"transaction_amount_usd": 2011801.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.922,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2686400.64,
"financial_exposure_usd": 4315026.85,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108861",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-07T03:41:00Z",
"trace_id": "3d41e031-0f94-acad-8010-d05141158ee3"
} | {
"account_age_days": 784,
"account_id": "ACCT-39B64F3CDC00",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.257
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 197,
"timestamp": "2026-01-07T01:38:00Z",
"transaction_amount_usd": 1.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1426.14,
"financial_exposure_usd": 1512.91,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106654",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "medium",
"timestamp": "2026-01-05T14:54:00Z",
"trace_id": "4c88e958-1cd6-f662-91f2-8697f9d30227"
} | {
"account_age_days": 1038,
"account_id": "ACCT-B5744837D1B9",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 968,
"timestamp": "2026-01-05T14:54:00Z",
"transaction_amount_usd": 747821.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2289901.19,
"financial_exposure_usd": 3073981.25,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104220",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-03T22:20:00Z",
"trace_id": "c806d416-7e4e-299b-57ee-6257f94f46e5"
} | {
"account_age_days": 1820,
"account_id": "ACCT-7A351A361607",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.506
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 627,
"timestamp": "2026-01-03T22:20:00Z",
"transaction_amount_usd": 2759472.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.393,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 218487.88,
"financial_exposure_usd": 432128.46,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100000",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-01T00:00:00Z",
"trace_id": "bdd640fb-0667-1ad1-1c80-317fa3b1799d"
} | {
"account_age_days": 1921,
"account_id": "ACCT-AB9099A435A2",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_3",
"session_entropy": 0.327
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 124,
"timestamp": "2025-12-31T18:56:00Z",
"transaction_amount_usd": 18.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 610802.86,
"financial_exposure_usd": 847767.51,
"recoverable_pct": 0.208
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103269",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-03T06:29:00Z",
"trace_id": "4d739709-21d9-9e8b-9c89-cc426afd5e19"
} | {
"account_age_days": 1126,
"account_id": "ACCT-9BBB6D8E36F9",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 135,
"timestamp": "2026-01-03T04:05:00Z",
"transaction_amount_usd": 2.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 683731.05,
"financial_exposure_usd": 1079419.31,
"recoverable_pct": 0.35
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101005",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-01T16:45:00Z",
"trace_id": "6f827037-2d38-5be1-012b-30ccafe99476"
} | {
"account_age_days": 1624,
"account_id": "ACCT-C65B8E2BBF12",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_2",
"session_entropy": 0.744
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 232,
"timestamp": "2026-01-01T16:45:00Z",
"transaction_amount_usd": 104715.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.917,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 337273.38,
"financial_exposure_usd": 773369.93,
"recoverable_pct": 0.027
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109185",
"label": "benign",
"label_confidence": 0.639,
"severity": "low",
"timestamp": "2026-01-07T09:05:00Z",
"trace_id": "788a29f1-9d5e-0ab8-1abd-f85f31113b94"
} | {
"account_age_days": 1418,
"account_id": "ACCT-26C0DC36BD00",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.646
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 214,
"timestamp": "2026-01-07T09:05:00Z",
"transaction_amount_usd": 10416.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1528.6,
"financial_exposure_usd": 3319,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101839",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-02T06:39:00Z",
"trace_id": "48730b11-c342-47b9-164a-e67f7f6794ac"
} | {
"account_age_days": 219,
"account_id": "ACCT-8CF49E2272AF",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_3",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 817,
"timestamp": "2026-01-02T06:39:00Z",
"transaction_amount_usd": 78320.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.561,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 386142.14,
"financial_exposure_usd": 496230.28,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106360",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "critical",
"timestamp": "2026-01-05T10:00:00Z",
"trace_id": "2a3ec3fb-ed80-a906-d7ba-e124526f8d04"
} | {
"account_age_days": 1916,
"account_id": "ACCT-AB3AD246EF47",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.354
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 923,
"timestamp": "2026-01-05T10:00:00Z",
"transaction_amount_usd": 1615519.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.646,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6290098.79,
"financial_exposure_usd": 6431565.74,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109239",
"label": "benign",
"label_confidence": 0.549,
"severity": "high",
"timestamp": "2026-01-07T09:59:00Z",
"trace_id": "644ad711-9cc2-24e3-8e52-270e295019a7"
} | {
"account_age_days": 1456,
"account_id": "ACCT-40972133DA11",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_1",
"session_entropy": 0.146
