schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103977",
"label": "fraudulent",
"label_confidence": 0.735,
"severity": "medium",
"timestamp": "2026-01-03T18:17:00Z",
"trace_id": "374ad4f0-3693-eaf9-eea8-607d14363e35"
} | {
"account_age_days": 960,
"account_id": "ACCT-A5C63986B22C",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.929
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 233,
"timestamp": "2026-01-03T18:17:00Z",
"transaction_amount_usd": 1936568.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.864,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2525972.22,
"financial_exposure_usd": 4742123.85,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108540",
"label": "benign",
"label_confidence": 0.576,
"severity": "medium",
"timestamp": "2026-01-06T22:20:00Z",
"trace_id": "97bc6a29-6ab7-5190-b1d0-7e828d42b490"
} | {
"account_age_days": 1035,
"account_id": "ACCT-DAE6BF094E79",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.51
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 920,
"timestamp": "2026-01-06T22:20:00Z",
"transaction_amount_usd": 1955.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1358.66,
"financial_exposure_usd": 2976.83,
"recoverable_pct": 0.67
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100083",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "high",
"timestamp": "2026-01-01T01:23:00Z",
"trace_id": "e0864418-7f3e-f59b-1638-613769f35b2d"
} | {
"account_age_days": 1965,
"account_id": "ACCT-460D113D2851",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_3",
"session_entropy": 0.197
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 309,
"timestamp": "2026-01-01T01:23:00Z",
"transaction_amount_usd": 99620.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 638811.75,
"financial_exposure_usd": 880491.5,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100907",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "low",
"timestamp": "2026-01-01T15:07:00Z",
"trace_id": "3276df06-337b-9b20-87a9-4f0fcffd6588"
} | {
"account_age_days": 1586,
"account_id": "ACCT-B3460B86B05D",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 282,
"timestamp": "2026-01-01T04:14:00Z",
"transaction_amount_usd": 17.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.657,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 300531.14,
"financial_exposure_usd": 547472.98,
"recoverable_pct": 0.272
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105150",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-04T13:50:00Z",
"trace_id": "82808a24-6986-5941-b6c2-194ec8b54c96"
} | {
"account_age_days": 148,
"account_id": "ACCT-26AAA9D80CC0",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 235,
"timestamp": "2026-01-04T07:06:00Z",
"transaction_amount_usd": 12.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5386235.46,
"financial_exposure_usd": 5497535.38,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103867",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-03T16:27:00Z",
"trace_id": "602ff1c8-e1f6-6a5c-1d19-d1e4002877c3"
} | {
"account_age_days": 1256,
"account_id": "ACCT-01247A1E7E3F",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_1",
"session_entropy": 0.449
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 783,
"timestamp": "2026-01-03T16:27:00Z",
"transaction_amount_usd": 2340520.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.552,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4218201.78,
"financial_exposure_usd": 6062851.96,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101044",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "critical",
"timestamp": "2026-01-01T17:24:00Z",
"trace_id": "1e892458-49c6-8405-fb5e-dae9b83340a6"
} | {
"account_age_days": 322,
"account_id": "ACCT-9FC063B5EDA2",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_2",
"session_entropy": 0.689
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 748,
"timestamp": "2026-01-01T17:24:00Z",
"transaction_amount_usd": 50032.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 381676.69,
"financial_exposure_usd": 388768.37,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106881",
"label": "benign",
"label_confidence": 0.646,
"severity": "low",
"timestamp": "2026-01-05T18:41:00Z",
"trace_id": "50da4752-59dc-597a-1af9-29d274bb9048"
} | {
"account_age_days": 1966,
"account_id": "ACCT-29C230BBB1FD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 369,
"timestamp": "2026-01-05T07:43:00Z",
"transaction_amount_usd": 10.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1654.67,
"financial_exposure_usd": 1790.19,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107823",
"label": "benign",
"label_confidence": 0.532,
"severity": "medium",
"timestamp": "2026-01-06T10:23:00Z",
"trace_id": "a43de444-17f5-2fb4-415d-024e42327637"
} | {
"account_age_days": 739,
"account_id": "ACCT-BA60458415E0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.811
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 113,
"timestamp": "2026-01-06T00:28:00Z",
"transaction_amount_usd": 20.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 582.87,
"financial_exposure_usd": 921.64,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103584",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "low",
"timestamp": "2026-01-03T11:44:00Z",
"trace_id": "6a87a7fe-e0c0-ab6f-c0d8-bed6d4c0ba59"
} | {
"account_age_days": 1651,
"account_id": "ACCT-95FC506F1B17",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 301,
"timestamp": "2026-01-03T10:19:00Z",
"transaction_amount_usd": 20.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3834369.61,
"financial_exposure_usd": 4458418.78,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107984",
"label": "benign",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-06T13:04:00Z",
"trace_id": "dcce147f-ab5d-b5a9-e98e-14896d34bd77"
} | {
"account_age_days": 643,
"account_id": "ACCT-EA201C1A96A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1074,
"timestamp": "2026-01-06T13:04:00Z",
"transaction_amount_usd": 9012.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 493.19,
"financial_exposure_usd": 1138.85,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100502",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-01T08:22:00Z",
"trace_id": "9e395822-71a5-7d0b-ae99-21dbea3dcbd2"
} | {
"account_age_days": 727,
"account_id": "ACCT-BE9CE5A4714F",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.167
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 237,
"timestamp": "2026-01-01T04:21:00Z",
"transaction_amount_usd": 2.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 824069.11,
"financial_exposure_usd": 872700.67,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109892",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-07T20:52:00Z",
"trace_id": "2d02cc77-161e-0570-e70f-fe94cdca57b7"
} | {
"account_age_days": 1861,
"account_id": "ACCT-FE4D244195D9",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.836
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1134,
"timestamp": "2026-01-07T20:52:00Z",
"transaction_amount_usd": 2258.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3011.14,
