schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100678",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-01T11:18:00Z",
"trace_id": "73bcf7d7-cc3a-275a-2143-5a7fcd1723c8"
} | {
"account_age_days": 1556,
"account_id": "ACCT-E76AB69A90C9",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.241
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 759,
"timestamp": "2026-01-01T11:18:00Z",
"transaction_amount_usd": 3527.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 256334.13,
"financial_exposure_usd": 456757.55,
"recoverable_pct": 0.276
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104136",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-03T20:56:00Z",
"trace_id": "77c8bf77-92ea-e86c-af8d-ae833b99a2c3"
} | {
"account_age_days": 747,
"account_id": "ACCT-60B5B16A710E",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_1",
"session_entropy": 0.641
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 268,
"timestamp": "2026-01-03T10:31:00Z",
"transaction_amount_usd": 24.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1569856.35,
"financial_exposure_usd": 2720412.99,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108248",
"label": "benign",
"label_confidence": 0.629,
"severity": "high",
"timestamp": "2026-01-06T17:28:00Z",
"trace_id": "9376298d-c624-3304-54f8-158ea1a5eab0"
} | {
"account_age_days": 1553,
"account_id": "ACCT-082681B563DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.481
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 556,
"timestamp": "2026-01-06T17:28:00Z",
"transaction_amount_usd": 291.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2816.44,
"financial_exposure_usd": 3338.53,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104184",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "high",
"timestamp": "2026-01-03T21:44:00Z",
"trace_id": "334ac66c-df16-9bf9-3a30-2fd3dd26cba9"
} | {
"account_age_days": 421,
"account_id": "ACCT-F906273E49B0",
"baseline_risk_score": 0.248,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 812,
"timestamp": "2026-01-03T21:44:00Z",
"transaction_amount_usd": 2899929.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.854,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2737070.04,
"financial_exposure_usd": 4324424.1,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108148",
"label": "benign",
"label_confidence": 0.594,
"severity": "low",
"timestamp": "2026-01-06T15:48:00Z",
"trace_id": "eeeae271-570f-421b-d1b8-400d953fa844"
} | {
"account_age_days": 1617,
"account_id": "ACCT-97ED4CFB0FB4",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.908
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 350,
"timestamp": "2026-01-06T09:48:00Z",
"transaction_amount_usd": 20.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1026.45,
"financial_exposure_usd": 2322.63,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104540",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-04T03:40:00Z",
"trace_id": "39b60488-e11f-caac-d15b-3b5b3e472ac6"
} | {
"account_age_days": 644,
"account_id": "ACCT-568377992436",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1100,
"timestamp": "2026-01-04T03:40:00Z",
"transaction_amount_usd": 1165842.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.851,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1863069.29,
"financial_exposure_usd": 3318665.82,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100888",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-01T14:48:00Z",
"trace_id": "394618b0-986c-e3c4-a482-58b9494879b4"
} | {
"account_age_days": 1563,
"account_id": "ACCT-953D33511088",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_3",
"session_entropy": 0.785
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1143,
"timestamp": "2026-01-01T14:48:00Z",
"transaction_amount_usd": 90548.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.53,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 457448.91,
"financial_exposure_usd": 576145.77,
"recoverable_pct": 0.103
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101739",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "medium",
"timestamp": "2026-01-02T04:59:00Z",
"trace_id": "776b54ff-6472-4f94-4597-e0f1b3139a73"
} | {
"account_age_days": 1190,
"account_id": "ACCT-9F4E212FB5E9",
"baseline_risk_score": 0.547,
"kyc_tier": "tier_2",
"session_entropy": 0.584
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 577,
"timestamp": "2026-01-02T04:59:00Z",
"transaction_amount_usd": 41212.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.618,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 290182.3,
"financial_exposure_usd": 621656.44,
"recoverable_pct": 0.703
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106247",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "high",
"timestamp": "2026-01-05T08:07:00Z",
"trace_id": "cc1f6359-f4dc-8ea8-dda2-4a2295d405c1"
} | {
"account_age_days": 723,
"account_id": "ACCT-51BB6B8CF95B",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.932
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 201,
"timestamp": "2026-01-05T08:07:00Z",
"transaction_amount_usd": 2673516.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.913,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2294030.09,
"financial_exposure_usd": 5513384.11,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101925",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-02T08:05:00Z",
"trace_id": "669c0fe3-5de7-4c31-21ac-47ccd91d0449"
} | {
"account_age_days": 1800,
"account_id": "ACCT-98717AB5E2D8",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_3",
"session_entropy": 0.678
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1087,
"timestamp": "2026-01-02T08:05:00Z",
"transaction_amount_usd": 90887.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 427330.82,
"financial_exposure_usd": 751598.25,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100421",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "low",
"timestamp": "2026-01-01T07:01:00Z",
"trace_id": "277c5792-95f5-0f19-3ebb-7dfe585537a3"
} | {
"account_age_days": 937,
"account_id": "ACCT-9B6E2C87199D",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_2",
"session_entropy": 0.529
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 150,
"timestamp": "2025-12-31T23:40:00Z",
"transaction_amount_usd": 23.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 850743.71,
"financial_exposure_usd": 1144161.73,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101054",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "critical",
"timestamp": "2026-01-01T17:34:00Z",
"trace_id": "93a434cb-ecd5-bffd-9335-8b01f019d98d"
} | {
"account_age_days": 138,
"account_id": "ACCT-3AEAAA0FB5A5",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.611
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 178,
"timestamp": "2026-01-01T07:21:00Z",
"transaction_amount_usd": 0.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.808,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 240049.85,