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 756,
"timestamp": "2026-01-07T09:59:00Z",
"transaction_amount_usd": 13156.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2933.51,
"financial_exposure_usd": 2937.79,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103164",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-03T04:44:00Z",
"trace_id": "973c0079-92a3-2a93-2ea7-8e10c7f61c84"
} | {
"account_age_days": 222,
"account_id": "ACCT-D1367D214461",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 690,
"timestamp": "2026-01-03T04:44:00Z",
"transaction_amount_usd": 54532.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.66,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 553903.14,
"financial_exposure_usd": 990245.33,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105171",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "low",
"timestamp": "2026-01-04T14:11:00Z",
"trace_id": "2d81d4be-8085-5f96-7403-65b8f930d548"
} | {
"account_age_days": 141,
"account_id": "ACCT-957DB1EA9089",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.2
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 356,
"timestamp": "2026-01-04T14:11:00Z",
"transaction_amount_usd": 2323191.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.651,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2912582.21,
"financial_exposure_usd": 5399880.94,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104715",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "low",
"timestamp": "2026-01-04T06:35:00Z",
"trace_id": "e43c7d0d-0c90-583f-7040-dbccd864254c"
} | {
"account_age_days": 1027,
"account_id": "ACCT-3321CF8307FD",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.33
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 178,
"timestamp": "2026-01-04T06:35:00Z",
"transaction_amount_usd": 2173162.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4686697.6,
"financial_exposure_usd": 7805775.4,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109472",
"label": "benign",
"label_confidence": 0.567,
"severity": "high",
"timestamp": "2026-01-07T13:52:00Z",
"trace_id": "a7d2f2f2-d00c-e6a0-b731-b2e5ddda070a"
} | {
"account_age_days": 660,
"account_id": "ACCT-7EDF8595112B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.663
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 909,
"timestamp": "2026-01-07T13:52:00Z",
"transaction_amount_usd": 11541.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2174.88,
"financial_exposure_usd": 5391.7,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109497",
"label": "benign",
"label_confidence": 0.527,
"severity": "high",
"timestamp": "2026-01-07T14:17:00Z",
"trace_id": "df063c62-fae3-411c-8ae6-7dcb99f5a142"
} | {
"account_age_days": 1548,
"account_id": "ACCT-F7E490E65B59",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.603
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 285,
"timestamp": "2026-01-07T04:16:00Z",
"transaction_amount_usd": 20.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 528.63,
"financial_exposure_usd": 790.7,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102513",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "medium",
"timestamp": "2026-01-02T17:53:00Z",
"trace_id": "1321d45f-b9c2-f14d-a4d7-b568462e5e85"
} | {
"account_age_days": 1405,
"account_id": "ACCT-E5294DBA2211",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.294
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 300,
"timestamp": "2026-01-02T07:18:00Z",
"transaction_amount_usd": 20.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.882,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 146767.27,
"financial_exposure_usd": 305291.56,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100809",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-01T13:29:00Z",
"trace_id": "f250bf15-e22e-1298-0222-bda63451bb59"
} | {
"account_age_days": 1475,
"account_id": "ACCT-BC9504738F99",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_3",
"session_entropy": 0.782
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 122,
"timestamp": "2026-01-01T13:29:00Z",
"transaction_amount_usd": 2236.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.837,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 221203.28,
"financial_exposure_usd": 552041.98,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101681",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-02T04:01:00Z",
"trace_id": "aa5d4cc1-54f2-b17f-3af1-3969789aec86"
} | {
"account_age_days": 943,
"account_id": "ACCT-843A70A17D32",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1113,
"timestamp": "2026-01-02T04:01:00Z",
"transaction_amount_usd": 118148.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.617,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 362340.84,
"financial_exposure_usd": 404452.68,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106769",
"label": "benign",
"label_confidence": 0.543,
"severity": "low",
"timestamp": "2026-01-05T16:49:00Z",
"trace_id": "922ca543-a29f-8729-9067-0ed19777eeb3"
} | {
"account_age_days": 269,
"account_id": "ACCT-F4498DA4FA12",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.124
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1044,
"timestamp": "2026-01-05T16:49:00Z",
"transaction_amount_usd": 3779.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 962.49,
"financial_exposure_usd": 2122.49,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100712",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-01T11:52:00Z",
"trace_id": "1bf05ffa-0962-af1c-bbb0-89e811b623ce"
} | {
"account_age_days": 46,
"account_id": "ACCT-126CDE76EFEE",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.382