"financial_exposure_usd": 6363.27,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105112",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "low",
"timestamp": "2026-01-04T13:12:00Z",
"trace_id": "e70ee066-4645-cf1a-ece4-7b1381643c5c"
} | {
"account_age_days": 276,
"account_id": "ACCT-3BBE1FBBAF4D",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.694
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 159,
"timestamp": "2026-01-04T13:12:00Z",
"transaction_amount_usd": 733122.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1061152.95,
"financial_exposure_usd": 1746070.79,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107474",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-06T04:34:00Z",
"trace_id": "b6c4155c-3d27-fe29-0688-52b5eff8ab04"
} | {
"account_age_days": 495,
"account_id": "ACCT-719992D60E37",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.349
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 544,
"timestamp": "2026-01-06T04:34:00Z",
"transaction_amount_usd": 14216.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.512,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4459.08,
"financial_exposure_usd": 6179.85,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105601",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-04T21:21:00Z",
"trace_id": "4778784b-5fb7-4a94-1c46-ced6c8b7ea15"
} | {
"account_age_days": 826,
"account_id": "ACCT-4A3FD4517B62",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_1",
"session_entropy": 0.668
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 376,
"timestamp": "2026-01-04T21:21:00Z",
"transaction_amount_usd": 2862641.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.539,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6671265.73,
"financial_exposure_usd": 8565437.85,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102083",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-02T10:43:00Z",
"trace_id": "74e1e9ac-e1ba-2c58-fdd7-a806daeb5412"
} | {
"account_age_days": 526,
"account_id": "ACCT-36D9A61C0976",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.264
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1113,
"timestamp": "2026-01-02T10:43:00Z",
"transaction_amount_usd": 4475.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.813,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 527275.01,
"financial_exposure_usd": 798534.06,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103869",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-03T16:29:00Z",
"trace_id": "6f63677d-f2f9-d76b-0d5d-ac2f3b702e02"
} | {
"account_age_days": 106,
"account_id": "ACCT-BC36A7CB592B",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.601
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 358,
"timestamp": "2026-01-03T16:29:00Z",
"transaction_amount_usd": 1115057.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.731,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1524919.86,
"financial_exposure_usd": 3095900.4,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103853",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "medium",
"timestamp": "2026-01-03T16:13:00Z",
"trace_id": "b6b2774d-048a-4c57-dd9d-ab348a79cf85"
} | {
"account_age_days": 235,
"account_id": "ACCT-9ABFC3F0633A",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.645
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 309,
"timestamp": "2026-01-03T14:36:00Z",
"transaction_amount_usd": 13.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1897949.44,
"financial_exposure_usd": 3044720.68,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109487",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-07T14:07:00Z",
"trace_id": "21c9175e-dc25-46a9-4ba6-aba1cc57ea51"
} | {
"account_age_days": 1225,
"account_id": "ACCT-D11BC6610ABA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.699
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 207,
"timestamp": "2026-01-07T03:51:00Z",
"transaction_amount_usd": 1.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1690.75,
"financial_exposure_usd": 1835.81,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109966",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-07T22:06:00Z",
"trace_id": "0cab4dcb-9f46-ad2d-e850-94f58b7dc115"
} | {
"account_age_days": 1355,
"account_id": "ACCT-D6F92DD652C1",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.34
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 237,
"timestamp": "2026-01-07T22:06:00Z",
"transaction_amount_usd": 13388.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4002.2,
"financial_exposure_usd": 4072.74,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100245",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-01T04:05:00Z",
"trace_id": "0144fe67-8df5-b9a0-e577-e1b64dd35982"
} | {
"account_age_days": 1625,
"account_id": "ACCT-4F418193E328",
"baseline_risk_score": 0.476,
"kyc_tier": "tier_1",
"session_entropy": 0.584
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1162,
"timestamp": "2026-01-01T04:05:00Z",
"transaction_amount_usd": 93739.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.884,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 253330.98,
"financial_exposure_usd": 495781.77,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108696",
"label": "benign",
"label_confidence": 0.568,
"severity": "high",
"timestamp": "2026-01-07T00:56:00Z",
"trace_id": "bb45940b-3317-1a31-c0af-cba8ec7710c8"
} | {
"account_age_days": 1236,
"account_id": "ACCT-EFC3499D1477",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_3",
"session_entropy": 0.623
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 587,
"timestamp": "2026-01-07T00:56:00Z",
"transaction_amount_usd": 13149.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3376.41,
"financial_exposure_usd": 3787.38,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105298",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "critical",
"timestamp": "2026-01-04T16:18:00Z",
"trace_id": "e85fe8eb-d24d-c433-d0b4-3271c1a8be05"
} | {
"account_age_days": 1082,
"account_id": "ACCT-EBF702A2AB11",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_3",
"session_entropy": 0.69
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 387,
"timestamp": "2026-01-04T04:10:00Z",
"transaction_amount_usd": 24.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.504,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2982680.28,
"financial_exposure_usd": 4190844.91,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107502",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-06T05:02:00Z",
"trace_id": "6a0bcea8-0074-213b-01be-6441043ea1fd"
} | {
"account_age_days": 1221,
"account_id": "ACCT-56DEA551E818",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_2",
"session_entropy": 0.304
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1061,
"timestamp": "2026-01-06T05:02:00Z",
"transaction_amount_usd": 13864.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.616,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2649.89,
"financial_exposure_usd": 3158.63,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106135",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "medium",
