schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109615",
"label": "benign",
"label_confidence": 0.707,
"severity": "critical",
"timestamp": "2026-01-07T16:15:00Z",
"trace_id": "6dc34943-d211-553c-eed2-550f64ccef20"
} | {
"account_age_days": 882,
"account_id": "ACCT-31E601DFDC09",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 197,
"timestamp": "2026-01-07T13:33:00Z",
"transaction_amount_usd": 15.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2674.62,
"financial_exposure_usd": 3664.14,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106569",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-05T13:29:00Z",
"trace_id": "3b4c51a5-6762-70ad-6fb6-60b9cadd3d11"
} | {
"account_age_days": 1274,
"account_id": "ACCT-7EEC0EDC00BE",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1032,
"timestamp": "2026-01-05T13:29:00Z",
"transaction_amount_usd": 84187.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.565,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5523953.57,
"financial_exposure_usd": 5999469.9,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105432",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-04T18:32:00Z",
"trace_id": "31d31fdb-d9e4-6eae-5508-4084a5b7d10b"
} | {
"account_age_days": 1561,
"account_id": "ACCT-2847362CF5F3",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_1",
"session_entropy": 0.159
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 352,
"timestamp": "2026-01-04T14:25:00Z",
"transaction_amount_usd": 8.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.648,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1463380.16,
"financial_exposure_usd": 2403437.75,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103772",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-03T14:52:00Z",
"trace_id": "bdf9055f-f8b5-aaec-9953-208ca5ca24c9"
} | {
"account_age_days": 479,
"account_id": "ACCT-6B2E11AD39F1",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.907
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 290,
"timestamp": "2026-01-03T14:52:00Z",
"transaction_amount_usd": 1096862.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5789135.89,
"financial_exposure_usd": 8170850.1,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102612",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "critical",
"timestamp": "2026-01-02T19:32:00Z",
"trace_id": "e022d85c-94b5-24ed-b958-c8c694944a5a"
} | {
"account_age_days": 286,
"account_id": "ACCT-C6B174D7C632",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 102,
"timestamp": "2026-01-02T08:07:00Z",
"transaction_amount_usd": 18.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 868874.06,
"financial_exposure_usd": 935904.98,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105643",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "high",
"timestamp": "2026-01-04T22:03:00Z",
"trace_id": "8bba8040-f92f-c7ca-8c7a-b0a4d950393a"
} | {
"account_age_days": 283,
"account_id": "ACCT-DEB25409468A",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_3",
"session_entropy": 0.944
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 412,
"timestamp": "2026-01-04T22:03:00Z",
"transaction_amount_usd": 1415830.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5084543.81,
"financial_exposure_usd": 7394572.32,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104744",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "medium",
"timestamp": "2026-01-04T07:04:00Z",
"trace_id": "168a5cac-c3f6-c75e-3606-b6c87f11fa05"
} | {
"account_age_days": 1638,
"account_id": "ACCT-FE7A90CAB0AD",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 763,
"timestamp": "2026-01-04T07:04:00Z",
"transaction_amount_usd": 1679791.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.386,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1858205.85,
"financial_exposure_usd": 4642913.76,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103644",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-03T12:44:00Z",
"trace_id": "2019adc8-7581-65a2-0f1e-a5ec64177bbd"
} | {
"account_age_days": 1691,
"account_id": "ACCT-FF5931B53BC3",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.583
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 845,
"timestamp": "2026-01-03T12:44:00Z",
"transaction_amount_usd": 160275.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.52,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3016491.23,
"financial_exposure_usd": 6427055.61,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101701",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "medium",
"timestamp": "2026-01-02T04:21:00Z",
"trace_id": "d0e9bea2-941a-ac53-1f25-c55aa2ab6e3d"
} | {
"account_age_days": 1536,
"account_id": "ACCT-CBF1B13D654B",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 119,
"timestamp": "2026-01-02T00:50:00Z",
"transaction_amount_usd": 8.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.915,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 164810.27,
"financial_exposure_usd": 296087.04,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101970",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-02T08:50:00Z",
"trace_id": "9c0fa04f-c6f5-4341-585d-3eddf57784da"
} | {
"account_age_days": 1894,
"account_id": "ACCT-B77909D9B4FE",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_3",
"session_entropy": 0.629
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1166,