"financial_exposure_usd": 404859.22,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103013",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-03T02:13:00Z",
"trace_id": "da6f9a11-8e76-fe51-e93b-bb29e429309c"
} | {
"account_age_days": 1604,
"account_id": "ACCT-8E8C2455DB23",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_2",
"session_entropy": 0.335
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 787,
"timestamp": "2026-01-03T02:13:00Z",
"transaction_amount_usd": 2354.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105755",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "low",
"timestamp": "2026-01-04T23:55:00Z",
"trace_id": "2475887a-4cf1-2d25-6963-41980efc68f4"
} | {
"account_age_days": 1537,
"account_id": "ACCT-7F24D773029C",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 877,
"timestamp": "2026-01-04T23:55:00Z",
"transaction_amount_usd": 1423201.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.912,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1926336.15,
"financial_exposure_usd": 2176838.47,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102014",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-02T09:34:00Z",
"trace_id": "b30b1ec0-aacc-bbbe-ca75-0fa29bfcc0b8"
} | {
"account_age_days": 1710,
"account_id": "ACCT-0E54BF2B1C99",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.728
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 110,
"timestamp": "2026-01-02T03:17:00Z",
"transaction_amount_usd": 11.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.522,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 288035.43,
"financial_exposure_usd": 633051.49,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104426",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-04T01:46:00Z",
"trace_id": "2297c27a-0805-0610-632d-732cf9d77e76"
} | {
"account_age_days": 946,
"account_id": "ACCT-491CE6DE767F",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 425,
"timestamp": "2026-01-04T01:46:00Z",
"transaction_amount_usd": 2324350.36
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2994138.02,
"financial_exposure_usd": 4815309.9,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108637",
"label": "benign",
"label_confidence": 0.592,
"severity": "low",
"timestamp": "2026-01-06T23:57:00Z",
"trace_id": "4c56c8c4-77a2-cf99-4b68-06729c1c8880"
} | {
"account_age_days": 126,
"account_id": "ACCT-6B622377EB29",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 674,
"timestamp": "2026-01-06T23:57:00Z",
"transaction_amount_usd": 1367.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2747.72,
"financial_exposure_usd": 2890.81,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102983",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "medium",
"timestamp": "2026-01-03T01:43:00Z",
"trace_id": "6046b229-00d2-f7d6-a1ed-303e3f303cda"
} | {
"account_age_days": 1205,
"account_id": "ACCT-7F528253005D",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_3",
"session_entropy": 0.618
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 216,
"timestamp": "2026-01-02T15:50:00Z",
"transaction_amount_usd": 12.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 220931,
"financial_exposure_usd": 376471.78,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107398",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-06T03:18:00Z",
"trace_id": "e34461a9-44fa-28df-40ec-cc110857101e"
} | {
"account_age_days": 236,
"account_id": "ACCT-D4EC08EF2F33",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.678
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 95,
"timestamp": "2026-01-05T18:07:00Z",
"transaction_amount_usd": 13.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1923.92,
"financial_exposure_usd": 4382.92,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102888",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-03T00:08:00Z",
"trace_id": "ef716dd0-1c7b-9897-bff9-423d69fa2003"
} | {
"account_age_days": 191,
"account_id": "ACCT-E7DC0A991B81",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.415
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 690,
"timestamp": "2026-01-03T00:08:00Z",
"transaction_amount_usd": 99348.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.845,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 575332.59,
"financial_exposure_usd": 895794.94,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100997",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "low",
"timestamp": "2026-01-01T16:37:00Z",
"trace_id": "bb9855ce-e5c6-d198-8e23-f880a964b0f1"
} | {
"account_age_days": 301,
"account_id": "ACCT-0F6597F7F63E",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 705,
"timestamp": "2026-01-01T16:37:00Z",
"transaction_amount_usd": 56014.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 444352.19,
"financial_exposure_usd": 822597.89,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108531",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T22:11:00Z",
"trace_id": "97c6af95-9af9-deaa-8009-e905fab1ef45"
} | {
"account_age_days": 195,
"account_id": "ACCT-60637037F55D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.777
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 603,
"timestamp": "2026-01-06T22:11:00Z",
"transaction_amount_usd": 1427.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3578.33,
"financial_exposure_usd": 4689.54,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108349",
"label": "benign",
"label_confidence": 0.566,
"severity": "low",
"timestamp": "2026-01-06T19:09:00Z",
"trace_id": "3d479804-1e22-0e59-9779-7a5abcc01a1c"
} | {
"account_age_days": 257,
"account_id": "ACCT-5C2EED14A6AF",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.523
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 150,
"timestamp": "2026-01-06T15:21:00Z",
"transaction_amount_usd": 13.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1795.72,
"financial_exposure_usd": 2631.54,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105340",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-04T17:00:00Z",
"trace_id": "1f86eb7a-792f-fa86-76df-d102d6096863"
} | {
"account_age_days": 1212,
"account_id": "ACCT-8D17487440DC",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_1",
"session_entropy": 0.584
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 305,
"timestamp": "2026-01-04T08:30:00Z",
"transaction_amount_usd": 23.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3467137.39,
"financial_exposure_usd": 4909999.54,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102328",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "high",
"timestamp": "2026-01-02T14:48:00Z",
"trace_id": "014ad916-1c6a-0d18-aa54-e2a296a7bc53"
} | {
"account_age_days": 808,
"account_id": "ACCT-156A6296972E",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 118,
"timestamp": "2026-01-02T14:48:00Z",
"transaction_amount_usd": 68483.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.92,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 114878.24,
"financial_exposure_usd": 162289.04,
"recoverable_pct": 0.036
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106860",
"label": "benign",
"label_confidence": 0.482,
