schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109468",
"label": "benign",
"label_confidence": 0.743,
"severity": "low",
"timestamp": "2026-01-07T13:48:00Z",
"trace_id": "2ae9dae5-b29e-2609-eb1f-921f1a8ea05e"
} | {
"account_age_days": 1187,
"account_id": "ACCT-20FA1B22D1AC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.757
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 301,
"timestamp": "2026-01-07T13:48:00Z",
"transaction_amount_usd": 8435.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1244.3,
"financial_exposure_usd": 2856.49,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106147",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "high",
"timestamp": "2026-01-05T06:27:00Z",
"trace_id": "acd48035-da31-6742-b9d5-0ff341bc017b"
} | {
"account_age_days": 585,
"account_id": "ACCT-EBE744405C5A",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_1",
"session_entropy": 0.696
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 190,
"timestamp": "2026-01-04T23:59:00Z",
"transaction_amount_usd": 3.54
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.599,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7673536.42,
"financial_exposure_usd": 8336325.77,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103497",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "low",
"timestamp": "2026-01-03T10:17:00Z",
"trace_id": "66f47bc1-a665-3a5b-8c9a-0f63c3d9e174"
} | {
"account_age_days": 1362,
"account_id": "ACCT-90CB7C66A206",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.554
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1153,
"timestamp": "2026-01-03T10:17:00Z",
"transaction_amount_usd": 1797442.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.582,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4922579.07,
"financial_exposure_usd": 8620347.4,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107451",
"label": "benign",
"label_confidence": 0.674,
"severity": "high",
"timestamp": "2026-01-06T04:11:00Z",
"trace_id": "7ad6461b-3b0b-2ceb-a05c-243da92235fa"
} | {
"account_age_days": 1891,
"account_id": "ACCT-496177FC1F3F",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.894
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1194,
"timestamp": "2026-01-06T04:11:00Z",
"transaction_amount_usd": 3639.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.533,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1212.48,
"financial_exposure_usd": 3013.63,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101249",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "medium",
"timestamp": "2026-01-01T20:49:00Z",
"trace_id": "8305d4b0-b70e-f00e-ad17-d2d7ced6543c"
} | {
"account_age_days": 772,
"account_id": "ACCT-9A5765CA89D8",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_2",
"session_entropy": 0.732
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 271,
"timestamp": "2026-01-01T19:05:00Z",
"transaction_amount_usd": 14.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 450087.73,
"financial_exposure_usd": 758096.72,
"recoverable_pct": 0.236
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103108",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-03T03:48:00Z",
"trace_id": "435c7ede-48c7-f7bb-6018-be4141f08a64"
} | {
"account_age_days": 504,
"account_id": "ACCT-6BB76CC6FBAD",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_2",
"session_entropy": 0.658
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 202,
"timestamp": "2026-01-02T17:36:00Z",
"transaction_amount_usd": 5.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.593,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 388710.36,
"financial_exposure_usd": 526254.6,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109229",
"label": "benign",
"label_confidence": 0.556,
"severity": "critical",
"timestamp": "2026-01-07T09:49:00Z",
"trace_id": "ef7b6102-5eb5-6734-5f9d-38cb77a3c2ee"
} | {
"account_age_days": 203,
"account_id": "ACCT-261D76D8BB9B",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_3",
"session_entropy": 0.656
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 833,
"timestamp": "2026-01-07T09:49:00Z",
"transaction_amount_usd": 5888.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 348.66,
"financial_exposure_usd": 714.42,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109721",
"label": "benign",
"label_confidence": 0.54,
"severity": "low",
"timestamp": "2026-01-07T18:01:00Z",
"trace_id": "5fa6c343-1664-0d67-b8d1-a01b69ad13af"
} | {
"account_age_days": 1680,
"account_id": "ACCT-7AAC5C1E633B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.385
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 326,
"timestamp": "2026-01-07T14:27:00Z",
"transaction_amount_usd": 11.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 613.94,
"financial_exposure_usd": 1386.08,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104700",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T06:20:00Z",
"trace_id": "26d94569-4d53-75b1-b84f-2812fc9b7e15"
} | {
"account_age_days": 124,
"account_id": "ACCT-E7BDAE60FA3C",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_3",
"session_entropy": 0.748
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 170,
"timestamp": "2026-01-04T06:20:00Z",
"transaction_amount_usd": 2657285.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.436,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3295672.47,
"financial_exposure_usd": 3502572.52,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102857",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-02T23:37:00Z",
"trace_id": "e846d1ce-fe0b-08ca-cc93-ec9f88478a82"
} | {
"account_age_days": 524,
"account_id": "ACCT-9CF7404D422D",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 961,
"timestamp": "2026-01-02T23:37:00Z",
"transaction_amount_usd": 107295.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 428450.62,
"financial_exposure_usd": 1052597.57,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105424",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-04T18:24:00Z",
"trace_id": "f18afe83-42b4-dc10-ef78-e21d8d0a1420"
} | {
"account_age_days": 987,
"account_id": "ACCT-0F1763B9D77F",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_2",
"session_entropy": 0.636
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 959,
"timestamp": "2026-01-04T18:24:00Z",
"transaction_amount_usd": 2371578.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3634671.97,
"financial_exposure_usd": 3988236.38,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106035",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-05T04:35:00Z",
"trace_id": "22bb6b52-48c4-5266-1e9e-aeb7a2eda115"
} | {
"account_age_days": 683,
"account_id": "ACCT-24F9B3C7F1A1",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_3",
"session_entropy": 0.669
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 734,
"timestamp": "2026-01-05T04:35:00Z",
"transaction_amount_usd": 1130520.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.872,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2475332.83,
"financial_exposure_usd": 3240068.69,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103812",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-03T15:32:00Z",
"trace_id": "b026026c-1651-d1bb-32e5-cb36005400d3"
} | {
"account_age_days": 658,