"timestamp": "2026-01-05T06:15:00Z",
"trace_id": "ba52dd75-cbd3-9254-3e2d-6b41663f318d"
} | {
"account_age_days": 844,
"account_id": "ACCT-24170E659BB6",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_1",
"session_entropy": 0.742
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 416,
"timestamp": "2026-01-05T06:15:00Z",
"transaction_amount_usd": 2985107.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.538,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1540036.65,
"financial_exposure_usd": 2922204.86,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103629",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "low",
"timestamp": "2026-01-03T12:29:00Z",
"trace_id": "a9a7fc56-ae96-117b-ac3b-05cc77d36996"
} | {
"account_age_days": 1619,
"account_id": "ACCT-232FBCED556C",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_1",
"session_entropy": 0.637
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1184,
"timestamp": "2026-01-03T12:29:00Z",
"transaction_amount_usd": 1226204.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5120374.58,
"financial_exposure_usd": 7078289.52,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100972",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-01T16:12:00Z",
"trace_id": "f3829aea-a8b3-a9b7-7c69-085173b07ee7"
} | {
"account_age_days": 1600,
"account_id": "ACCT-1B4F6ACCF28A",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_1",
"session_entropy": 0.332
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 445,
"timestamp": "2026-01-01T16:12:00Z",
"transaction_amount_usd": 4825.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.673,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 906397.35,
"financial_exposure_usd": 971979.26,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104853",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "high",
"timestamp": "2026-01-04T08:53:00Z",
"trace_id": "67149aa7-e073-2e5b-ae5c-625e4e967c19"
} | {
"account_age_days": 1567,
"account_id": "ACCT-B0159B2164D6",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_1",
"session_entropy": 0.574
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1111,
"timestamp": "2026-01-04T08:53:00Z",
"transaction_amount_usd": 2143161.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.481,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6666786.45,
"financial_exposure_usd": 7423461.01,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106050",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "high",
"timestamp": "2026-01-05T04:50:00Z",
"trace_id": "15ab5fea-c8da-aad9-2e78-6301ead38359"
} | {
"account_age_days": 1605,
"account_id": "ACCT-4D8C3B03A9CF",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.786
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 232,
"timestamp": "2026-01-05T02:41:00Z",
"transaction_amount_usd": 22.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.499,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1432100.44,
"financial_exposure_usd": 1887341.54,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104566",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "critical",
"timestamp": "2026-01-04T04:06:00Z",
"trace_id": "9e9fe078-059c-619f-490e-9f6808ad4c27"
} | {
"account_age_days": 719,
"account_id": "ACCT-5A4650A7FC3E",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_1",
"session_entropy": 0.721
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 628,
"timestamp": "2026-01-04T04:06:00Z",
"transaction_amount_usd": 1244415.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.621,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3473547.81,
"financial_exposure_usd": 4742823.54,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109019",
"label": "benign",
"label_confidence": 0.571,
"severity": "high",
"timestamp": "2026-01-07T06:19:00Z",
"trace_id": "ad2c325a-cb60-1102-38d1-943b315cae71"
} | {
"account_age_days": 593,
"account_id": "ACCT-F1A0580EECF3",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_3",
"session_entropy": 0.89
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 165,
"timestamp": "2026-01-07T06:19:00Z",
"transaction_amount_usd": 14830.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1179.66,
"financial_exposure_usd": 1895.87,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106437",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "high",
"timestamp": "2026-01-05T11:17:00Z",
"trace_id": "279b6b10-7aa3-85b4-dfd8-e2726f08782f"
} | {
"account_age_days": 1949,
"account_id": "ACCT-FE192A8DDF7D",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_1",
"session_entropy": 0.715
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 280,
"timestamp": "2026-01-05T11:17:00Z",
"transaction_amount_usd": 686179.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.633,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3901563.36,
"financial_exposure_usd": 6323489.78,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100674",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "critical",
"timestamp": "2026-01-01T11:14:00Z",
"trace_id": "5393325a-0a50-7374-fd00-bfe2aab1da7e"
} | {
"account_age_days": 947,
"account_id": "ACCT-BD8DE7001BD0",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 623,
"timestamp": "2026-01-01T11:14:00Z",
"transaction_amount_usd": 38876.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.365,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 316413.73,
"financial_exposure_usd": 571966.67,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104912",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-04T09:52:00Z",
"trace_id": "7bf13dc4-e7be-20b3-89a0-59a4672ad5df"
} | {
"account_age_days": 1939,
"account_id": "ACCT-7F1609FAC4B3",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_3",
"session_entropy": 0.673
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 973,
"timestamp": "2026-01-04T09:52:00Z",
"transaction_amount_usd": 1404325.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.449,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3551648.6,
"financial_exposure_usd": 5602652.8,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108953",
"label": "benign",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-07T05:13:00Z",
"trace_id": "4d73f742-f5e1-5c5d-ec88-12aeadde11fe"
} | {
"account_age_days": 1450,
"account_id": "ACCT-348F234C52B1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.242
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 125,
"timestamp": "2026-01-07T05:13:00Z",
"transaction_amount_usd": 14302.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3359.87,
"financial_exposure_usd": 4555.43,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101270",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-01T21:10:00Z",
"trace_id": "92aeec42-187c-8917-d49c-d549ef58701d"
} | {
"account_age_days": 274,
"account_id": "ACCT-F4CC2CBFB2A1",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.203
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 135,
"timestamp": "2026-01-01T09:38:00Z",
"transaction_amount_usd": 24.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 769212.45,
"financial_exposure_usd": 937944.98,