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 232,
"timestamp": "2026-01-01T08:57:00Z",
"transaction_amount_usd": 9.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 412073.97,
"financial_exposure_usd": 429781.31,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108057",
"label": "benign",
"label_confidence": 0.559,
"severity": "low",
"timestamp": "2026-01-06T14:17:00Z",
"trace_id": "2aaba6e9-e221-f083-0da2-89b973212b71"
} | {
"account_age_days": 270,
"account_id": "ACCT-773FEAEA38D0",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 98,
"timestamp": "2026-01-06T12:23:00Z",
"transaction_amount_usd": 20.96
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4777.66,
"financial_exposure_usd": 5488.96,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101325",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-01T22:05:00Z",
"trace_id": "f8a5a340-8890-18eb-8c1f-7732c16250b5"
} | {
"account_age_days": 323,
"account_id": "ACCT-D10BD6D8F6CA",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_1",
"session_entropy": 0.575
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 490,
"timestamp": "2026-01-01T22:05:00Z",
"transaction_amount_usd": 52122.2
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.67,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 462829.58,
"financial_exposure_usd": 918821.31,
"recoverable_pct": 0.252
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105446",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "critical",
"timestamp": "2026-01-04T18:46:00Z",
"trace_id": "9eee9337-d1b4-d722-9012-22a71dc77e1c"
} | {
"account_age_days": 976,
"account_id": "ACCT-FA9BE4F90FD7",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.863
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 143,
"timestamp": "2026-01-04T18:46:00Z",
"transaction_amount_usd": 2884531.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2662863.66,
"financial_exposure_usd": 6145297.88,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105607",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "medium",
"timestamp": "2026-01-04T21:27:00Z",
"trace_id": "454d9892-e4dd-add3-988e-440d61fdcbff"
} | {
"account_age_days": 1522,
"account_id": "ACCT-2813D8D1D0D5",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 921,
"timestamp": "2026-01-04T21:27:00Z",
"transaction_amount_usd": 810787.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.868,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2394800.78,
"financial_exposure_usd": 3173746.5,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104513",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-04T03:13:00Z",
"trace_id": "031231b3-e939-b696-2006-bfa56b60e184"
} | {
"account_age_days": 703,
"account_id": "ACCT-E985809A1BD7",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_1",
"session_entropy": 0.657
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 440,
"timestamp": "2026-01-04T03:13:00Z",
"transaction_amount_usd": 395195.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2043961.26,
"financial_exposure_usd": 4614131.6,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101236",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "medium",
"timestamp": "2026-01-01T20:36:00Z",
"trace_id": "644f8bec-794d-52af-6804-ba0cb0fd0eab"
} | {
"account_age_days": 654,
"account_id": "ACCT-76412C5EDA36",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_1",
"session_entropy": 0.168
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 183,
"timestamp": "2026-01-01T15:09:00Z",
"transaction_amount_usd": 5.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 646772.39,
"financial_exposure_usd": 1257940.5,
"recoverable_pct": 0.095
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106017",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-05T04:17:00Z",
"trace_id": "5fb1c364-8659-1671-1345-e91d0bf88faa"
} | {
"account_age_days": 486,
"account_id": "ACCT-BC480DECCE10",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 126,
"timestamp": "2026-01-05T04:17:00Z",
"transaction_amount_usd": 193932.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3818844.48,
"financial_exposure_usd": 7119911.16,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104652",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-04T05:32:00Z",
"trace_id": "cebfcf9d-d683-cbe0-4e1e-df8ce833a177"
} | {
"account_age_days": 1770,
"account_id": "ACCT-59D7E4B9B0B0",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_2",
"session_entropy": 0.172
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 141,
"timestamp": "2026-01-03T17:35:00Z",
"transaction_amount_usd": 16.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4746730.9,
"financial_exposure_usd": 5421212.88,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103466",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "critical",
"timestamp": "2026-01-03T09:46:00Z",
"trace_id": "7ed2fa66-da08-c214-1175-de6ee499f0a2"
} | {
"account_age_days": 85,
"account_id": "ACCT-5601187B5244",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_2",
"session_entropy": 0.741
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 981,
"timestamp": "2026-01-03T09:46:00Z",
"transaction_amount_usd": 50403.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.744,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3649187.78,
"financial_exposure_usd": 8142080.13,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105383",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "medium",
"timestamp": "2026-01-04T17:43:00Z",
"trace_id": "71dd428f-cd80-31ba-6f02-edbc4b933c01"
} | {
"account_age_days": 212,
"account_id": "ACCT-5F253FFE5398",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_1",
"session_entropy": 0.76