"account_id": "ACCT-63E29DCE02D6",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 429,
"timestamp": "2026-01-03T15:32:00Z",
"transaction_amount_usd": 2846105.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1357775.74,
"financial_exposure_usd": 2596494.91,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104724",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-04T06:44:00Z",
"trace_id": "ddc9d1ed-d367-a083-ff95-d3dfbef5c20f"
} | {
"account_age_days": 1437,
"account_id": "ACCT-86A108A5AAD3",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1151,
"timestamp": "2026-01-04T06:44:00Z",
"transaction_amount_usd": 713494.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.647,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4105910.93,
"financial_exposure_usd": 4406887.59,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101804",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-02T06:04:00Z",
"trace_id": "997fc13b-9a63-e32d-424d-5e9d2b884edb"
} | {
"account_age_days": 942,
"account_id": "ACCT-E51FEFEB0BD4",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.564
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1092,
"timestamp": "2026-01-02T06:04:00Z",
"transaction_amount_usd": 30664.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.8,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 369482.64,
"financial_exposure_usd": 811199.61,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108366",
"label": "benign",
"label_confidence": 0.614,
"severity": "low",
"timestamp": "2026-01-06T19:26:00Z",
"trace_id": "e2c99706-e8ba-05eb-953e-c52fb55fac2d"
} | {
"account_age_days": 417,
"account_id": "ACCT-E5156C1A36EE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.873
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 115,
"timestamp": "2026-01-06T19:26:00Z",
"transaction_amount_usd": 14889.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1701.36,
"financial_exposure_usd": 2423.95,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109139",
"label": "benign",
"label_confidence": 0.496,
"severity": "medium",
"timestamp": "2026-01-07T08:19:00Z",
"trace_id": "5c13edda-002a-70a9-2360-9176f1a983e6"
} | {
"account_age_days": 318,
"account_id": "ACCT-15EB60222AF3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 173,
"timestamp": "2026-01-07T04:05:00Z",
"transaction_amount_usd": 6.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2589.23,
"financial_exposure_usd": 6127.82,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104176",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "critical",
"timestamp": "2026-01-03T21:36:00Z",
"trace_id": "c517ebfb-6931-9cb2-f271-7efecec1ed3c"
} | {
"account_age_days": 1355,
"account_id": "ACCT-41077B5CB04A",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.661
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 180,
"timestamp": "2026-01-03T21:36:00Z",
"transaction_amount_usd": 2133563.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.438,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2549365.47,
"financial_exposure_usd": 3505214.39,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104952",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-04T10:32:00Z",
"trace_id": "c881287e-eafb-4aa9-9cb3-fe5b4a9b0f84"
} | {
"account_age_days": 1813,
"account_id": "ACCT-6C83C3540AA0",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_2",
"session_entropy": 0.601
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 417,
"timestamp": "2026-01-04T10:32:00Z",
"transaction_amount_usd": 2486190.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.843,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1134020.01,
"financial_exposure_usd": 1840676.25,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100440",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "low",
"timestamp": "2026-01-01T07:20:00Z",
"trace_id": "df6340c8-ab6b-e073-abdd-a8c5130e1283"
} | {
"account_age_days": 1074,
"account_id": "ACCT-F032822A62C8",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_1",
"session_entropy": 0.307
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 98,
"timestamp": "2026-01-01T07:20:00Z",
"transaction_amount_usd": 107067.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 709700.45,
"financial_exposure_usd": 860625.9,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102544",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "low",
"timestamp": "2026-01-02T18:24:00Z",
"trace_id": "71b07175-9d46-b530-09c1-5eadc226dde7"
} | {
"account_age_days": 954,
"account_id": "ACCT-33536563D5F8",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_1",
"session_entropy": 0.435
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1195,
"timestamp": "2026-01-02T18:24:00Z",
"transaction_amount_usd": 40547.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1004041.2,
"financial_exposure_usd": 1114987.27,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107626",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-06T07:06:00Z",
"trace_id": "b35694e5-9d35-ca55-3fba-5384357394ec"
} | {
"account_age_days": 1052,
"account_id": "ACCT-F535B59BF715",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.838
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 233,
"timestamp": "2026-01-05T20:00:00Z",
"transaction_amount_usd": 17.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1712.49,
"financial_exposure_usd": 4187.05,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109597",
"label": "benign",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-07T15:57:00Z",
"trace_id": "558f5af1-afee-3b2c-ab50-d0dbfd276a47"
} | {
"account_age_days": 436,
"account_id": "ACCT-7C77CE3708E0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 201,
"timestamp": "2026-01-07T15:57:00Z",
"transaction_amount_usd": 3518.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1641.35,
"financial_exposure_usd": 2226.73,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101245",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-01T20:45:00Z",
"trace_id": "2cd743e8-f26a-0123-0f67-cd9948710195"
} | {
"account_age_days": 1826,
"account_id": "ACCT-F6F1EBE60A5C",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_3",
"session_entropy": 0.453
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 636,
"timestamp": "2026-01-01T20:45:00Z",
"transaction_amount_usd": 42122.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 253061.25,
"financial_exposure_usd": 499483.78,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103277",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-03T06:37:00Z",
"trace_id": "14f0f57e-6faf-184d-2ed8-8bd96a3a1b1e"
} | {
"account_age_days": 143,
"account_id": "ACCT-DB1ACC16051D",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_1",
"session_entropy": 0.393
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 559,
"timestamp": "2026-01-03T06:37:00Z",
"transaction_amount_usd": 5802.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.564,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1174816.61,
"financial_exposure_usd": 1400233.13,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104450",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "low",
"timestamp": "2026-01-04T02:10:00Z",
"trace_id": "dda45a4c-46e9-8df3-567e-d0a2720d0fc3"
} | {
"account_age_days": 529,