"recoverable_pct": 0.272
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102934",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-03T00:54:00Z",
"trace_id": "174f1438-c7aa-e3ac-c6ae-0c9830bba6cf"
} | {
"account_age_days": 181,
"account_id": "ACCT-314CB979D2F8",
"baseline_risk_score": 0.523,
"kyc_tier": "tier_3",
"session_entropy": 0.282
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 110,
"timestamp": "2026-01-03T00:54:00Z",
"transaction_amount_usd": 49857.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.756,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 433799.03,
"financial_exposure_usd": 466856.45,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106857",
"label": "benign",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-05T18:17:00Z",
"trace_id": "3e6fc87b-27a9-2071-38d7-207bff09bc01"
} | {
"account_age_days": 1872,
"account_id": "ACCT-4ED837A675EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.667
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 790,
"timestamp": "2026-01-05T18:17:00Z",
"transaction_amount_usd": 13098.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5004.49,
"financial_exposure_usd": 5690.55,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104966",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-04T10:46:00Z",
"trace_id": "0b64d39b-98d1-c422-14f6-b9e2b5ab6257"
} | {
"account_age_days": 800,
"account_id": "ACCT-60B942534B04",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.252
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 204,
"timestamp": "2026-01-04T07:12:00Z",
"transaction_amount_usd": 10.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.772,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3939587.35,
"financial_exposure_usd": 7401321.27,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100202",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-01T03:22:00Z",
"trace_id": "32b2d952-c376-37d6-72a9-dfa122ae8888"
} | {
"account_age_days": 1895,
"account_id": "ACCT-E67B6AD334BE",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.686
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1086,
"timestamp": "2026-01-01T03:22:00Z",
"transaction_amount_usd": 51445.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.893,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1078805.47,
"financial_exposure_usd": 1088997.2,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104876",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "low",
"timestamp": "2026-01-04T09:16:00Z",
"trace_id": "edcef50b-5166-0ff9-ee48-290c95151edd"
} | {
"account_age_days": 1248,
"account_id": "ACCT-3E40189B7547",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_2",
"session_entropy": 0.497
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 742,
"timestamp": "2026-01-04T09:16:00Z",
"transaction_amount_usd": 2284743.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.757,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3120217.25,
"financial_exposure_usd": 3138449.97,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100750",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "critical",
"timestamp": "2026-01-01T12:30:00Z",
"trace_id": "d9d0033a-9f17-eeb8-1934-850ae8fff869"
} | {
"account_age_days": 1498,
"account_id": "ACCT-E4417BDE8B45",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_2",
"session_entropy": 0.361
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 132,
"timestamp": "2026-01-01T07:23:00Z",
"transaction_amount_usd": 5.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.39,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 275244.72,
"financial_exposure_usd": 524969.7,
"recoverable_pct": 0.247
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104852",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "medium",
"timestamp": "2026-01-04T08:52:00Z",
"trace_id": "81de33a4-50f4-3688-e58a-b1f1f3e78a1c"
} | {
"account_age_days": 1229,
"account_id": "ACCT-2FBEFBC6163F",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.166
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1088,
"timestamp": "2026-01-04T08:52:00Z",
"transaction_amount_usd": 1865864.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5332293.3,
"financial_exposure_usd": 6351803.69,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108288",
"label": "benign",
"label_confidence": 0.711,
"severity": "critical",
"timestamp": "2026-01-06T18:08:00Z",
"trace_id": "c1cd47ff-f0fb-089e-5f7b-ea15e8cfcb42"
} | {
"account_age_days": 487,
"account_id": "ACCT-CEEA50713248",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 473,
"timestamp": "2026-01-06T18:08:00Z",
"transaction_amount_usd": 2739.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1175.17,
"financial_exposure_usd": 1899.66,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106878",
"label": "benign",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-05T18:38:00Z",
"trace_id": "9be53807-d091-990f-b7dd-7761924a0172"
} | {
"account_age_days": 622,
"account_id": "ACCT-DFB4F9DB3B62",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_3",
"session_entropy": 0.255
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 88,
"timestamp": "2026-01-05T14:58:00Z",
"transaction_amount_usd": 23.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.727,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3604.4,
"financial_exposure_usd": 6595.31,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108311",
"label": "benign",
"label_confidence": 0.69,
"severity": "low",
"timestamp": "2026-01-06T18:31:00Z",
"trace_id": "ea1da729-c453-40ba-fa86-60437f4d127c"
} | {
"account_age_days": 1759,
"account_id": "ACCT-24280E5FE5F3",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1113,
"timestamp": "2026-01-06T18:31:00Z",
"transaction_amount_usd": 9300.47
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1236.9,
"financial_exposure_usd": 2546.25,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108654",
"label": "benign",
"label_confidence": 0.622,
"severity": "high",
"timestamp": "2026-01-07T00:14:00Z",
"trace_id": "563aa269-0590-6bfd-cf57-893b9eb357e9"
} | {
"account_age_days": 1784,
"account_id": "ACCT-A27961005F6A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.21
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 840,
"timestamp": "2026-01-07T00:14:00Z",
"transaction_amount_usd": 5058.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1092.36,
"financial_exposure_usd": 2699.02,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104774",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-04T07:34:00Z",
"trace_id": "c828ec75-4d23-be83-5312-6be7562db64b"
} | {
"account_age_days": 1645,
"account_id": "ACCT-554EB7EFBEE0",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.337
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 302,
"timestamp": "2026-01-03T20:04:00Z",
"transaction_amount_usd": 1.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.76,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2098299.53,
"financial_exposure_usd": 3806414.15,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105547",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "medium",