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 963,
"timestamp": "2026-01-04T17:43:00Z",
"transaction_amount_usd": 1923524.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.591,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2738393.87,
"financial_exposure_usd": 3315722.2,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108729",
"label": "benign",
"label_confidence": 0.477,
"severity": "medium",
"timestamp": "2026-01-07T01:29:00Z",
"trace_id": "898005c5-0074-e1e6-87d9-f79f8b4d9da0"
} | {
"account_age_days": 159,
"account_id": "ACCT-0FDA2AA8EFB3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.154
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1005,
"timestamp": "2026-01-07T01:29:00Z",
"transaction_amount_usd": 8088.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.518,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2162.05,
"financial_exposure_usd": 2587.78,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101567",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-02T02:07:00Z",
"trace_id": "702370cc-8035-5e06-175f-a6899d0c3c68"
} | {
"account_age_days": 766,
"account_id": "ACCT-B1CE2FD9D5A2",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 228,
"timestamp": "2026-01-02T02:07:00Z",
"transaction_amount_usd": 73644.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.671,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 904003.44,
"financial_exposure_usd": 1074549.06,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104277",
"label": "fraudulent",
"label_confidence": 0.614,
"severity": "high",
"timestamp": "2026-01-03T23:17:00Z",
"trace_id": "b9851029-48e7-7bf7-e313-1d9a268d348e"
} | {
"account_age_days": 889,
"account_id": "ACCT-9110E95CF357",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_1",
"session_entropy": 0.603
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 756,
"timestamp": "2026-01-03T23:17:00Z",
"transaction_amount_usd": 736734.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3279778.98,
"financial_exposure_usd": 3558218.77,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106826",
"label": "benign",
"label_confidence": 0.7,
"severity": "medium",
"timestamp": "2026-01-05T17:46:00Z",
"trace_id": "335841e1-a100-bfbb-3f02-a3175b3d967a"
} | {
"account_age_days": 105,
"account_id": "ACCT-545849390BA2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.319
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 690,
"timestamp": "2026-01-05T17:46:00Z",
"transaction_amount_usd": 2700.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2114.81,
"financial_exposure_usd": 3799.46,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100091",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-01T01:31:00Z",
"trace_id": "974e8f83-d5d9-a385-2bb2-4cbc9c794cdb"
} | {
"account_age_days": 1026,
"account_id": "ACCT-98A547B209A1",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_3",
"session_entropy": 0.253
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 209,
"timestamp": "2026-01-01T01:31:00Z",
"transaction_amount_usd": 13206.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 488743.88,
"financial_exposure_usd": 802914.63,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103492",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "critical",
"timestamp": "2026-01-03T10:12:00Z",
"trace_id": "7810a9e6-2fd5-3531-2e3b-b6b8cf8fc2a2"
} | {
"account_age_days": 1394,
"account_id": "ACCT-FD001D57B59B",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.387
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1133,
"timestamp": "2026-01-03T10:12:00Z",
"transaction_amount_usd": 487146.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4902385.13,
"financial_exposure_usd": 6801003.31,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102200",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "high",
"timestamp": "2026-01-02T12:40:00Z",
"trace_id": "82d59cc4-8e34-fa00-27a2-04cda8db65bd"
} | {
"account_age_days": 737,
"account_id": "ACCT-D9B810DC5509",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_2",
"session_entropy": 0.188
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1009,
"timestamp": "2026-01-02T12:40:00Z",
"transaction_amount_usd": 15920.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.518,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 685464.81,
"financial_exposure_usd": 824770.25,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104191",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-03T21:51:00Z",
"trace_id": "78d5a2e0-253f-70bb-58a8-80a70ab19dec"
} | {
"account_age_days": 1673,
"account_id": "ACCT-46F04172536B",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 302,
"timestamp": "2026-01-03T21:51:00Z",
"transaction_amount_usd": 2070103.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.929,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2819371.48,
"financial_exposure_usd": 4657645.08,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109950",
"label": "benign",
"label_confidence": 0.452,
"severity": "high",
"timestamp": "2026-01-07T21:50:00Z",
"trace_id": "0dc581b0-27d1-1288-62f8-68fea7adf18f"
} | {
"account_age_days": 1134,
"account_id": "ACCT-9FC595FCD06A",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.327
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1149,
"timestamp": "2026-01-07T21:50:00Z",
"transaction_amount_usd": 14586.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.463,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 874.3,
"financial_exposure_usd": 1245.95,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104075",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-03T19:55:00Z",
"trace_id": "9ac6baaf-597c-9e12-e511-9e2ccbd89ee2"