"account_id": "ACCT-757EF6301E1D",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.832
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1044,
"timestamp": "2026-01-04T02:10:00Z",
"transaction_amount_usd": 1080417.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.833,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4413949.57,
"financial_exposure_usd": 7269296.39,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102252",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-02T13:32:00Z",
"trace_id": "9ac1fab6-bdf6-7912-3f91-9e4b640a4584"
} | {
"account_age_days": 1046,
"account_id": "ACCT-AF396EAEC225",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_3",
"session_entropy": 0.111
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 115,
"timestamp": "2026-01-02T12:31:00Z",
"transaction_amount_usd": 2.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.919,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 211069.01,
"financial_exposure_usd": 471348.72,
"recoverable_pct": 0.126
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101346",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "high",
"timestamp": "2026-01-01T22:26:00Z",
"trace_id": "2bd42d48-a3b9-379c-6cc3-4c0fa36379d5"
} | {
"account_age_days": 1932,
"account_id": "ACCT-641BBB6BEB43",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_1",
"session_entropy": 0.9
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 468,
"timestamp": "2026-01-01T22:26:00Z",
"transaction_amount_usd": 67962.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.501,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 403999.09,
"financial_exposure_usd": 456711.51,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107965",
"label": "benign",
"label_confidence": 0.63,
"severity": "medium",
"timestamp": "2026-01-06T12:45:00Z",
"trace_id": "2d1e6bf1-4d91-62c7-3054-06e2a2daf343"
} | {
"account_age_days": 457,
"account_id": "ACCT-6D05A097BB21",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.306
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 307,
"timestamp": "2026-01-06T08:44:00Z",
"transaction_amount_usd": 21.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 764.95,
"financial_exposure_usd": 1720.31,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100198",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-01T03:18:00Z",
"trace_id": "33c00b7d-61f8-63f4-c1ae-35bb2faa49dd"
} | {
"account_age_days": 1759,
"account_id": "ACCT-3E61D3594BFA",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_3",
"session_entropy": 0.92
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 406,
"timestamp": "2026-01-01T03:18:00Z",
"transaction_amount_usd": 58510.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.853,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 425351.02,
"financial_exposure_usd": 579660.45,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105494",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "high",
"timestamp": "2026-01-04T19:34:00Z",
"trace_id": "610bf6e2-d698-9459-2bac-8313ce00923a"
} | {
"account_age_days": 1647,
"account_id": "ACCT-78A5C367BBB1",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_3",
"session_entropy": 0.159
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 602,
"timestamp": "2026-01-04T19:34:00Z",
"transaction_amount_usd": 1036943.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2909008.41,
"financial_exposure_usd": 6222561.81,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101264",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "critical",
"timestamp": "2026-01-01T21:04:00Z",
"trace_id": "3dade44a-5522-6113-742b-f2e04a89eed2"
} | {
"account_age_days": 1525,
"account_id": "ACCT-8150106B8E8B",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.858
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 708,
"timestamp": "2026-01-01T21:04:00Z",
"transaction_amount_usd": 96268.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 691060.45,
"financial_exposure_usd": 975929.43,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100484",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "medium",
"timestamp": "2026-01-01T08:04:00Z",
"trace_id": "1f46a455-5e3b-89ce-7a87-deb7bea02dff"
} | {
"account_age_days": 407,
"account_id": "ACCT-721E0A41BE39",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_1",
"session_entropy": 0.109
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 130,
"timestamp": "2026-01-01T08:04:00Z",
"transaction_amount_usd": 67178.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.882,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 821321.11,
"financial_exposure_usd": 1014377.57,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107202",
"label": "benign",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-06T00:02:00Z",
"trace_id": "5d8c0953-9365-ca3b-2195-40750e2e2313"
} | {
"account_age_days": 1994,
"account_id": "ACCT-486F08FFF4CF",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_3",
"session_entropy": 0.166
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 334,
"timestamp": "2026-01-06T00:02:00Z",
"transaction_amount_usd": 4751.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1043.97,
"financial_exposure_usd": 2082.63,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106781",
"label": "benign",
"label_confidence": 0.474,
"severity": "high",
"timestamp": "2026-01-05T17:01:00Z",
"trace_id": "d47a89d3-d734-ae48-4d14-6ae03d06a6f9"
} | {
"account_age_days": 1776,
"account_id": "ACCT-2B900C48E052",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.723
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 106,
"timestamp": "2026-01-05T05:30:00Z",
"transaction_amount_usd": 13.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1472.78,
"financial_exposure_usd": 3479.31,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101893",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "high",
"timestamp": "2026-01-02T07:33:00Z",
"trace_id": "9c19cfd1-49e7-823b-3123-00ee09e8c098"
} | {
"account_age_days": 1302,
"account_id": "ACCT-F25D7A5E6964",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_3",
"session_entropy": 0.941
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 368,
"timestamp": "2026-01-02T07:33:00Z",
"transaction_amount_usd": 44651.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.695,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 90997.65,
"financial_exposure_usd": 153286.98,
"recoverable_pct": 0.207
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101627",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "medium",
"timestamp": "2026-01-02T03:07:00Z",
"trace_id": "4b958ba8-c86b-08fe-56b2-4ba5ccafcb48"
} | {
"account_age_days": 1940,
"account_id": "ACCT-2740FBF82EF1",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.312
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 577,
"timestamp": "2026-01-02T03:07:00Z",
"transaction_amount_usd": 22523.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.694,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 775680.14,
"financial_exposure_usd": 1024287.78,
"recoverable_pct": 0.281
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100053",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-01T00:53:00Z",
"trace_id": "d30608be-8548-867b-ad5c-ba244d59616b"
} | {
"account_age_days": 1658,
"account_id": "ACCT-BDACDC5E20C0",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_3",