"timestamp": "2026-01-04T20:27:00Z",
"trace_id": "3b417c45-115e-06c2-67c8-5e16fdb41273"
} | {
"account_age_days": 986,
"account_id": "ACCT-6D0535724D11",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.875
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 323,
"timestamp": "2026-01-04T20:27:00Z",
"transaction_amount_usd": 183185.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5563207.54,
"financial_exposure_usd": 5840955.01,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100425",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "critical",
"timestamp": "2026-01-01T07:05:00Z",
"trace_id": "1b41a626-d1fd-6684-586c-8656cd043537"
} | {
"account_age_days": 1926,
"account_id": "ACCT-85E9394EC37A",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_3",
"session_entropy": 0.432
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 714,
"timestamp": "2026-01-01T07:05:00Z",
"transaction_amount_usd": 9392.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 439798.82,
"financial_exposure_usd": 547468.67,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107166",
"label": "benign",
"label_confidence": 0.597,
"severity": "medium",
"timestamp": "2026-01-05T23:26:00Z",
"trace_id": "bc7ea63a-5eab-5c0b-b15f-58240a7aef39"
} | {
"account_age_days": 1160,
"account_id": "ACCT-7630695EBBA2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.296
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 562,
"timestamp": "2026-01-05T23:26:00Z",
"transaction_amount_usd": 499.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1078.28,
"financial_exposure_usd": 1758.66,
"recoverable_pct": 0.631
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106605",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-05T14:05:00Z",
"trace_id": "7d55effc-0e1d-2659-b244-7428ae3c02b2"
} | {
"account_age_days": 673,
"account_id": "ACCT-E9A4CB676A7C",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.829
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 912,
"timestamp": "2026-01-05T14:05:00Z",
"transaction_amount_usd": 2243528.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.391,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2812237.61,
"financial_exposure_usd": 6525328.87,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109790",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-07T19:10:00Z",
"trace_id": "ccf1b6e4-1739-7a21-9daa-1c611d9812f8"
} | {
"account_age_days": 983,
"account_id": "ACCT-06491DE46CB9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.181
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 774,
"timestamp": "2026-01-07T19:10:00Z",
"transaction_amount_usd": 4962.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 280.88,
"financial_exposure_usd": 327.42,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109291",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-07T10:51:00Z",
"trace_id": "5b921eec-65a0-d4e9-12ca-c82775038255"
} | {
"account_age_days": 809,
"account_id": "ACCT-83C750B9E8DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 341,
"timestamp": "2026-01-07T10:51:00Z",
"transaction_amount_usd": 13128.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 679.12,
"financial_exposure_usd": 1446.32,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105534",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-04T20:14:00Z",
"trace_id": "d0a8d937-1129-daca-6604-6604713cdc17"
} | {
"account_age_days": 1134,
"account_id": "ACCT-B3F56952EB65",
"baseline_risk_score": 0.221,
"kyc_tier": "tier_2",
"session_entropy": 0.847
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 917,
"timestamp": "2026-01-04T20:14:00Z",
"transaction_amount_usd": 1406441.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3402639.79,
"financial_exposure_usd": 4125253.87,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102870",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "high",
"timestamp": "2026-01-02T23:50:00Z",
"trace_id": "56ee56ee-822a-cd84-1b33-e2eb75150f7d"
} | {
"account_age_days": 1362,
"account_id": "ACCT-6CA0B4D71E4D",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_1",
"session_entropy": 0.922
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 986,
"timestamp": "2026-01-02T23:50:00Z",
"transaction_amount_usd": 6016.69
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 428232.84,
"financial_exposure_usd": 783542.69,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103428",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "critical",
"timestamp": "2026-01-03T09:08:00Z",
"trace_id": "8627989b-4201-48d8-0101-be945607d679"
} | {
"account_age_days": 556,
"account_id": "ACCT-AC90B0E60AAB",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.286
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 352,
"timestamp": "2026-01-03T01:10:00Z",
"transaction_amount_usd": 25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6485572.33,
"financial_exposure_usd": 6832573.6,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106864",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-05T18:24:00Z",
"trace_id": "f32055e4-fb44-d998-6fc3-bc82a1727038"
} | {
"account_age_days": 1470,
"account_id": "ACCT-73E8DCB7FB7D",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_2",
"session_entropy": 0.637
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 166,
"timestamp": "2026-01-05T14:15:00Z",
"transaction_amount_usd": 6.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5670.86,
"financial_exposure_usd": 8539.57,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102823",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "low",
"timestamp": "2026-01-02T23:03:00Z",
"trace_id": "888be687-9596-fac4-8b4d-29260d9730d2"
} | {
"account_age_days": 1759,
"account_id": "ACCT-284C5BC00B50",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 823,
"timestamp": "2026-01-02T23:03:00Z",
"transaction_amount_usd": 40445.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 303515.94,
"financial_exposure_usd": 312742.23,
"recoverable_pct": 0.322
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105068",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "medium",
"timestamp": "2026-01-04T12:28:00Z",
"trace_id": "98a9e69c-aedb-e9da-99c4-824d220c5600"
} | {
"account_age_days": 212,
"account_id": "ACCT-EA65F38D7808",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_1",
"session_entropy": 0.161
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1027,
"timestamp": "2026-01-04T12:28:00Z",
"transaction_amount_usd": 1831142.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2646641.39,
"financial_exposure_usd": 2690834.96,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100811",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-01T13:31:00Z",
"trace_id": "3bfec28e-e769-86c3-2393-cdaea664c373"
} | {
"account_age_days": 626,
"account_id": "ACCT-68795CA3D60B",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_2",
"session_entropy": 0.38
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 279,
"timestamp": "2026-01-01T13:31:00Z",
"transaction_amount_usd": 115176.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 491405.58,
"financial_exposure_usd": 814550.07,
"recoverable_pct": 0.23