"timestamp": "2026-01-02T08:50:00Z",
"transaction_amount_usd": 59353.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.449,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 536287.47,
"financial_exposure_usd": 723100.68,
"recoverable_pct": 0.225
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103196",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-03T05:16:00Z",
"trace_id": "027c4576-f015-e45f-c593-75bd65659fa7"
} | {
"account_age_days": 1395,
"account_id": "ACCT-41BC70E0F431",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_1",
"session_entropy": 0.696
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 166,
"timestamp": "2026-01-02T23:01:00Z",
"transaction_amount_usd": 17.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.508,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 251890.39,
"financial_exposure_usd": 449668,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108938",
"label": "benign",
"label_confidence": 0.622,
"severity": "low",
"timestamp": "2026-01-07T04:58:00Z",
"trace_id": "ec52734c-4bc9-2f57-5eee-17cbbb76014e"
} | {
"account_age_days": 594,
"account_id": "ACCT-E467AEB4E925",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_1",
"session_entropy": 0.482
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 173,
"timestamp": "2026-01-06T23:51:00Z",
"transaction_amount_usd": 17.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.626,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 401.08,
"financial_exposure_usd": 929.94,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108839",
"label": "benign",
"label_confidence": 0.516,
"severity": "medium",
"timestamp": "2026-01-07T03:19:00Z",
"trace_id": "0e370e35-6ed2-e8c6-7732-35790203771e"
} | {
"account_age_days": 1852,
"account_id": "ACCT-CCD6DEE23A3F",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.877
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 81,
"timestamp": "2026-01-07T03:19:00Z",
"transaction_amount_usd": 6818.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2244.92,
"financial_exposure_usd": 2279.87,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102790",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "critical",
"timestamp": "2026-01-02T22:30:00Z",
"trace_id": "8365e908-724b-ada4-011e-5e6cbac9960d"
} | {
"account_age_days": 22,
"account_id": "ACCT-DE55FC9AFE88",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_1",
"session_entropy": 0.72
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 296,
"timestamp": "2026-01-02T22:30:00Z",
"transaction_amount_usd": 14858.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.851,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 687368.94,
"financial_exposure_usd": 885127.83,
"recoverable_pct": 0.243
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103339",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "low",
"timestamp": "2026-01-03T07:39:00Z",
"trace_id": "5cf7b86e-09b7-daae-4db5-7d4313649a27"
} | {
"account_age_days": 1916,
"account_id": "ACCT-C4F970E8E9E9",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_2",
"session_entropy": 0.395
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 378,
"timestamp": "2026-01-03T07:39:00Z",
"transaction_amount_usd": 930576.1
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.718,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2831979.82,
"financial_exposure_usd": 3094136.73,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108821",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-07T03:01:00Z",
"trace_id": "8eb77e7d-4ee2-e014-e310-2c39a8e5f465"
} | {
"account_age_days": 1086,
"account_id": "ACCT-49774D9EF67D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.356
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 560,
"timestamp": "2026-01-07T03:01:00Z",
"transaction_amount_usd": 2187.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 403.15,
"financial_exposure_usd": 796.47,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102736",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-02T21:36:00Z",
"trace_id": "3fd56694-3f9a-dc15-a41d-d60b70f485c5"
} | {
"account_age_days": 1617,
"account_id": "ACCT-C029863E462E",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.27
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 236,
"timestamp": "2026-01-02T19:13:00Z",
"transaction_amount_usd": 16.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 644038.47,
"financial_exposure_usd": 1041571.47,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100603",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-01T10:03:00Z",
"trace_id": "29c6b5b0-e307-d8c5-a0ec-7f33ec02876a"
} | {
"account_age_days": 1544,
"account_id": "ACCT-5A6AE3C69726",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.777
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 205,
"timestamp": "2026-01-01T10:03:00Z",
"transaction_amount_usd": 90041.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.611,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 407018.13,
"financial_exposure_usd": 676561.7,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106872",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-05T18:32:00Z",
"trace_id": "399f112d-40d4-fd42-2aa6-31eb77a6887c"
} | {
"account_age_days": 902,
"account_id": "ACCT-73E285A3F371",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.86
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 191,