"session_entropy": 0.32
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 846,
"timestamp": "2026-01-01T00:53:00Z",
"transaction_amount_usd": 12726.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.918,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 789768.71,
"financial_exposure_usd": 996351.43,
"recoverable_pct": 0.189
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109364",
"label": "benign",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-07T12:04:00Z",
"trace_id": "c7c725c7-3d61-814e-7904-7eda71a8b2ce"
} | {
"account_age_days": 787,
"account_id": "ACCT-A9C957CF53F2",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_3",
"session_entropy": 0.161
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 781,
"timestamp": "2026-01-07T12:04:00Z",
"transaction_amount_usd": 13391.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 327.29,
"financial_exposure_usd": 518.32,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107649",
"label": "benign",
"label_confidence": 0.615,
"severity": "critical",
"timestamp": "2026-01-06T07:29:00Z",
"trace_id": "9bb059b1-c0c0-5e9c-9e90-1ee6c309023d"
} | {
"account_age_days": 85,
"account_id": "ACCT-E2C18C874219",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_1",
"session_entropy": 0.474
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 107,
"timestamp": "2026-01-05T21:27:00Z",
"transaction_amount_usd": 5.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5222.84,
"financial_exposure_usd": 6943.97,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105519",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-04T19:59:00Z",
"trace_id": "c61409d7-8d9f-a6c0-fe33-ec6a627caaed"
} | {
"account_age_days": 933,
"account_id": "ACCT-623D5656DC18",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.835
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 225,
"timestamp": "2026-01-04T17:07:00Z",
"transaction_amount_usd": 13.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2356174.33,
"financial_exposure_usd": 4663689.99,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107230",
"label": "benign",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-06T00:30:00Z",
"trace_id": "6c37cefa-1d8b-4eea-0de8-1682c3e7dee8"
} | {
"account_age_days": 1371,
"account_id": "ACCT-A67274AB3C01",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.229
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 349,
"timestamp": "2026-01-05T17:20:00Z",
"transaction_amount_usd": 18.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 672.15,
"financial_exposure_usd": 1446.3,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106391",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-05T10:31:00Z",
"trace_id": "fbdb50c5-1581-bb0f-f48a-6ad1cd39df41"
} | {
"account_age_days": 30,
"account_id": "ACCT-1E518C4F89ED",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_1",
"session_entropy": 0.883
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 587,
"timestamp": "2026-01-05T10:31:00Z",
"transaction_amount_usd": 299374.37
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.712,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4233594.15,
"financial_exposure_usd": 4572557.17,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108697",
"label": "benign",
"label_confidence": 0.604,
"severity": "low",
"timestamp": "2026-01-07T00:57:00Z",
"trace_id": "0ccb1160-d22d-0fa0-a5be-489b4f4b3d47"
} | {
"account_age_days": 1087,
"account_id": "ACCT-5286A9197EB0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.946
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 266,
"timestamp": "2026-01-06T12:45:00Z",
"transaction_amount_usd": 2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 983.78,
"financial_exposure_usd": 1735.05,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103705",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-03T13:45:00Z",
"trace_id": "02f17e9a-de19-edb2-fac2-64d267041036"
} | {
"account_age_days": 1507,
"account_id": "ACCT-7AB0BC19DC23",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 277,
"timestamp": "2026-01-03T13:45:00Z",
"transaction_amount_usd": 1102796.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.739,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1741560.17,
"financial_exposure_usd": 3871168.06,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104791",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-04T07:51:00Z",
"trace_id": "e5de6869-dec7-dbce-aef9-6cfd8eee583a"
} | {
"account_age_days": 526,
"account_id": "ACCT-9E88319BE77D",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_3",
"session_entropy": 0.396
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 922,
"timestamp": "2026-01-04T07:51:00Z",
"transaction_amount_usd": 2050165.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.706,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1872837.34,
"financial_exposure_usd": 2584482.46,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107531",
"label": "benign",
"label_confidence": 0.466,
"severity": "medium",
"timestamp": "2026-01-06T05:31:00Z",
"trace_id": "74c36510-1b46-800c-2e27-47388998cc5a"
} | {
"account_age_days": 969,
"account_id": "ACCT-4CC49822A01C",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_1",
"session_entropy": 0.752
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 268,
"timestamp": "2026-01-06T04:04:00Z",
"transaction_amount_usd": 15.55
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1492.51,
"financial_exposure_usd": 1757.03,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101457",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-02T00:17:00Z",
"trace_id": "6d209bc6-8769-4750-e032-c8db032fb3ff"
} | {
"account_age_days": 953,
"account_id": "ACCT-21ED3678461B",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_2",
"session_entropy": 0.95
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 281,
"timestamp": "2026-01-01T21:49:00Z",
"transaction_amount_usd": 9.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 495432.52,
"financial_exposure_usd": 781942.94,
"recoverable_pct": 0.209
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104833",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "low",
"timestamp": "2026-01-04T08:33:00Z",
"trace_id": "9f3b9483-fdba-d659-a032-d556073db204"
} | {
"account_age_days": 1958,
"account_id": "ACCT-C95A064F094C",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.108
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 903,
"timestamp": "2026-01-04T08:33:00Z",
"transaction_amount_usd": 1827053.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2557752.66,
"financial_exposure_usd": 2643954.63,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108298",
"label": "benign",
"label_confidence": 0.609,
"severity": "high",
"timestamp": "2026-01-06T18:18:00Z",
"trace_id": "606170c5-48e7-31d8-994c-1ff7146e544c"
} | {
"account_age_days": 1282,
"account_id": "ACCT-711F7FAC2382",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_1",
"session_entropy": 0.149
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 797,
"timestamp": "2026-01-06T18:18:00Z",
"transaction_amount_usd": 13736.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.548,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2335.69,