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102448",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-02T16:48:00Z",
"trace_id": "d8cf5810-641d-0158-0011-6e6944f935dd"
} | {
"account_age_days": 1382,
"account_id": "ACCT-8E5795790368",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.388
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 448,
"timestamp": "2026-01-02T16:48:00Z",
"transaction_amount_usd": 22374.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 210146.78,
"financial_exposure_usd": 272814.32,
"recoverable_pct": 0.071
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103652",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-03T12:52:00Z",
"trace_id": "3785eb19-7d89-a760-1785-2739c6af158e"
} | {
"account_age_days": 648,
"account_id": "ACCT-D2CE2B13F842",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 190,
"timestamp": "2026-01-03T12:52:00Z",
"transaction_amount_usd": 2297490.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.616,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3146818.53,
"financial_exposure_usd": 7224900.54,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100793",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-01T13:13:00Z",
"trace_id": "8d371af4-ef8c-f797-9cfe-9bab4371191e"
} | {
"account_age_days": 741,
"account_id": "ACCT-D59D00330554",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1193,
"timestamp": "2026-01-01T13:13:00Z",
"transaction_amount_usd": 32982.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 72971.28,
"financial_exposure_usd": 122046.48,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106611",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-05T14:11:00Z",
"trace_id": "2dab075b-0364-41c5-5751-91eb234164bd"
} | {
"account_age_days": 418,
"account_id": "ACCT-F040650007CF",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_3",
"session_entropy": 0.786
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 115,
"timestamp": "2026-01-05T14:11:00Z",
"transaction_amount_usd": 1514079.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4641934.22,
"financial_exposure_usd": 5611258.4,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102695",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-02T20:55:00Z",
"trace_id": "72e9982f-b193-afda-aa72-61e846c626cf"
} | {
"account_age_days": 520,
"account_id": "ACCT-0A3966328628",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_2",
"session_entropy": 0.828
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 516,
"timestamp": "2026-01-02T20:55:00Z",
"transaction_amount_usd": 93551.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1019736.14,
"financial_exposure_usd": 1067693.24,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106954",
"label": "benign",
"label_confidence": 0.533,
"severity": "medium",
"timestamp": "2026-01-05T19:54:00Z",
"trace_id": "19d9abec-b2c1-8de5-dc86-f709486d4dd5"
} | {
"account_age_days": 1763,
"account_id": "ACCT-0AB70654AFE4",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.227
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 319,
"timestamp": "2026-01-05T08:56:00Z",
"transaction_amount_usd": 0.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3018.93,
"financial_exposure_usd": 7064.19,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104825",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "critical",
"timestamp": "2026-01-04T08:25:00Z",
"trace_id": "851e2cd6-6a87-a464-b122-e8a985fd131c"
} | {
"account_age_days": 1047,
"account_id": "ACCT-C75B66A94C4E",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 647,
"timestamp": "2026-01-04T08:25:00Z",
"transaction_amount_usd": 1426031.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.416,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5360541.2,
"financial_exposure_usd": 5951120.82,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109228",
"label": "benign",
"label_confidence": 0.611,
"severity": "medium",
"timestamp": "2026-01-07T09:48:00Z",
"trace_id": "c8950bb7-adc5-6bda-9777-b06e970044bf"
} | {
"account_age_days": 870,
"account_id": "ACCT-80D7ED44905E",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.115
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 383,
"timestamp": "2026-01-07T03:31:00Z",
"transaction_amount_usd": 0.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 7360.16,
"financial_exposure_usd": 7724.48,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108742",
"label": "benign",
"label_confidence": 0.546,
"severity": "low",
"timestamp": "2026-01-07T01:42:00Z",
"trace_id": "fc98920b-c1f3-23d9-cbc1-1bb0e30c740a"
} | {
"account_age_days": 509,
"account_id": "ACCT-48F56042A95F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.814
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 313,
"timestamp": "2026-01-06T22:33:00Z",
"transaction_amount_usd": 21.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2419.83,
"financial_exposure_usd": 5155.81,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101546",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-02T01:46:00Z",
"trace_id": "249b58f9-cce1-8841-fa35-0c7c2fe496df"
} | {
"account_age_days": 925,
"account_id": "ACCT-5E56E02085B0",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 379,
"timestamp": "2026-01-02T01:46:00Z",
"transaction_amount_usd": 27250.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 903324.75,
"financial_exposure_usd": 1422631.2,
"recoverable_pct": 0.084
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107333",
"label": "benign",
"label_confidence": 0.574,
"severity": "medium",
"timestamp": "2026-01-06T02:13:00Z",
"trace_id": "5fda49af-7706-388d-0db0-0eabbd07aa5c"
} | {
"account_age_days": 1548,
"account_id": "ACCT-61E476FC48D1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.565
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 352,
"timestamp": "2026-01-05T19:14:00Z",
"transaction_amount_usd": 20.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6576.59,
"financial_exposure_usd": 9647.67,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105004",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "high",
"timestamp": "2026-01-04T11:24:00Z",
"trace_id": "fd2bd3be-c187-3851-f7b9-eba834a3ff3a"
} | {
"account_age_days": 471,
"account_id": "ACCT-45E8EAD9BE50",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 181,
"timestamp": "2026-01-04T08:03:00Z",
"transaction_amount_usd": 22.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2550686.2,
"financial_exposure_usd": 3370195.96,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107267",
"label": "benign",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-06T01:07:00Z",
"trace_id": "183b67dd-479a-0092-f818-86a65585f52d"
} | {
"account_age_days": 1252,
"account_id": "ACCT-A3A577AB5E30",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_1",
"session_entropy": 0.385
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 916,
"timestamp": "2026-01-06T01:07:00Z",
"transaction_amount_usd": 13753.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.504,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1077.76,