} | {
"account_age_days": 550,
"account_id": "ACCT-6568E817F0B7",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.667
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 109,
"timestamp": "2026-01-03T19:55:00Z",
"transaction_amount_usd": 2430687.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.457,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1753645.7,
"financial_exposure_usd": 3142635.64,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107285",
"label": "benign",
"label_confidence": 0.452,
"severity": "low",
"timestamp": "2026-01-06T01:25:00Z",
"trace_id": "99b3803a-1b76-614f-04db-7d5597af6205"
} | {
"account_age_days": 1069,
"account_id": "ACCT-BF5677F91A46",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.585
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 230,
"timestamp": "2026-01-06T01:25:00Z",
"transaction_amount_usd": 946.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1930.29,
"financial_exposure_usd": 2046.46,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106807",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-05T17:27:00Z",
"trace_id": "44949d5f-0b0e-bd61-652e-aec8a6bfecc8"
} | {
"account_age_days": 118,
"account_id": "ACCT-DC477BF832EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.703
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 235,
"timestamp": "2026-01-05T17:27:00Z",
"transaction_amount_usd": 13943.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5737.67,
"financial_exposure_usd": 6161.95,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102402",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "high",
"timestamp": "2026-01-02T16:02:00Z",
"trace_id": "ffcc0b56-60d9-6692-0a7e-1b82b705757d"
} | {
"account_age_days": 1974,
"account_id": "ACCT-138E7CF4812D",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 295,
"timestamp": "2026-01-02T08:18:00Z",
"transaction_amount_usd": 1.09
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 471726.39,
"financial_exposure_usd": 732816.98,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104519",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "low",
"timestamp": "2026-01-04T03:19:00Z",
"trace_id": "37df5ba4-76b1-b448-87b8-a86ce2e02798"
} | {
"account_age_days": 122,
"account_id": "ACCT-4F3FC87BA847",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 234,
"timestamp": "2026-01-03T18:56:00Z",
"transaction_amount_usd": 8.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1607824.61,
"financial_exposure_usd": 2896980.4,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107936",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-06T12:16:00Z",
"trace_id": "5590d5ba-fce9-5463-680a-11c262264003"
} | {
"account_age_days": 286,
"account_id": "ACCT-96B435FD0A81",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.192
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 991,
"timestamp": "2026-01-06T12:16:00Z",
"transaction_amount_usd": 3381.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103684",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-03T13:24:00Z",
"trace_id": "5683728a-805a-b618-08b6-328c135bd5de"
} | {
"account_age_days": 1466,
"account_id": "ACCT-2D76942E5BB7",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_1",
"session_entropy": 0.421
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 740,
"timestamp": "2026-01-03T13:24:00Z",
"transaction_amount_usd": 250280.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3853816.81,
"financial_exposure_usd": 4183581.33,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102609",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-02T19:29:00Z",
"trace_id": "e5e65196-95a2-5c10-3d1c-e1a619ef2816"
} | {
"account_age_days": 386,
"account_id": "ACCT-B854DA7ECAC5",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_1",
"session_entropy": 0.161
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 816,
"timestamp": "2026-01-02T19:29:00Z",
"transaction_amount_usd": 89681.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.801,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1387161.28,
"financial_exposure_usd": 1410353.19,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103668",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-03T13:08:00Z",
"trace_id": "c87e30ed-3cf2-1271-e142-736b6953cd37"
} | {
"account_age_days": 595,
"account_id": "ACCT-7B0E8281B5B1",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.176
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1079,
"timestamp": "2026-01-03T13:08:00Z",
"transaction_amount_usd": 880184.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.585,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3251298.44,
"financial_exposure_usd": 4413728.51,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104198",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-03T21:58:00Z",
"trace_id": "5a45b5f5-492b-395b-5f34-ed57f387c643"
} | {
"account_age_days": 223,
"account_id": "ACCT-078781DA23EB",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_3",
"session_entropy": 0.432
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 740,
"timestamp": "2026-01-03T21:58:00Z",
"transaction_amount_usd": 1669215.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4180976.61,
"financial_exposure_usd": 4518547.95,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105808",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "critical",
"timestamp": "2026-01-05T00:48:00Z",
"trace_id": "949709ca-dd94-25ee-8fe0-9602adfd0fe2"
} | {
"account_age_days": 1546,
"account_id": "ACCT-6D7BBD3E9BAB",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.752
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 562,
"timestamp": "2026-01-05T00:48:00Z",