"financial_exposure_usd": 2522.07,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106537",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "high",
"timestamp": "2026-01-05T12:57:00Z",
"trace_id": "b8b3a7ce-8e59-4f3d-d87b-e35f4eacd70c"
} | {
"account_age_days": 1630,
"account_id": "ACCT-36F9A9AF3124",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_3",
"session_entropy": 0.517
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 239,
"timestamp": "2026-01-05T12:57:00Z",
"transaction_amount_usd": 1771337.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2476870.84,
"financial_exposure_usd": 2935022.89,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100833",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-01T13:53:00Z",
"trace_id": "dd25cc30-6726-4c40-625c-6b645c02ecd8"
} | {
"account_age_days": 1956,
"account_id": "ACCT-67DCFAC05E44",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 326,
"timestamp": "2026-01-01T11:36:00Z",
"transaction_amount_usd": 21.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.797,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 730514.17,
"financial_exposure_usd": 878634.15,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105778",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-05T00:18:00Z",
"trace_id": "121b5ef9-a629-b9db-3efd-32c5767388eb"
} | {
"account_age_days": 925,
"account_id": "ACCT-FAEB9E8046E7",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_2",
"session_entropy": 0.531
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 750,
"timestamp": "2026-01-05T00:18:00Z",
"transaction_amount_usd": 521420.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.357,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1609643.81,
"financial_exposure_usd": 2881749.09,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102856",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-02T23:36:00Z",
"trace_id": "e53c88fc-e073-7807-54d4-63bbeee78584"
} | {
"account_age_days": 1192,
"account_id": "ACCT-29DDDB3FC3BC",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_1",
"session_entropy": 0.688
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 197,
"timestamp": "2026-01-02T23:36:00Z",
"transaction_amount_usd": 69260.82
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 833932.42,
"financial_exposure_usd": 928842.19,
"recoverable_pct": 0.111
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107421",
"label": "benign",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-06T03:41:00Z",
"trace_id": "afa82e16-181e-7011-3d6b-e9404256640e"
} | {
"account_age_days": 1648,
"account_id": "ACCT-CF0BD1AF83AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.587
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 693,
"timestamp": "2026-01-06T03:41:00Z",
"transaction_amount_usd": 14170.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2138.69,
"financial_exposure_usd": 4470.26,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101583",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "high",
"timestamp": "2026-01-02T02:23:00Z",
"trace_id": "32dc96b5-e942-14b4-ba43-067f17c8631c"
} | {
"account_age_days": 543,
"account_id": "ACCT-7F4B4E262B50",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_1",
"session_entropy": 0.624
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 427,
"timestamp": "2026-01-02T02:23:00Z",
"transaction_amount_usd": 7904.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 686503.24,
"financial_exposure_usd": 980705.54,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106663",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-05T15:03:00Z",
"trace_id": "84f4915d-66b6-a0d3-450b-c765fb4eb249"
} | {
"account_age_days": 1735,
"account_id": "ACCT-0FA51F4DC082",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.678
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 681,
"timestamp": "2026-01-05T15:03:00Z",
"transaction_amount_usd": 1996071.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5407567.44,
"financial_exposure_usd": 5988977,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109177",
"label": "benign",
"label_confidence": 0.705,
"severity": "medium",
"timestamp": "2026-01-07T08:57:00Z",
"trace_id": "d160a803-ed38-787b-06b4-830653add3f4"
} | {
"account_age_days": 1235,
"account_id": "ACCT-42E5D786691D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.395
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 257,
"timestamp": "2026-01-07T08:57:00Z",
"transaction_amount_usd": 9972.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3711.54,
"financial_exposure_usd": 4372.67,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107646",
"label": "benign",
"label_confidence": 0.596,
"severity": "low",
"timestamp": "2026-01-06T07:26:00Z",
"trace_id": "32061456-d940-1cf6-a041-01208629302e"
} | {
"account_age_days": 1087,
"account_id": "ACCT-3E78FF7416F5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1008,
"timestamp": "2026-01-06T07:26:00Z",
"transaction_amount_usd": 8909.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2292.72,
"financial_exposure_usd": 2302.75,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107564",
"label": "benign",
"label_confidence": 0.673,
"severity": "critical",
"timestamp": "2026-01-06T06:04:00Z",
"trace_id": "c345b1b6-50f3-17b6-7530-fd28c23cdeea"
} | {
"account_age_days": 1707,
"account_id": "ACCT-7CA5D70FBC6B",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.533
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1172,
"timestamp": "2026-01-06T06:04:00Z",
"transaction_amount_usd": 11215.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5625.84,
"financial_exposure_usd": 7092.14,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106950",
"label": "benign",
"label_confidence": 0.521,
"severity": "medium",
"timestamp": "2026-01-05T19:50:00Z",
"trace_id": "a213ad78-10b9-30cd-c86c-1251d63a8b32"
} | {
"account_age_days": 302,
"account_id": "ACCT-225FBABB6625",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_2",
"session_entropy": 0.764
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 690,
"timestamp": "2026-01-05T19:50:00Z",
"transaction_amount_usd": 12773.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2138.08,
"financial_exposure_usd": 2145.75,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100355",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "critical",
"timestamp": "2026-01-01T05:55:00Z",
"trace_id": "332e83c9-bb35-a4c8-fcc9-7fa613b8905e"
} | {
"account_age_days": 17,
"account_id": "ACCT-6E52F6237862",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.333
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1178,
"timestamp": "2026-01-01T05:55:00Z",
"transaction_amount_usd": 44724.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.664,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 370408.38,
"financial_exposure_usd": 519789.91,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106412",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "critical",
"timestamp": "2026-01-05T10:52:00Z",
"trace_id": "b838926c-aeaf-f0c0-b0a0-8072a96cb4ac"
} | {
"account_age_days": 1655,
"account_id": "ACCT-461F5ABBBAB0",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 119,
"timestamp": "2026-01-05T00:17:00Z",
"transaction_amount_usd": 5.55
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1653922.5,