"severity": "high",
"timestamp": "2026-01-05T18:20:00Z",
"trace_id": "6e6074bd-73d0-1251-3e9e-9493c4f197cf"
} | {
"account_age_days": 38,
"account_id": "ACCT-437AD211F986",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.434
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 204,
"timestamp": "2026-01-05T18:20:00Z",
"transaction_amount_usd": 11557.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 920.2,
"financial_exposure_usd": 1010.83,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107567",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-06T06:07:00Z",
"trace_id": "80ea3f3c-398e-4e81-b430-ab95ba06dbd3"
} | {
"account_age_days": 1081,
"account_id": "ACCT-1D32E19DE5F8",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_1",
"session_entropy": 0.842
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 121,
"timestamp": "2026-01-06T02:00:00Z",
"transaction_amount_usd": 13.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.723,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1637.96,
"financial_exposure_usd": 3140.17,
"recoverable_pct": 0.631
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103874",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "high",
"timestamp": "2026-01-03T16:34:00Z",
"trace_id": "a00d16a1-b0bd-fc99-d46e-43fb1a812421"
} | {
"account_age_days": 282,
"account_id": "ACCT-FE70BCD699E8",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.648
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 377,
"timestamp": "2026-01-03T16:34:00Z",
"transaction_amount_usd": 2220698.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2856218.5,
"financial_exposure_usd": 6400442.66,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106733",
"label": "benign",
"label_confidence": 0.621,
"severity": "low",
"timestamp": "2026-01-05T16:13:00Z",
"trace_id": "cf306f3f-8d75-edbe-ac39-eec9795f5977"
} | {
"account_age_days": 19,
"account_id": "ACCT-518BE8B14F56",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_2",
"session_entropy": 0.502
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1152,
"timestamp": "2026-01-05T16:13:00Z",
"transaction_amount_usd": 9560.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1149.6,
"financial_exposure_usd": 1877.65,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108323",
"label": "benign",
"label_confidence": 0.644,
"severity": "medium",
"timestamp": "2026-01-06T18:43:00Z",
"trace_id": "fd863f90-e23f-0678-3081-5f3b4a3919a8"
} | {
"account_age_days": 49,
"account_id": "ACCT-F9DEA7805700",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_2",
"session_entropy": 0.913
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1130,
"timestamp": "2026-01-06T18:43:00Z",
"transaction_amount_usd": 14396.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.727,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3809.5,
"financial_exposure_usd": 5635.23,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101152",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "medium",
"timestamp": "2026-01-01T19:12:00Z",
"trace_id": "e981bad2-9260-f03b-863a-6d6eda985fd9"
} | {
"account_age_days": 1707,
"account_id": "ACCT-5C9424853CBC",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_3",
"session_entropy": 0.516
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 186,
"timestamp": "2026-01-01T19:12:00Z",
"transaction_amount_usd": 56178.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 538693.22,
"financial_exposure_usd": 695832.56,
"recoverable_pct": 0.295
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109106",
"label": "benign",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-07T07:46:00Z",
"trace_id": "d3694123-1cbf-f953-487e-3c32b1012da8"
} | {
"account_age_days": 784,
"account_id": "ACCT-6B6977AA6AC4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.323
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 824,
"timestamp": "2026-01-07T07:46:00Z",
"transaction_amount_usd": 4363.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 325.39,
"financial_exposure_usd": 582.11,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103830",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-03T15:50:00Z",
"trace_id": "fb1c4a9d-9de4-3982-5dc5-2a152d636e9a"
} | {
"account_age_days": 1497,
"account_id": "ACCT-32C3AE35EAB5",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 912,
"timestamp": "2026-01-03T15:50:00Z",
"transaction_amount_usd": 2533058.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.739,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5948847.17,
"financial_exposure_usd": 6212074.12,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103223",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-03T05:43:00Z",
"trace_id": "9e2321da-6973-a479-c56d-5ab606094ab5"
} | {
"account_age_days": 1813,
"account_id": "ACCT-2AFBC9D3D299",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_2",
"session_entropy": 0.633
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 785,
"timestamp": "2026-01-03T05:43:00Z",
"transaction_amount_usd": 60936.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 189921.24,
"financial_exposure_usd": 436450.81,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106591",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-05T13:51:00Z",
"trace_id": "554de5e9-2c27-71cf-c738-e1a1d8b3286e"
} | {
"account_age_days": 1887,
"account_id": "ACCT-047D92649209",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_1",
"session_entropy": 0.688
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 968,
"timestamp": "2026-01-05T13:51:00Z",
"transaction_amount_usd": 1458802.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.904,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1503880.01,
"financial_exposure_usd": 2160447.64,
"recoverable_pct": 0.962
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107906",
"label": "benign",
"label_confidence": 0.496,
"severity": "low",
"timestamp": "2026-01-06T11:46:00Z",
"trace_id": "092b988a-d064-233d-ac1d-13a2f57dfdeb"
} | {
"account_age_days": 625,
"account_id": "ACCT-17F6CB61E3C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.243
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 121,
"timestamp": "2026-01-06T11:46:00Z",
"transaction_amount_usd": 5502.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1370.61,
"financial_exposure_usd": 1393.09,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107343",
"label": "benign",
"label_confidence": 0.577,
"severity": "critical",
"timestamp": "2026-01-06T02:23:00Z",
"trace_id": "a3804d4e-266a-9f92-a125-f1bbeaa7a0ef"
} | {
"account_age_days": 516,
"account_id": "ACCT-B3D53B1575AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.874
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1151,
"timestamp": "2026-01-06T02:23:00Z",
"transaction_amount_usd": 4961.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4224.65,
"financial_exposure_usd": 4951.53,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101372",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-01T22:52:00Z",
"trace_id": "eda474c1-9124-81b7-85aa-8711675472b8"
} | {