"timestamp": "2026-01-05T17:02:00Z",
"transaction_amount_usd": 6.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 447.27,
"financial_exposure_usd": 1067.72,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107835",
"label": "benign",
"label_confidence": 0.592,
"severity": "high",
"timestamp": "2026-01-06T10:35:00Z",
"trace_id": "fd9032b4-4d5d-854d-cda5-3d9def4da2e2"
} | {
"account_age_days": 1731,
"account_id": "ACCT-C3DCBEF1C757",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.863
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 306,
"timestamp": "2026-01-06T10:35:00Z",
"transaction_amount_usd": 841.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 465.65,
"financial_exposure_usd": 471.51,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105177",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "high",
"timestamp": "2026-01-04T14:17:00Z",
"trace_id": "25c652e4-d88b-f06c-45c9-d4c09f1617d2"
} | {
"account_age_days": 1011,
"account_id": "ACCT-454E4137C785",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_2",
"session_entropy": 0.556
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 426,
"timestamp": "2026-01-04T14:17:00Z",
"transaction_amount_usd": 759084.55
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.744,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5126111.5,
"financial_exposure_usd": 6767811.48,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106399",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "critical",
"timestamp": "2026-01-05T10:39:00Z",
"trace_id": "80614162-64e7-fccf-1227-e977f81e791a"
} | {
"account_age_days": 887,
"account_id": "ACCT-38F291F2FC7C",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_3",
"session_entropy": 0.267
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 334,
"timestamp": "2026-01-04T22:30:00Z",
"transaction_amount_usd": 3.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.944,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1360591.08,
"financial_exposure_usd": 2985811.61,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102323",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "medium",
"timestamp": "2026-01-02T14:43:00Z",
"trace_id": "0238b547-6995-654e-dac8-0c0c8b20c9f0"
} | {
"account_age_days": 554,
"account_id": "ACCT-D955997286AC",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_3",
"session_entropy": 0.153
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 803,
"timestamp": "2026-01-02T14:43:00Z",
"transaction_amount_usd": 20385.64
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 437105.7,
"financial_exposure_usd": 668861.11,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108320",
"label": "benign",
"label_confidence": 0.72,
"severity": "medium",
"timestamp": "2026-01-06T18:40:00Z",
"trace_id": "3493282f-e04d-7917-2b3f-59eda6a960e4"
} | {
"account_age_days": 53,
"account_id": "ACCT-58238863EA14",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.693
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 120,
"timestamp": "2026-01-06T18:40:00Z",
"transaction_amount_usd": 2106.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2831.79,
"financial_exposure_usd": 3204.19,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101356",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-01T22:36:00Z",
"trace_id": "290ac04f-0a39-e3a7-ce62-1c9b2dc9b66d"
} | {
"account_age_days": 1884,
"account_id": "ACCT-942E24E85DCF",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.404
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 331,
"timestamp": "2026-01-01T16:58:00Z",
"transaction_amount_usd": 1.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 526912.49,
"financial_exposure_usd": 592506.94,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101901",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "critical",
"timestamp": "2026-01-02T07:41:00Z",
"trace_id": "9294bc65-aee7-c2b0-faa2-a108e85500cc"
} | {
"account_age_days": 1028,
"account_id": "ACCT-82CE4C8B5450",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_1",
"session_entropy": 0.7
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1197,
"timestamp": "2026-01-02T07:41:00Z",
"transaction_amount_usd": 7207.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.915,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 735996.87,
"financial_exposure_usd": 1129835.17,
"recoverable_pct": 0.341
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106985",
"label": "benign",
"label_confidence": 0.65,
"severity": "high",
"timestamp": "2026-01-05T20:25:00Z",
"trace_id": "20cc2da9-7460-7803-37d9-301f6758c2c5"
} | {
"account_age_days": 616,
"account_id": "ACCT-8669AC0F2C11",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1147,
"timestamp": "2026-01-05T20:25:00Z",
"transaction_amount_usd": 2864.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 339.83,
"financial_exposure_usd": 789.86,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100193",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "medium",
"timestamp": "2026-01-01T03:13:00Z",
"trace_id": "bdf18708-26c0-df52-f71d-e9c584c2f2c4"
} | {
"account_age_days": 466,
"account_id": "ACCT-9D719800E30D",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.189
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 286,
"timestamp": "2025-12-31T15:29:00Z",
"transaction_amount_usd": 12.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1015062.53,