"financial_exposure_usd": 2059376.45,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101864",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "critical",
"timestamp": "2026-01-02T07:04:00Z",
"trace_id": "331b89b0-ad78-0bf6-10ab-01c296cc7d90"
} | {
"account_age_days": 700,
"account_id": "ACCT-1281F331A067",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_1",
"session_entropy": 0.871
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 87,
"timestamp": "2026-01-02T07:04:00Z",
"transaction_amount_usd": 23833.54
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.926,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 335376.67,
"financial_exposure_usd": 665938.77,
"recoverable_pct": 0.176
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109156",
"label": "benign",
"label_confidence": 0.534,
"severity": "medium",
"timestamp": "2026-01-07T08:36:00Z",
"trace_id": "ba05e259-2f35-8cf0-3923-2500cd31ec8e"
} | {
"account_age_days": 757,
"account_id": "ACCT-23A76D3FFA4B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.711
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 540,
"timestamp": "2026-01-07T08:36:00Z",
"transaction_amount_usd": 14196.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 773.95,
"financial_exposure_usd": 1675.69,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106099",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "medium",
"timestamp": "2026-01-05T05:39:00Z",
"trace_id": "49c4dba0-2e08-dd27-8b56-a914318682c6"
} | {
"account_age_days": 1982,
"account_id": "ACCT-E4D0F3D3DE56",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_3",
"session_entropy": 0.559
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 394,
"timestamp": "2026-01-05T00:30:00Z",
"transaction_amount_usd": 4.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.433,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3151738.97,
"financial_exposure_usd": 3611668.83,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108367",
"label": "benign",
"label_confidence": 0.743,
"severity": "low",
"timestamp": "2026-01-06T19:27:00Z",
"trace_id": "1c890ef0-1b9c-eeae-4822-8df42aee5e19"
} | {
"account_age_days": 23,
"account_id": "ACCT-4D2EB9933543",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_1",
"session_entropy": 0.911
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 252,
"timestamp": "2026-01-06T19:27:00Z",
"transaction_amount_usd": 14394.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1221.62,
"financial_exposure_usd": 1587.51,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103571",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-03T11:31:00Z",
"trace_id": "b0420d82-3fec-e0db-f683-468427198f5d"
} | {
"account_age_days": 1782,
"account_id": "ACCT-6A49FDC18308",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_2",
"session_entropy": 0.395
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 160,
"timestamp": "2026-01-03T11:31:00Z",
"transaction_amount_usd": 633916.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.684,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4996813.52,
"financial_exposure_usd": 5805869.67,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103145",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-03T04:25:00Z",
"trace_id": "1cf1547d-914f-fa91-57ae-024e9497362b"
} | {
"account_age_days": 916,
"account_id": "ACCT-908BBEF00B0C",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_3",
"session_entropy": 0.71
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 951,
"timestamp": "2026-01-03T04:25:00Z",
"transaction_amount_usd": 10650.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.908,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 765298.31,
"financial_exposure_usd": 898763.42,
"recoverable_pct": 0.064
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102709",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "critical",
"timestamp": "2026-01-02T21:09:00Z",
"trace_id": "30ef3a81-12ff-e23b-9d17-107eb93f8bd5"
} | {
"account_age_days": 1575,
"account_id": "ACCT-431906CC016E",
"baseline_risk_score": 0.571,
"kyc_tier": "tier_2",
"session_entropy": 0.617
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 730,
"timestamp": "2026-01-02T21:09:00Z",
"transaction_amount_usd": 92043.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 307900.27,
"financial_exposure_usd": 438842.4,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105769",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "critical",
"timestamp": "2026-01-05T00:09:00Z",
"trace_id": "f380e524-c484-2227-e9f3-31af411b1a28"
} | {
"account_age_days": 337,
"account_id": "ACCT-5D2AD5E995BE",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.705
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 335,
"timestamp": "2026-01-05T00:09:00Z",
"transaction_amount_usd": 2681872.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2012533.66,
"financial_exposure_usd": 3953843.38,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107168",
"label": "benign",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-05T23:28:00Z",
"trace_id": "eb5c3dca-4bef-ba38-703e-a4a5a38831f8"
} | {
"account_age_days": 53,
"account_id": "ACCT-C30C45104214",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.893
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 823,
"timestamp": "2026-01-05T23:28:00Z",
"transaction_amount_usd": 3210.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1269.61,
"financial_exposure_usd": 2871.03,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105273",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "low",
"timestamp": "2026-01-04T15:53:00Z",
"trace_id": "1505e5f6-1ceb-b834-0c00-fd8d6daa2d7f"
} | {
"account_age_days": 146,
"account_id": "ACCT-249D50D4FC12",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.23
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 837,
"timestamp": "2026-01-04T15:53:00Z",
"transaction_amount_usd": 1742520.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4334477.65,
"financial_exposure_usd": 5234897.96,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104552",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-04T03:52:00Z",
"trace_id": "9c468ce4-5a22-1b84-81d7-2855b634332f"
} | {
"account_age_days": 148,
"account_id": "ACCT-BDAF52C67E0D",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.533
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1115,
"timestamp": "2026-01-04T03:52:00Z",
"transaction_amount_usd": 1833712.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2048427.6,
"financial_exposure_usd": 2127974.09,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103372",
"label": "fraudulent",
"label_confidence": 0.652,
"severity": "high",
"timestamp": "2026-01-03T08:12:00Z",
"trace_id": "d54908fe-3d10-aace-7f78-5641aac66fd6"
} | {
"account_age_days": 497,
"account_id": "ACCT-93E229C1959B",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.738
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 151,
"timestamp": "2026-01-03T08:12:00Z",
"transaction_amount_usd": 90856.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.351,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3512014.52,
"financial_exposure_usd": 5617932.24,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106999",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-05T20:39:00Z",