"account_age_days": 366,
"account_id": "ACCT-C7824938F33F",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_2",
"session_entropy": 0.237
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1174,
"timestamp": "2026-01-01T22:52:00Z",
"transaction_amount_usd": 17592.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.582,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 454279.37,
"financial_exposure_usd": 649854.94,
"recoverable_pct": 0.206
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101894",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-02T07:34:00Z",
"trace_id": "7b4120f7-6431-d3f1-5e95-aff6d5824b30"
} | {
"account_age_days": 1983,
"account_id": "ACCT-5D50FDC6D3E4",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_2",
"session_entropy": 0.558
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 471,
"timestamp": "2026-01-02T07:34:00Z",
"transaction_amount_usd": 73248.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 557169.67,
"financial_exposure_usd": 729733.58,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101116",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-01T18:36:00Z",
"trace_id": "98acbed2-6268-1cd4-b34e-e5f1f72bd01e"
} | {
"account_age_days": 331,
"account_id": "ACCT-DEFFA19AE586",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_1",
"session_entropy": 0.635
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 913,
"timestamp": "2026-01-01T18:36:00Z",
"transaction_amount_usd": 90654.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.611,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 408037.19,
"financial_exposure_usd": 557785.32,
"recoverable_pct": 0.294
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109528",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-07T14:48:00Z",
"trace_id": "2962757d-ca60-04c8-4625-95d55fd1753b"
} | {
"account_age_days": 117,
"account_id": "ACCT-9D3B69F704B2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.881
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 296,
"timestamp": "2026-01-07T05:33:00Z",
"transaction_amount_usd": 23.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2697.25,
"financial_exposure_usd": 3928.23,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102516",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "critical",
"timestamp": "2026-01-02T17:56:00Z",
"trace_id": "b7713b36-0fbc-ae05-c8dc-da5043ec170e"
} | {
"account_age_days": 1646,
"account_id": "ACCT-ADB6495A10E3",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.637
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 233,
"timestamp": "2026-01-02T17:56:00Z",
"transaction_amount_usd": 53415.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.371,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 641587.59,
"financial_exposure_usd": 671116.02,
"recoverable_pct": 0.274
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101516",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "medium",
"timestamp": "2026-01-02T01:16:00Z",
"trace_id": "f083d2f8-c563-c681-f270-a93d65af35fa"
} | {
"account_age_days": 372,
"account_id": "ACCT-1BAF795DE6BD",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_2",
"session_entropy": 0.338
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 333,
"timestamp": "2026-01-01T23:57:00Z",
"transaction_amount_usd": 20.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 192848.67,
"financial_exposure_usd": 386931.93,
"recoverable_pct": 0.055
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102336",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "medium",
"timestamp": "2026-01-02T14:56:00Z",
"trace_id": "6b5c3546-fa4c-9bcc-542f-ba241b1fb737"
} | {
"account_age_days": 12,
"account_id": "ACCT-B61CC1809AAD",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_2",
"session_entropy": 0.828
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 197,
"timestamp": "2026-01-02T14:56:00Z",
"transaction_amount_usd": 33306.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 523902.3,
"financial_exposure_usd": 524641.74,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109256",
"label": "benign",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-07T10:16:00Z",
"trace_id": "81dd6f3d-dbcd-4508-9743-419e15827212"
} | {
"account_age_days": 1122,
"account_id": "ACCT-74FBCBF43470",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.555
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 232,
"timestamp": "2026-01-07T10:16:00Z",
"transaction_amount_usd": 2690.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.702,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 853.5,
"financial_exposure_usd": 993.24,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105546",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "low",
"timestamp": "2026-01-04T20:26:00Z",
"trace_id": "7f2e8024-659c-a4bc-0f8e-03dd5c8bcc78"
} | {
"account_age_days": 1831,
"account_id": "ACCT-EF3285558146",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 669,
"timestamp": "2026-01-04T20:26:00Z",
"transaction_amount_usd": 251720.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2608499.45,
"financial_exposure_usd": 5134629.83,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105049",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "medium",
"timestamp": "2026-01-04T12:09:00Z",
"trace_id": "b32d3305-65b9-0f56-45b6-1b83471a2df2"
} | {
"account_age_days": 1984,
"account_id": "ACCT-0B604C294066",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_3",
"session_entropy": 0.7
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 144,
"timestamp": "2026-01-04T00:21:00Z",
"transaction_amount_usd": 2.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5030498.6,
"financial_exposure_usd": 5828867.5,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105538",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-04T20:18:00Z",
"trace_id": "64abc660-bcc9-5b7d-c0f6-bbf12a763dd2"
} | {
"account_age_days": 40,
"account_id": "ACCT-14BAC0117EA7",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 146,
"timestamp": "2026-01-04T20:18:00Z",
"transaction_amount_usd": 1046133.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.444,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6210321.93,
"financial_exposure_usd": 7103489.77,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107935",
"label": "benign",
"label_confidence": 0.533,
"severity": "medium",
"timestamp": "2026-01-06T12:15:00Z",
"trace_id": "2dfe9c61-e0fb-685b-3eb6-f37bfa3f6b38"
} | {
"account_age_days": 782,
"account_id": "ACCT-EF4507A44E85",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.158
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 649,
"timestamp": "2026-01-06T12:15:00Z",
"transaction_amount_usd": 12313.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3023.69,
"financial_exposure_usd": 3316.37,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108482",
"label": "benign",
"label_confidence": 0.594,
"severity": "critical",
"timestamp": "2026-01-06T21:22:00Z",
"trace_id": "021ce1d0-1401-601b-62a6-295f79769a7a"
} | {
"account_age_days": 1235,