"financial_exposure_usd": 1862.34,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105433",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "medium",
"timestamp": "2026-01-04T18:33:00Z",
"trace_id": "c4033059-e3f8-ecec-6a1c-04685b38e6f3"
} | {
"account_age_days": 429,
"account_id": "ACCT-04A9B44C6A17",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.463
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 216,
"timestamp": "2026-01-04T18:33:00Z",
"transaction_amount_usd": 2896631.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.682,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4072154.85,
"financial_exposure_usd": 4522648.59,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109982",
"label": "benign",
"label_confidence": 0.535,
"severity": "medium",
"timestamp": "2026-01-07T22:22:00Z",
"trace_id": "8ef4c74f-92a8-7bf8-328f-e755533f5df4"
} | {
"account_age_days": 172,
"account_id": "ACCT-2D19335C38E7",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.679
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 948,
"timestamp": "2026-01-07T22:22:00Z",
"transaction_amount_usd": 8221.81
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2024.94,
"financial_exposure_usd": 3983.59,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101233",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-01T20:33:00Z",
"trace_id": "021d8f94-71b2-5c1d-813d-64d7b1ba9c0a"
} | {
"account_age_days": 1828,
"account_id": "ACCT-7E6E6F220163",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_1",
"session_entropy": 0.937
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1200,
"timestamp": "2026-01-01T20:33:00Z",
"transaction_amount_usd": 40341.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.897,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 211646.34,
"financial_exposure_usd": 399775.82,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106222",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-05T07:42:00Z",
"trace_id": "2e88cc45-7ece-5bf6-f330-8070fa4a4526"
} | {
"account_age_days": 1730,
"account_id": "ACCT-D9717C699B40",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.752
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 208,
"timestamp": "2026-01-05T07:42:00Z",
"transaction_amount_usd": 275754.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.524,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4217614.95,
"financial_exposure_usd": 7446587.46,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103956",
"label": "fraudulent",
"label_confidence": 0.611,
"severity": "critical",
"timestamp": "2026-01-03T17:56:00Z",
"trace_id": "ab7731b8-d668-2d24-dbe9-3f750250fa86"
} | {
"account_age_days": 563,
"account_id": "ACCT-4F0B7DBA8D5E",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 119,
"timestamp": "2026-01-03T17:56:00Z",
"transaction_amount_usd": 207234.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.765,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1461480.03,
"financial_exposure_usd": 3409646.1,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103992",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-03T18:32:00Z",
"trace_id": "fdee0aca-d276-a0c9-2cd0-7f447b08b7f0"
} | {
"account_age_days": 1014,
"account_id": "ACCT-30C8FF7A1142",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 250,
"timestamp": "2026-01-03T18:32:00Z",
"transaction_amount_usd": 98615.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.456,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2093476.42,
"financial_exposure_usd": 3456288.24,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107929",
"label": "benign",
"label_confidence": 0.734,
"severity": "low",
"timestamp": "2026-01-06T12:09:00Z",
"trace_id": "1d63c697-0139-7abd-b709-a10e9fd8f318"
} | {
"account_age_days": 1176,
"account_id": "ACCT-47BCDB3D204D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.178
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 355,
"timestamp": "2026-01-06T02:49:00Z",
"transaction_amount_usd": 12.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2507.63,
"financial_exposure_usd": 3599.76,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108853",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T03:33:00Z",
"trace_id": "4d95cb04-df99-d840-1610-e58eeaf25f39"
} | {
"account_age_days": 930,
"account_id": "ACCT-A1ACB7C6D512",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.754
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 127,
"timestamp": "2026-01-07T03:33:00Z",
"transaction_amount_usd": 10413.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3032.98,
"financial_exposure_usd": 4261.23,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104915",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "low",
"timestamp": "2026-01-04T09:55:00Z",
"trace_id": "5a22d137-1412-96cf-ceaf-5acf8552250c"
} | {
"account_age_days": 1170,
"account_id": "ACCT-E0A03D96C392",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 277,
"timestamp": "2026-01-04T03:27:00Z",
"transaction_amount_usd": 18.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.785,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3144787.37,
"financial_exposure_usd": 4184608.74,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107050",
"label": "benign",
"label_confidence": 0.596,
"severity": "high",
"timestamp": "2026-01-05T21:30:00Z",
"trace_id": "e2c58ce8-8719-9c03-1ddb-94c48147a30f"
} | {
"account_age_days": 1223,
"account_id": "ACCT-165D8F1AAF64",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_3",
"session_entropy": 0.609
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 338,
"timestamp": "2026-01-05T10:43:00Z",
"transaction_amount_usd": 16.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4170.34,
"financial_exposure_usd": 4274.92,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104185",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "critical",
"timestamp": "2026-01-03T21:45:00Z",
"trace_id": "b9c10c23-c59d-2a46-beaf-6958ef2a3597"
} | {
"account_age_days": 229,
"account_id": "ACCT-86C93DA41AC0",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_2",
"session_entropy": 0.47
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 244,
"timestamp": "2026-01-03T21:45:00Z",
"transaction_amount_usd": 2065760.56
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3619098.13,
"financial_exposure_usd": 8768738.17,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106937",
"label": "benign",
"label_confidence": 0.725,
"severity": "low",
"timestamp": "2026-01-05T19:37:00Z",
"trace_id": "efd9d61e-f88e-665f-6bbb-90b5176ddcc7"
} | {
"account_age_days": 1009,
"account_id": "ACCT-B185C234DA72",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.855
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 279,
"timestamp": "2026-01-05T19:37:00Z",
"transaction_amount_usd": 14877.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2103.7,
"financial_exposure_usd": 3078.25,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102470",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "critical",
"timestamp": "2026-01-02T17:10:00Z",
"trace_id": "55377951-27ad-63eb-ae2c-e70e86bcbc53"
} | {
"account_age_days": 690,