"trace_id": "676c87fa-e9f2-fed7-cc25-39e946ecc138"
} | {
"account_age_days": 302,
"account_id": "ACCT-5922F01E2C7D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.151
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1075,
"timestamp": "2026-01-05T20:39:00Z",
"transaction_amount_usd": 8279.64
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2213.1,
"financial_exposure_usd": 2971.83,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104009",
"label": "fraudulent",
"label_confidence": 0.67,
"severity": "high",
"timestamp": "2026-01-03T18:49:00Z",
"trace_id": "1df55a29-c412-8c99-97ad-c31fb53404c5"
} | {
"account_age_days": 713,
"account_id": "ACCT-29424F4D72D6",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.724
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 348,
"timestamp": "2026-01-03T18:49:00Z",
"transaction_amount_usd": 1546923.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.731,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7027158.56,
"financial_exposure_usd": 7642343.39,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103638",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-03T12:38:00Z",
"trace_id": "8038145a-4503-bd50-cd75-cd3fe69e1b22"
} | {
"account_age_days": 102,
"account_id": "ACCT-87B56CDCBF9E",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.71
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 203,
"timestamp": "2026-01-03T07:49:00Z",
"transaction_amount_usd": 0.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.638,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3916204.9,
"financial_exposure_usd": 5347289.57,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102028",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-02T09:48:00Z",
"trace_id": "c30e8fd3-91f2-f4be-d511-b6d035c76172"
} | {
"account_age_days": 134,
"account_id": "ACCT-2BADF8B8D170",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.745
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 387,
"timestamp": "2026-01-02T09:48:00Z",
"transaction_amount_usd": 46550.49
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.741,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 778691.64,
"financial_exposure_usd": 1200704.36,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108890",
"label": "benign",
"label_confidence": 0.503,
"severity": "low",
"timestamp": "2026-01-07T04:10:00Z",
"trace_id": "ecf99a08-bc7a-e345-e646-dbfca440cb01"
} | {
"account_age_days": 544,
"account_id": "ACCT-4744FE9D7A7A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.551
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 196,
"timestamp": "2026-01-06T17:23:00Z",
"transaction_amount_usd": 9.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 884.72,
"financial_exposure_usd": 2045.06,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107560",
"label": "benign",
"label_confidence": 0.484,
"severity": "medium",
"timestamp": "2026-01-06T06:00:00Z",
"trace_id": "f58976b4-444c-86eb-d138-fd538fc65f53"
} | {
"account_age_days": 484,
"account_id": "ACCT-153818CE8719",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.821
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 253,
"timestamp": "2026-01-05T20:07:00Z",
"transaction_amount_usd": 17.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2847.4,
"financial_exposure_usd": 3457.38,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105470",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-04T19:10:00Z",
"trace_id": "065849ea-43c6-b1db-5463-d59f7ee44aa6"
} | {
"account_age_days": 93,
"account_id": "ACCT-DE5619FC535A",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.136
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 850,
"timestamp": "2026-01-04T19:10:00Z",
"transaction_amount_usd": 2612127.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.83,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4461757.7,
"financial_exposure_usd": 6711029.66,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108728",
"label": "benign",
"label_confidence": 0.453,
"severity": "medium",
"timestamp": "2026-01-07T01:28:00Z",
"trace_id": "4b70b570-4d92-1284-1b1e-6a68abcd414f"
} | {
"account_age_days": 1769,
"account_id": "ACCT-FE54766AD33A",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.782
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 917,
"timestamp": "2026-01-07T01:28:00Z",
"transaction_amount_usd": 6441.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1928.22,
"financial_exposure_usd": 2579.85,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101440",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "medium",
"timestamp": "2026-01-02T00:00:00Z",
"trace_id": "4485d04d-042d-295f-7af9-3f09cf79da48"
} | {
"account_age_days": 1560,
"account_id": "ACCT-E764850076D6",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_3",
"session_entropy": 0.503
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 514,
"timestamp": "2026-01-02T00:00:00Z",
"transaction_amount_usd": 52456.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.849,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 467366.34,
"financial_exposure_usd": 910393.18,
"recoverable_pct": 0.276
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107600",
"label": "benign",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-06T06:40:00Z",
"trace_id": "643a0ef1-5321-3c36-9014-a57bda3f0af5"
} | {
"account_age_days": 1530,
"account_id": "ACCT-6C4A8717E8C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 125,
"timestamp": "2026-01-05T21:29:00Z",
"transaction_amount_usd": 4.33
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2627.35,
"financial_exposure_usd": 3385.9,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105405",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-04T18:05:00Z",
"trace_id": "8c24fbc6-1d16-2bb9-2cc4-3ba8a7194309"
} | {
"account_age_days": 1650,
"account_id": "ACCT-E9E377926147",
"baseline_risk_score": 0.216,
"kyc_tier": "tier_3",
"session_entropy": 0.222
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 421,
"timestamp": "2026-01-04T18:05:00Z",
"transaction_amount_usd": 2865738.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.711,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2943055.65,
"financial_exposure_usd": 4123069.22,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104003",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-03T18:43:00Z",
"trace_id": "93d35fd4-65a4-2f25-b607-d88ff05031ff"
} | {
"account_age_days": 707,
"account_id": "ACCT-9EF02032C685",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_3",
"session_entropy": 0.94
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 514,
"timestamp": "2026-01-03T18:43:00Z",
"transaction_amount_usd": 2761236.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.94,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2432603.31,
"financial_exposure_usd": 5240763.6,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101678",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "critical",
"timestamp": "2026-01-02T03:58:00Z",
"trace_id": "d88e688c-77e0-5ee8-5e06-2ec107e6017b"
} | {
"account_age_days": 1821,
"account_id": "ACCT-A7FDE5466E1E",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_2",
"session_entropy": 0.176
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 338,
"timestamp": "2026-01-02T03:58:00Z",