"account_id": "ACCT-818982DE23B1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.388
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 992,
"timestamp": "2026-01-06T21:22:00Z",
"transaction_amount_usd": 9347.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 6299.35,
"financial_exposure_usd": 7086.1,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105257",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "critical",
"timestamp": "2026-01-04T15:37:00Z",
"trace_id": "43a21916-1cd5-46c7-f789-973743ebf0c2"
} | {
"account_age_days": 429,
"account_id": "ACCT-BFDA94D6FEC1",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 689,
"timestamp": "2026-01-04T15:37:00Z",
"transaction_amount_usd": 2540527.92
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 819645.84,
"financial_exposure_usd": 988243.26,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100893",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "critical",
"timestamp": "2026-01-01T14:53:00Z",
"trace_id": "39d160ef-fb62-4f1c-14b1-3cd3f7f73151"
} | {
"account_age_days": 433,
"account_id": "ACCT-85CAAA31AD32",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_3",
"session_entropy": 0.941
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 239,
"timestamp": "2026-01-01T03:37:00Z",
"transaction_amount_usd": 10.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.375,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 578812.7,
"financial_exposure_usd": 580312.03,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108683",
"label": "benign",
"label_confidence": 0.609,
"severity": "low",
"timestamp": "2026-01-07T00:43:00Z",
"trace_id": "d4c142d0-dcb5-d17b-b98e-b05625ceb9eb"
} | {
"account_age_days": 276,
"account_id": "ACCT-1D1B6C5BCE60",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_3",
"session_entropy": 0.808
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 372,
"timestamp": "2026-01-06T17:59:00Z",
"transaction_amount_usd": 23.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1085.23,
"financial_exposure_usd": 2657.86,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101112",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-01T18:32:00Z",
"trace_id": "bed83530-7d32-9c4d-ee6c-555cafd1cb53"
} | {
"account_age_days": 1766,
"account_id": "ACCT-D11784E109CD",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_3",
"session_entropy": 0.574
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1162,
"timestamp": "2026-01-01T18:32:00Z",
"transaction_amount_usd": 94951.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.414,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 633367.95,
"financial_exposure_usd": 1132386.9,
"recoverable_pct": 0.247
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106371",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "low",
"timestamp": "2026-01-05T10:11:00Z",
"trace_id": "3c66b271-b509-5b9b-2d68-0e8cbb2cc263"
} | {
"account_age_days": 149,
"account_id": "ACCT-303556591A7A",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 308,
"timestamp": "2026-01-05T10:11:00Z",
"transaction_amount_usd": 299640.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3103633.26,
"financial_exposure_usd": 3820700.26,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105015",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-04T11:35:00Z",
"trace_id": "b91614a1-7037-e8e9-9d39-64d7ced2f6f1"
} | {
"account_age_days": 369,
"account_id": "ACCT-85ECE53218D9",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.147
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 271,
"timestamp": "2026-01-04T06:16:00Z",
"transaction_amount_usd": 21.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.409,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2782992.11,
"financial_exposure_usd": 5335040.53,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109016",
"label": "benign",
"label_confidence": 0.584,
"severity": "low",
"timestamp": "2026-01-07T06:16:00Z",
"trace_id": "91124607-a1e1-1cbf-906e-078c82756d73"
} | {
"account_age_days": 313,
"account_id": "ACCT-75A34898A50C",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.644
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 395,
"timestamp": "2026-01-07T06:16:00Z",
"transaction_amount_usd": 4917.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1846.26,
"financial_exposure_usd": 4002.91,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104303",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-03T23:43:00Z",
"trace_id": "b158093e-63ea-4789-a5ee-ac921eec9e74"
} | {
"account_age_days": 140,
"account_id": "ACCT-944143167FBA",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.501
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 280,
"timestamp": "2026-01-03T23:43:00Z",
"transaction_amount_usd": 1535741.55
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.809,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101568",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "low",
"timestamp": "2026-01-02T02:08:00Z",
"trace_id": "ca1b7ff8-2cb8-844d-fdbe-ccd213b5a6eb"
} | {
"account_age_days": 544,
"account_id": "ACCT-66E89B24F827",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.232
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 144,
"timestamp": "2026-01-01T13:52:00Z",
"transaction_amount_usd": 19.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.82,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 526639.88,
"financial_exposure_usd": 558185.46,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107976",
"label": "benign",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-06T12:56:00Z",
"trace_id": "ab94f07d-9145-1de6-1df2-a3e555b6e540"
} | {
"account_age_days": 1282,
"account_id": "ACCT-D76E59FF981B",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 915,
"timestamp": "2026-01-06T12:56:00Z",
"transaction_amount_usd": 14881.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 949.34,
"financial_exposure_usd": 1220.7,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104229",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-03T22:29:00Z",
"trace_id": "6fc2f762-2886-679e-2db9-707aba2f88ef"
} | {
"account_age_days": 1319,
"account_id": "ACCT-8C75B01CAC3A",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_3",
"session_entropy": 0.841
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 332,
"timestamp": "2026-01-03T11:26:00Z",
"transaction_amount_usd": 15.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5565006.48,
"financial_exposure_usd": 7801166.5,
"recoverable_pct": 0.418
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101125",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-01T18:45:00Z",
"trace_id": "941079c7-d273-7c94-9be9-4e752ff91a3b"
} | {
"account_age_days": 197,
"account_id": "ACCT-F6A3DE078178",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.112
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 94,
"timestamp": "2026-01-01T18:45:00Z",
"transaction_amount_usd": 65918.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 891783.51,
"financial_exposure_usd": 1271776.31,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103693",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "low",