"account_id": "ACCT-3F7DDAE63AB0",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 560,
"timestamp": "2026-01-02T17:10:00Z",
"transaction_amount_usd": 45359.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 654994.46,
"financial_exposure_usd": 850423.57,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109438",
"label": "benign",
"label_confidence": 0.658,
"severity": "low",
"timestamp": "2026-01-07T13:18:00Z",
"trace_id": "7c834795-9e93-d641-9e38-74e23dd9a5eb"
} | {
"account_age_days": 1050,
"account_id": "ACCT-15E068E9D8F6",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_3",
"session_entropy": 0.733
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 381,
"timestamp": "2026-01-07T03:56:00Z",
"transaction_amount_usd": 11.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.773,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1293.29,
"financial_exposure_usd": 1367.74,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108747",
"label": "benign",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-07T01:47:00Z",
"trace_id": "977fd9f3-9b20-e76f-1f41-259bee55c2d5"
} | {
"account_age_days": 97,
"account_id": "ACCT-030C50B51620",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 421,
"timestamp": "2026-01-07T01:47:00Z",
"transaction_amount_usd": 804.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 668.47,
"financial_exposure_usd": 1021.16,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107289",
"label": "benign",
"label_confidence": 0.689,
"severity": "low",
"timestamp": "2026-01-06T01:29:00Z",
"trace_id": "fc4f66de-f5a5-4d1e-70b8-df01ef15f2d8"
} | {
"account_age_days": 265,
"account_id": "ACCT-1346E78FBB75",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.833
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 228,
"timestamp": "2026-01-06T01:29:00Z",
"transaction_amount_usd": 7488.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.684,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 331.45,
"financial_exposure_usd": 460.03,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109067",
"label": "benign",
"label_confidence": 0.657,
"severity": "high",
"timestamp": "2026-01-07T07:07:00Z",
"trace_id": "33ac7bcb-6d81-c294-1d99-9e52cda22ba2"
} | {
"account_age_days": 887,
"account_id": "ACCT-9B778D2FD3E0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.795
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 451,
"timestamp": "2026-01-07T07:07:00Z",
"transaction_amount_usd": 13197.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 782.23,
"financial_exposure_usd": 1020.57,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105743",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-04T23:43:00Z",
"trace_id": "ffa4e926-21e5-f556-1887-7410e935bd5c"
} | {
"account_age_days": 431,
"account_id": "ACCT-90B210DA8FB0",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_1",
"session_entropy": 0.341
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 717,
"timestamp": "2026-01-04T23:43:00Z",
"transaction_amount_usd": 2426725.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.385,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2318044.12,
"financial_exposure_usd": 5692181.69,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105660",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "high",
"timestamp": "2026-01-04T22:20:00Z",
"trace_id": "4bfcfd3b-a24e-d75b-beda-151ee9ffdb60"
} | {
"account_age_days": 456,
"account_id": "ACCT-D3E6F35299ED",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.336
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 477,
"timestamp": "2026-01-04T22:20:00Z",
"transaction_amount_usd": 1975100.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.478,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2040679.23,
"financial_exposure_usd": 3824619.82,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106428",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-05T11:08:00Z",
"trace_id": "76a89ee3-4d40-584a-befe-2e411a276d14"
} | {
"account_age_days": 604,
"account_id": "ACCT-0BE465C2A3ED",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.689
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 607,
"timestamp": "2026-01-05T11:08:00Z",
"transaction_amount_usd": 535762.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1500265.2,
"financial_exposure_usd": 3048845.62,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109421",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-07T13:01:00Z",
"trace_id": "cee761ab-fef2-8ebd-185b-0f2c4e572c33"
} | {
"account_age_days": 397,
"account_id": "ACCT-BC78920E2DEB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.624
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 324,
"timestamp": "2026-01-07T13:01:00Z",
"transaction_amount_usd": 11258.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 611.47,
"financial_exposure_usd": 749.01,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106134",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-05T06:14:00Z",
"trace_id": "3ba05e1c-5998-6bae-d772-7446202b8ee4"
} | {
"account_age_days": 809,
"account_id": "ACCT-4FBFEDBF34E3",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.647
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 939,
"timestamp": "2026-01-05T06:14:00Z",
"transaction_amount_usd": 379120.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.617,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1945979.9,
"financial_exposure_usd": 3242800.56,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102193",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "low",
"timestamp": "2026-01-02T12:33:00Z",
"trace_id": "d36013e2-2768-4ff5-b3ba-cf910816dd28"
} | {
"account_age_days": 1633,
"account_id": "ACCT-9743845FCFC4",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 202,
"timestamp": "2026-01-02T09:12:00Z",
"transaction_amount_usd": 12.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 300027.22,
"financial_exposure_usd": 324617.72,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102687",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "medium",
"timestamp": "2026-01-02T20:47:00Z",
"trace_id": "fceb1ac5-a7d1-8b17-70d5-f2ef3dd1a8e4"
} | {
"account_age_days": 1457,
"account_id": "ACCT-7B52C82540F7",
"baseline_risk_score": 0.478,
"kyc_tier": "tier_3",
"session_entropy": 0.82
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 681,
"timestamp": "2026-01-02T20:47:00Z",
"transaction_amount_usd": 60084.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 782184.11,
"financial_exposure_usd": 794046.86,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104891",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-04T09:31:00Z",
"trace_id": "babf8aa4-5977-3ca8-26bf-c5c31b25833f"
} | {
"account_age_days": 413,
"account_id": "ACCT-135957061256",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.411
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 178,
"timestamp": "2026-01-03T21:03:00Z",
"transaction_amount_usd": 7.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.79,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2121758.08,
"financial_exposure_usd": 2813036.54,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.