"financial_exposure_usd": 1699772.69,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103345",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "high",
"timestamp": "2026-01-03T07:45:00Z",
"trace_id": "9e1f3a71-50f9-4f7b-026c-17f56ac9bf78"
} | {
"account_age_days": 839,
"account_id": "ACCT-DACAC0F89A63",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_2",
"session_entropy": 0.338
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 743,
"timestamp": "2026-01-03T07:45:00Z",
"transaction_amount_usd": 1375329.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5233711.84,
"financial_exposure_usd": 5336979.81,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100169",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "low",
"timestamp": "2026-01-01T02:49:00Z",
"trace_id": "fbb61ff7-8149-6136-6bc8-22f46893a38a"
} | {
"account_age_days": 901,
"account_id": "ACCT-741A5B09A63F",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_1",
"session_entropy": 0.422
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 111,
"timestamp": "2026-01-01T02:49:00Z",
"transaction_amount_usd": 76099.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.784,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 720555.29,
"financial_exposure_usd": 745252.31,
"recoverable_pct": 0.082
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104209",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-03T22:09:00Z",
"trace_id": "979bc4f5-616a-9086-1a61-e5940e6b7da5"
} | {
"account_age_days": 1895,
"account_id": "ACCT-FF9DCB196CBC",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_3",
"session_entropy": 0.891
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 290,
"timestamp": "2026-01-03T18:55:00Z",
"transaction_amount_usd": 7.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.855,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4103236.09,
"financial_exposure_usd": 5692772.92,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109736",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-07T18:16:00Z",
"trace_id": "68f3f202-c45b-e6d6-98b9-100b204d8218"
} | {
"account_age_days": 745,
"account_id": "ACCT-B0E805E2EC63",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.468
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 445,
"timestamp": "2026-01-07T18:16:00Z",
"transaction_amount_usd": 8518.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 722.82,
"financial_exposure_usd": 1686.53,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105784",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-05T00:24:00Z",
"trace_id": "bbeb0359-da6b-cc56-850f-88f13d98cbeb"
} | {
"account_age_days": 237,
"account_id": "ACCT-A19B35DD110B",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.457
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 882,
"timestamp": "2026-01-05T00:24:00Z",
"transaction_amount_usd": 185558.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.578,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1940318.4,
"financial_exposure_usd": 3181504.82,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103671",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "low",
"timestamp": "2026-01-03T13:11:00Z",
"trace_id": "60d6f6c6-38d1-eaf7-7c22-ed471e9421cb"
} | {
"account_age_days": 76,
"account_id": "ACCT-B77848DC1661",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_3",
"session_entropy": 0.42
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 366,
"timestamp": "2026-01-03T13:11:00Z",
"transaction_amount_usd": 1632435.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2015249.06,
"financial_exposure_usd": 2369237.83,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104322",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-04T00:02:00Z",
"trace_id": "61a6cba8-dbbf-e9cd-d605-dc6f6f5c6a9a"
} | {
"account_age_days": 1456,
"account_id": "ACCT-257BE55D5457",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_3",
"session_entropy": 0.634
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 346,
"timestamp": "2026-01-04T00:02:00Z",
"transaction_amount_usd": 553448.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2969482.39,
"financial_exposure_usd": 4629580.53,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101273",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-01T21:13:00Z",
"trace_id": "4130cae2-7ec1-eaef-8e53-87f1234c3025"
} | {
"account_age_days": 467,
"account_id": "ACCT-D6EC53373187",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_3",
"session_entropy": 0.154
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 461,
"timestamp": "2026-01-01T21:13:00Z",
"transaction_amount_usd": 96215.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.575,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1045521.56,
"financial_exposure_usd": 1076682.57,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104441",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-04T02:01:00Z",
"trace_id": "16b12394-3604-0232-4009-fc1f21191d61"
} | {
"account_age_days": 1640,
"account_id": "ACCT-69B24DF4538D",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.725
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 377,
"timestamp": "2026-01-04T02:01:00Z",
"transaction_amount_usd": 1955095.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.771,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2714232.13,