"timestamp": "2026-01-03T13:33:00Z",
"trace_id": "58a4c95b-bac5-3498-9ee5-03df804f8a60"
} | {
"account_age_days": 807,
"account_id": "ACCT-590FDDD416DA",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_3",
"session_entropy": 0.627
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 732,
"timestamp": "2026-01-03T13:33:00Z",
"transaction_amount_usd": 496459.26
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5102645.2,
"financial_exposure_usd": 5351276.41,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106251",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-05T08:11:00Z",
"trace_id": "41daec75-97db-f07c-0c9d-968a3ffa7e26"
} | {
"account_age_days": 762,
"account_id": "ACCT-B91403C69C7E",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_3",
"session_entropy": 0.917
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 820,
"timestamp": "2026-01-05T08:11:00Z",
"transaction_amount_usd": 1560850.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1899145.18,
"financial_exposure_usd": 1946171.72,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105047",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-04T12:07:00Z",
"trace_id": "9b8ecc68-189c-af22-c0b7-b5c1e81d08d6"
} | {
"account_age_days": 640,
"account_id": "ACCT-A6C4316EBFF7",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.121
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 165,
"timestamp": "2026-01-04T06:31:00Z",
"transaction_amount_usd": 6.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.607,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1905747.22,
"financial_exposure_usd": 4011627.08,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109527",
"label": "benign",
"label_confidence": 0.705,
"severity": "low",
"timestamp": "2026-01-07T14:47:00Z",
"trace_id": "522b9fa5-afe2-b2d1-5dae-f06c5159248d"
} | {
"account_age_days": 972,
"account_id": "ACCT-B3F380D7F378",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.374
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1109,
"timestamp": "2026-01-07T14:47:00Z",
"transaction_amount_usd": 3472.74
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2480.69,
"financial_exposure_usd": 3338.91,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109098",
"label": "benign",
"label_confidence": 0.503,
"severity": "low",
"timestamp": "2026-01-07T07:38:00Z",
"trace_id": "36b3a09c-c050-b636-d08d-0634681b1eb7"
} | {
"account_age_days": 1835,
"account_id": "ACCT-6C975E1E37AA",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_3",
"session_entropy": 0.464
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 924,
"timestamp": "2026-01-07T07:38:00Z",
"transaction_amount_usd": 14171.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 855.44,
"financial_exposure_usd": 1589.71,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103838",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-03T15:58:00Z",
"trace_id": "2730ae9a-c874-6fd0-870d-4c3eb99bad66"
} | {
"account_age_days": 900,
"account_id": "ACCT-6358067A64F7",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_3",
"session_entropy": 0.564
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1180,
"timestamp": "2026-01-03T15:58:00Z",
"transaction_amount_usd": 1376311.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.605,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4190075.1,
"financial_exposure_usd": 9443704.94,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108336",
"label": "benign",
"label_confidence": 0.672,
"severity": "low",
"timestamp": "2026-01-06T18:56:00Z",
"trace_id": "0fddda4c-011a-2a96-93ca-cbf85558c833"
} | {
"account_age_days": 437,
"account_id": "ACCT-16D68F8EA110",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.423
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 165,
"timestamp": "2026-01-06T06:35:00Z",
"transaction_amount_usd": 14.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1273.27,
"financial_exposure_usd": 2258.02,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106255",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-05T08:15:00Z",
"trace_id": "8928c96a-70a9-9a6a-7595-15dc7385edb0"
} | {
"account_age_days": 749,
"account_id": "ACCT-D43DAFF0269C",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 399,
"timestamp": "2026-01-05T08:15:00Z",
"transaction_amount_usd": 1809038.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.901,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2122912.96,
"financial_exposure_usd": 2474561.14,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101429",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "low",
"timestamp": "2026-01-01T23:49:00Z",
"trace_id": "d1d14b70-5c36-0ab8-c047-8d24467cac4f"
} | {
"account_age_days": 501,
"account_id": "ACCT-EC8C0E47FA33",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_2",
"session_entropy": 0.735
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 764,
"timestamp": "2026-01-01T23:49:00Z",
"transaction_amount_usd": 56365.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.836,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 516228.24,
"financial_exposure_usd": 617561.1,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105236",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-04T15:16:00Z",
"trace_id": "6b918cc7-32ad-acea-d629-cb5009bdf939"
} | {
"account_age_days": 460,
"account_id": "ACCT-10CA31D4877F",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 153,
"timestamp": "2026-01-04T15:16:00Z",
"transaction_amount_usd": 1430166.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.549,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5422348.77,
"financial_exposure_usd": 7804029.12,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109240",
"label": "benign",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-07T10:00:00Z",
"trace_id": "2e45f3f8-990d-9e17-7d2e-7eb1457a3a94"
} | {
"account_age_days": 941,
"account_id": "ACCT-352EB8B5E665",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.787
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1154,
"timestamp": "2026-01-07T10:00:00Z",
"transaction_amount_usd": 1287.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1989.85,
"financial_exposure_usd": 4830.48,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108752",
"label": "benign",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-07T01:52:00Z",
"trace_id": "b496fd9a-ae0c-1def-9a3c-eeff4f097071"
} | {
"account_age_days": 1448,
"account_id": "ACCT-3F7A7C0CDB86",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 790,
"timestamp": "2026-01-07T01:52:00Z",
"transaction_amount_usd": 3329.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 737.37,
"financial_exposure_usd": 1258.27,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100876",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-01T14:36:00Z",
"trace_id": "1dce6908-92ea-ef88-e06c-e2d2d01fc1db"
} | {
"account_age_days": 1717,
"account_id": "ACCT-6097C5127FA8",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.247
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 400,