"transaction_amount_usd": 60295.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.549,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 671054.09,
"financial_exposure_usd": 970898.08,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102632",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-02T19:52:00Z",
"trace_id": "b522ce3f-d92c-51bf-e40b-882ef57c5eb7"
} | {
"account_age_days": 1172,
"account_id": "ACCT-1A7AE54CF349",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.208
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 247,
"timestamp": "2026-01-02T18:52:00Z",
"transaction_amount_usd": 17.69
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.576,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 469028.11,
"financial_exposure_usd": 661310.37,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100027",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-01T00:27:00Z",
"trace_id": "6b0ae0e3-9d89-6047-dd39-d7936257a4a2"
} | {
"account_age_days": 82,
"account_id": "ACCT-80051B1066C1",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.134
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 468,
"timestamp": "2026-01-01T00:27:00Z",
"transaction_amount_usd": 108326.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 398656.91,
"financial_exposure_usd": 814642.23,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103279",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-03T06:39:00Z",
"trace_id": "f2b973d1-1fad-6075-f768-7f27ff8b3b0a"
} | {
"account_age_days": 1185,
"account_id": "ACCT-705B75F3DB11",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_1",
"session_entropy": 0.622
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 700,
"timestamp": "2026-01-03T06:39:00Z",
"transaction_amount_usd": 100171.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.603,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 667099.78,
"financial_exposure_usd": 920313.32,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103220",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-03T05:40:00Z",
"trace_id": "a9c518dd-3666-49bc-2ec3-a2db28b1631c"
} | {
"account_age_days": 1303,
"account_id": "ACCT-A428BEBD88D8",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_3",
"session_entropy": 0.399
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1137,
"timestamp": "2026-01-03T05:40:00Z",
"transaction_amount_usd": 54438.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.643,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 257245.82,
"financial_exposure_usd": 565355.99,
"recoverable_pct": 0.363
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109691",
"label": "benign",
"label_confidence": 0.743,
"severity": "low",
"timestamp": "2026-01-07T17:31:00Z",
"trace_id": "e9d0a54f-bdad-1425-a052-83cb6dbf65a4"
} | {
"account_age_days": 1863,
"account_id": "ACCT-C5C9C83D00C5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.583
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1151,
"timestamp": "2026-01-07T17:31:00Z",
"transaction_amount_usd": 2132.44
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 285.26,
"financial_exposure_usd": 353.3,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108428",
"label": "benign",
"label_confidence": 0.451,
"severity": "low",
"timestamp": "2026-01-06T20:28:00Z",
"trace_id": "ba4f3c99-5008-5299-fc4f-1aaa65186306"
} | {
"account_age_days": 1073,
"account_id": "ACCT-3EDE17F051D9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.749
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 180,
"timestamp": "2026-01-06T20:28:00Z",
"transaction_amount_usd": 8493.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4285.94,
"financial_exposure_usd": 7082.41,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103098",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T03:38:00Z",
"trace_id": "6256bb2d-0a1a-0d7b-2b9c-253a4eca61bd"
} | {
"account_age_days": 918,
"account_id": "ACCT-ACB44F2D5C8C",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_3",
"session_entropy": 0.115
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1006,
"timestamp": "2026-01-03T03:38:00Z",
"transaction_amount_usd": 118149.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.946,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 686230.26,
"financial_exposure_usd": 759419.95,
"recoverable_pct": 0.055
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102001",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-02T09:21:00Z",
"trace_id": "8b82b993-2a90-dec0-5bd7-abaa058d8d26"
} | {
"account_age_days": 987,
"account_id": "ACCT-82B152BD6FED",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_1",
"session_entropy": 0.653
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 103,
"timestamp": "2026-01-02T00:08:00Z",
"transaction_amount_usd": 16.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.671,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 841186.45,
"financial_exposure_usd": 905364.12,
"recoverable_pct": 0.207
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101322",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "critical",
"timestamp": "2026-01-01T22:02:00Z",
"trace_id": "5d5d9f13-5202-f2fc-794d-404f835410a0"
} | {
"account_age_days": 1862,
"account_id": "ACCT-117581D1C711",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.323
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 356,
"timestamp": "2026-01-01T09:57:00Z",
"transaction_amount_usd": 15.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 199977.54,
"financial_exposure_usd": 211964.79,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103045",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "low",
"timestamp": "2026-01-03T02:45:00Z",
"trace_id": "7330c6d7-b6c9-6858-3fe1-d3517e9d4296"
} | {
"account_age_days": 1635,
"account_id": "ACCT-FE4D976C9E64",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 605,
"timestamp": "2026-01-03T02:45:00Z",
"transaction_amount_usd": 14442.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 871697.5,
"financial_exposure_usd": 988009.66,
"recoverable_pct": 0.16
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106451",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "critical",
"timestamp": "2026-01-05T11:31:00Z",
"trace_id": "900b5717-e191-b42d-fbed-c7297ff8b92f"
} | {
"account_age_days": 405,
"account_id": "ACCT-0057F0E41BFF",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_3",
"session_entropy": 0.228
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 134,
"timestamp": "2026-01-05T09:30:00Z",
"transaction_amount_usd": 19.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.787,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2085373.05,
"financial_exposure_usd": 4401754.38,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108818",
"label": "benign",
"label_confidence": 0.57,
"severity": "low",
"timestamp": "2026-01-07T02:58:00Z",
"trace_id": "e906e150-f59d-3bf8-fcac-ec68afbce2ab"
} | {
"account_age_days": 476,
"account_id": "ACCT-CEE88202330C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.406
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 174,
"timestamp": "2026-01-06T19:56:00Z",
"transaction_amount_usd": 16.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 659.46,
"financial_exposure_usd": 777.63,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.