"transaction_amount_usd": 340720.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.441,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 898538.75,
"financial_exposure_usd": 1777799.7,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104667",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-04T05:47:00Z",
"trace_id": "cc3eff42-3b5f-fc92-7218-715832c6e403"
} | {
"account_age_days": 936,
"account_id": "ACCT-682EEF4002CC",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_1",
"session_entropy": 0.451
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 385,
"timestamp": "2026-01-03T21:36:00Z",
"transaction_amount_usd": 9.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.71,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3191153.44,
"financial_exposure_usd": 4423094.06,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102887",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-03T00:07:00Z",
"trace_id": "1dcce878-1846-4739-d082-3913a45de860"
} | {
"account_age_days": 1554,
"account_id": "ACCT-25B11A9F7CA9",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_3",
"session_entropy": 0.528
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 84,
"timestamp": "2026-01-02T13:53:00Z",
"transaction_amount_usd": 22.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.523,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 475169.56,
"financial_exposure_usd": 699870.52,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103120",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "medium",
"timestamp": "2026-01-03T04:00:00Z",
"trace_id": "3fd80419-bf80-5a3f-1a07-68713295b098"
} | {
"account_age_days": 988,
"account_id": "ACCT-39DC5538B5A7",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.867
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 722,
"timestamp": "2026-01-03T04:00:00Z",
"transaction_amount_usd": 19984.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.565,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 528749.01,
"financial_exposure_usd": 647253.5,
"recoverable_pct": 0.192
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104254",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "critical",
"timestamp": "2026-01-03T22:54:00Z",
"trace_id": "9292c03b-4473-0926-d33e-ad90e7029fd8"
} | {
"account_age_days": 1497,
"account_id": "ACCT-A948359C3B35",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_3",
"session_entropy": 0.672
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 550,
"timestamp": "2026-01-03T22:54:00Z",
"transaction_amount_usd": 569020.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.52,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5388412.32,
"financial_exposure_usd": 5963919.71,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100657",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "high",
"timestamp": "2026-01-01T10:57:00Z",
"trace_id": "9a437632-7231-6218-533e-721871c8fb57"
} | {
"account_age_days": 1522,
"account_id": "ACCT-461D937D1AFC",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.336
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 628,
"timestamp": "2026-01-01T10:57:00Z",
"transaction_amount_usd": 37602.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.608,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 522612.4,
"financial_exposure_usd": 677358.85,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101580",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "critical",
"timestamp": "2026-01-02T02:20:00Z",
"trace_id": "5d019013-532d-c283-d7e3-3478d5129ca0"
} | {
"account_age_days": 309,
"account_id": "ACCT-228F9F739319",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.765
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 130,
"timestamp": "2026-01-01T15:21:00Z",
"transaction_amount_usd": 18.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 370665.15,
"financial_exposure_usd": 441088.25,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103917",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "medium",
"timestamp": "2026-01-03T17:17:00Z",
"trace_id": "2bec095a-ff54-d167-3482-dabd4cfc46ee"
} | {
"account_age_days": 46,
"account_id": "ACCT-1B7883D744DA",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_1",
"session_entropy": 0.468
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1121,
"timestamp": "2026-01-03T17:17:00Z",
"transaction_amount_usd": 1214103.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2889835.23,
"financial_exposure_usd": 5725874.28,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106582",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-05T13:42:00Z",
"trace_id": "1dfcf27e-43c0-8b74-c538-168f3222908f"
} | {
"account_age_days": 540,
"account_id": "ACCT-FF00D8A6C313",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.826
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 757,
"timestamp": "2026-01-05T13:42:00Z",
"transaction_amount_usd": 707358.65
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2578297.24,
"financial_exposure_usd": 6047632.74,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102086",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-02T10:46:00Z",
"trace_id": "1069677d-9b89-5d39-2d91-96b743046770"
} | {
"account_age_days": 1349,
"account_id": "ACCT-96017F3461BE",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_2",
"session_entropy": 0.708
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 303,
"timestamp": "2026-01-02T06:48:00Z",
"transaction_amount_usd": 7.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.727,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 412961.72,
"financial_exposure_usd": 679035.17,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.