"timestamp": "2026-01-01T14:36:00Z",
"transaction_amount_usd": 44526.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1308345.7,
"financial_exposure_usd": 1447568.99,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105602",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "medium",
"timestamp": "2026-01-04T21:22:00Z",
"trace_id": "a0427b24-8c6d-c3f1-ca38-77420dd86568"
} | {
"account_age_days": 304,
"account_id": "ACCT-1049B9FA796E",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 445,
"timestamp": "2026-01-04T21:22:00Z",
"transaction_amount_usd": 2506101.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 933520.06,
"financial_exposure_usd": 1721985.48,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100493",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-01T08:13:00Z",
"trace_id": "8d4379db-c640-6b52-cdef-eef209c39ca7"
} | {
"account_age_days": 1981,
"account_id": "ACCT-E819562B951B",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_3",
"session_entropy": 0.112
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 286,
"timestamp": "2026-01-01T03:18:00Z",
"transaction_amount_usd": 21.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.428,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 676480.81,
"financial_exposure_usd": 694261.59,
"recoverable_pct": 0.072
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107074",
"label": "benign",
"label_confidence": 0.517,
"severity": "medium",
"timestamp": "2026-01-05T21:54:00Z",
"trace_id": "2c80cdbf-97df-12b5-46e8-04a013be6af6"
} | {
"account_age_days": 1813,
"account_id": "ACCT-74AE0678DACD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 156,
"timestamp": "2026-01-05T21:54:00Z",
"transaction_amount_usd": 6350.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.55,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 584.14,
"financial_exposure_usd": 1361.76,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102236",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-02T13:16:00Z",
"trace_id": "cab90efd-35a8-7ce3-14f8-7c58190002d3"
} | {
"account_age_days": 78,
"account_id": "ACCT-8D4EE5CB73B5",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.583
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 283,
"timestamp": "2026-01-02T13:16:00Z",
"transaction_amount_usd": 82967.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 513715.18,
"financial_exposure_usd": 880051.35,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102157",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-02T11:57:00Z",
"trace_id": "50a4b16f-9bee-2d2f-e9ac-97320d4f1a35"
} | {
"account_age_days": 1557,
"account_id": "ACCT-9E678D25EF2B",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_1",
"session_entropy": 0.317
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1152,
"timestamp": "2026-01-02T11:57:00Z",
"transaction_amount_usd": 91656.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 460997.05,
"financial_exposure_usd": 662254.54,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105227",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-04T15:07:00Z",
"trace_id": "c9bd0edd-6ed4-fee6-f0de-8e0f96cf6eee"
} | {
"account_age_days": 597,
"account_id": "ACCT-79E8434054BE",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 447,
"timestamp": "2026-01-04T15:07:00Z",
"transaction_amount_usd": 2985845.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6141899.13,
"financial_exposure_usd": 6217505.3,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105759",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-04T23:59:00Z",
"trace_id": "40a63960-c9fc-d39f-430d-a434154698fc"
} | {
"account_age_days": 180,
"account_id": "ACCT-DA987DDB8CFE",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_1",
"session_entropy": 0.493
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 804,
"timestamp": "2026-01-04T23:59:00Z",
"transaction_amount_usd": 1592152.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2394704.73,
"financial_exposure_usd": 2765461.34,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109564",
"label": "benign",
"label_confidence": 0.479,
"severity": "low",
"timestamp": "2026-01-07T15:24:00Z",
"trace_id": "a97ad590-4798-a170-e116-a4b93f94e743"
} | {
"account_age_days": 429,
"account_id": "ACCT-8E2A247555C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 132,
"timestamp": "2026-01-07T15:24:00Z",
"transaction_amount_usd": 8182.9
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1489.97,
"financial_exposure_usd": 3387.99,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103882",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-03T16:42:00Z",
"trace_id": "753233a9-c452-b9a6-59e9-2237f293d5b1"
} | {
"account_age_days": 1933,
"account_id": "ACCT-44D37D1ECB2C",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_2",
"session_entropy": 0.842
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 178,
"timestamp": "2026-01-03T16:42:00Z",
"transaction_amount_usd": 424362.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.924,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3982563.53,
"financial_exposure_usd": 4082551.02,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105039",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-04T11:59:00Z",
"trace_id": "be16a251-1a2a-3974-888a-5d3c0f04f462"
} | {
"account_age_days": 1034,
"account_id": "ACCT-48D33E1456DA",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.865
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 890,
"timestamp": "2026-01-04T11:59:00Z",
"transaction_amount_usd": 305472.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.565,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6446824.03,
"financial_exposure_usd": 7446532.34,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106450",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-05T11:30:00Z",
"trace_id": "93b0715e-de97-81f0-eb11-fe6aabd9a325"
} | {
"account_age_days": 324,
"account_id": "ACCT-7D7FD348D5F6",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.32
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 136,
"timestamp": "2026-01-04T23:52:00Z",
"transaction_amount_usd": 8.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 163799.46,
"financial_exposure_usd": 189725.09,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106079",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-05T05:19:00Z",
"trace_id": "0076e599-9ae2-c24a-9a20-93be265b4349"
} | {
"account_age_days": 1701,
"account_id": "ACCT-1478F51EB02A",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.847
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 218,
"timestamp": "2026-01-04T17:14:00Z",
"transaction_amount_usd": 1.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.686,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1632433.97,
"financial_exposure_usd": 2146267.94,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102871",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "critical",
"timestamp": "2026-01-02T23:51:00Z",
"trace_id": "dd72833d-23d8-f08d-6d1d-48de7bf4f24d"
} | {
"account_age_days": 481,
"account_id": "ACCT-5BE3AB4BCAEB",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.873
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1046,
"timestamp": "2026-01-02T23:51:00Z",
"transaction_amount_usd": 71932.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.807,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 316223.97,
"financial_exposure_usd": 552126.7,
"recoverable_pct": 0.046
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102459",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-02T16:59:00Z",
"trace_id": "44b53138-2865-6fe8-8583-f3089e413869"
} | {
"account_age_days": 608,
"account_id": "ACCT-4495C41E4682",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_3",
"session_entropy": 0.667
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 129,
"timestamp": "2026-01-02T05:54:00Z",
"transaction_amount_usd": 0.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 200285.26,
"financial_exposure_usd": 454069.78,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102155",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "high",
"timestamp": "2026-01-02T11:55:00Z",
"trace_id": "97fdbcc3-0f1a-38bc-87b8-54732ebee8cb"
} | {
"account_age_days": 354,
"account_id": "ACCT-82165A4C9EE6",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1187,
"timestamp": "2026-01-02T11:55:00Z",
"transaction_amount_usd": 92629.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.59,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 816544.28,
"financial_exposure_usd": 862905.57,
"recoverable_pct": 0.311
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108727",
"label": "benign",
"label_confidence": 0.45,
"severity": "low",
"timestamp": "2026-01-07T01:27:00Z",
"trace_id": "33cb5d8f-b77e-c024-1499-95dd4803187e"
} | {
"account_age_days": 1724,
"account_id": "ACCT-BAEE03852D12",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_3",
"session_entropy": 0.315
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1048,
"timestamp": "2026-01-07T01:27:00Z",
"transaction_amount_usd": 406.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108225",
"label": "benign",
"label_confidence": 0.557,
"severity": "high",
"timestamp": "2026-01-06T17:05:00Z",
"trace_id": "0ca779f6-135a-9f68-b064-733077d7b27c"
} | {
"account_age_days": 447,
"account_id": "ACCT-313DAEE9B75F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1148,
"timestamp": "2026-01-06T17:05:00Z",
"transaction_amount_usd": 6338.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2419.71,
"financial_exposure_usd": 4324.41,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101547",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-02T01:47:00Z",
"trace_id": "c1fb768f-e900-f47d-1ec4-066ad70ba58a"
} | {
"account_age_days": 678,
"account_id": "ACCT-AA5CE9D0E783",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_2",
"session_entropy": 0.802
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 253,
"timestamp": "2026-01-01T14:23:00Z",
"transaction_amount_usd": 14.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.728,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 489177.25,
"financial_exposure_usd": 516781.3,
"recoverable_pct": 0.224
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104780",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-04T07:40:00Z",
"trace_id": "25a618e4-2de0-b75c-0e9c-334336167ef5"
} | {
"account_age_days": 67,
"account_id": "ACCT-C7C4EF25808E",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.711
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 998,
"timestamp": "2026-01-04T07:40:00Z",
"transaction_amount_usd": 638654.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2508126.54,
"financial_exposure_usd": 5097060.7,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108501",
"label": "benign",
"label_confidence": 0.454,
"severity": "medium",
"timestamp": "2026-01-06T21:41:00Z",
"trace_id": "874f1bf3-c857-11f2-6c45-d40de44491ab"
} | {
"account_age_days": 432,
"account_id": "ACCT-C1C474F67479",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 821,
"timestamp": "2026-01-06T21:41:00Z",
"transaction_amount_usd": 8581.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5288.77,
"financial_exposure_usd": 5301.28,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103773",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "critical",
"timestamp": "2026-01-03T14:53:00Z",
"trace_id": "af4600b3-4717-e428-53ba-2e65024999e1"
} | {
"account_age_days": 612,
"account_id": "ACCT-B72BD98FE60E",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_3",
"session_entropy": 0.607
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 351,
"timestamp": "2026-01-03T12:25:00Z",
"transaction_amount_usd": 4.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.778,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3827851.33,
"financial_exposure_usd": 6714678.95,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109000",
"label": "benign",
"label_confidence": 0.642,
"severity": "medium",
"timestamp": "2026-01-07T06:00:00Z",
"trace_id": "058c1d4c-407d-e1c5-9115-47b9a7cd76dc"
} | {
"account_age_days": 757,
"account_id": "ACCT-7AC3E47F0F03",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1189,
"timestamp": "2026-01-07T06:00:00Z",
"transaction_amount_usd": 7842.07
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 831.96,
"financial_exposure_usd": 1012.07,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108994",
"label": "benign",
"label_confidence": 0.499,
"severity": "medium",
"timestamp": "2026-01-07T05:54:00Z",
"trace_id": "d6e41973-f5c7-74ea-6144-223894fdb49d"
} | {
"account_age_days": 852,
"account_id": "ACCT-B83307D4F3F3",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.32
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 88,
"timestamp": "2026-01-07T05:54:00Z",
"transaction_amount_usd": 14645
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 638.8,
"financial_exposure_usd": 712.57,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100206",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-01T03:26:00Z",
"trace_id": "efe739dd-6260-dcbe-a8de-eb1c281ec259"
} | {
"account_age_days": 1134,
"account_id": "ACCT-68E0C8009E48",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 432,
"timestamp": "2026-01-01T03:26:00Z",
"transaction_amount_usd": 113212.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.77,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 813568.54,
"financial_exposure_usd": 999496.69,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105597",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-04T21:17:00Z",
"trace_id": "0c6c6039-8b6d-c1b1-61ee-0f8946614740"
} | {
"account_age_days": 731,
"account_id": "ACCT-A719CC5184E8",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_1",
"session_entropy": 0.412
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 458,
"timestamp": "2026-01-04T21:17:00Z",
"transaction_amount_usd": 2342786.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1249646.09,
"financial_exposure_usd": 2420470.7,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.