"financial_exposure_usd": 3380092.31,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103981",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-03T18:21:00Z",
"trace_id": "d430d41f-1a4d-bf99-cbe0-50f769a5058c"
} | {
"account_age_days": 1946,
"account_id": "ACCT-982292BCBB8E",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.266
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1022,
"timestamp": "2026-01-03T18:21:00Z",
"transaction_amount_usd": 1907165.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3283977.91,
"financial_exposure_usd": 5101730.42,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103469",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "high",
"timestamp": "2026-01-03T09:49:00Z",
"trace_id": "e0cbc598-853c-927e-6b07-891120defeb2"
} | {
"account_age_days": 477,
"account_id": "ACCT-549277BE96EE",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_1",
"session_entropy": 0.573
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1174,
"timestamp": "2026-01-03T09:49:00Z",
"transaction_amount_usd": 1087787.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3994645.64,
"financial_exposure_usd": 5324000.46,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101463",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-02T00:23:00Z",
"trace_id": "8f182927-fe4c-319e-4131-b3aa18314eba"
} | {
"account_age_days": 1763,
"account_id": "ACCT-7076D1D4DD3B",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_2",
"session_entropy": 0.263
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 92,
"timestamp": "2026-01-01T16:18:00Z",
"transaction_amount_usd": 5.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.824,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 708263.94,
"financial_exposure_usd": 899105.58,
"recoverable_pct": 0.04
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102021",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T09:41:00Z",
"trace_id": "77cd8bba-c945-98f5-3ab9-d0cdcb7f7b6d"
} | {
"account_age_days": 507,
"account_id": "ACCT-18439CDBD987",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_1",
"session_entropy": 0.711
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 205,
"timestamp": "2026-01-02T07:16:00Z",
"transaction_amount_usd": 20.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 529644.66,
"financial_exposure_usd": 678586.5,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104855",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-04T08:55:00Z",
"trace_id": "7cc38ec9-4c51-8bb5-ebfd-a229bee3c77d"
} | {
"account_age_days": 754,
"account_id": "ACCT-9C66CACF66D9",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_1",
"session_entropy": 0.737
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 182,
"timestamp": "2026-01-04T05:39:00Z",
"transaction_amount_usd": 23.72
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.476,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1895314.92,
"financial_exposure_usd": 3171797.53,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108797",
"label": "benign",
"label_confidence": 0.57,
"severity": "low",
"timestamp": "2026-01-07T02:37:00Z",
"trace_id": "f47a926b-ea57-9b72-23e1-9c976f2fb564"
} | {
"account_age_days": 1815,
"account_id": "ACCT-79CD81161C6E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.505
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 733,
"timestamp": "2026-01-07T02:37:00Z",
"transaction_amount_usd": 13177.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 958.18,
"financial_exposure_usd": 2366.49,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108386",
"label": "benign",
"label_confidence": 0.685,
"severity": "high",
"timestamp": "2026-01-06T19:46:00Z",
"trace_id": "ea3bea13-8f88-ae06-a02b-5cc869aff813"
} | {
"account_age_days": 1740,
"account_id": "ACCT-0C1D80C39D10",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_1",
"session_entropy": 0.831
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 235,
"timestamp": "2026-01-06T13:55:00Z",
"transaction_amount_usd": 23.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1783.83,
"financial_exposure_usd": 3097.05,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107596",
"label": "benign",
"label_confidence": 0.684,
"severity": "medium",
"timestamp": "2026-01-06T06:36:00Z",
"trace_id": "60f1e811-d02b-9822-c7d6-967735e2f108"
} | {
"account_age_days": 1788,
"account_id": "ACCT-DB50DFC1C434",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.631
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 170,
"timestamp": "2026-01-05T21:53:00Z",
"transaction_amount_usd": 0.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3285.67,
"financial_exposure_usd": 3372.11,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105725",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "critical",
"timestamp": "2026-01-04T23:25:00Z",
"trace_id": "88ce29bd-2f45-295b-5d21-4bee7ba2f21c"
} | {
"account_age_days": 801,
"account_id": "ACCT-1067F3146389",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.469
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 694,
"timestamp": "2026-01-04T23:25:00Z",
"transaction_amount_usd": 2155960.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2924392.2,
"financial_exposure_usd": 5418793.53,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103002",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "low",
"timestamp": "2026-01-03T02:02:00Z",
"trace_id": "817c4c60-0632-b008-4f1e-5688cf5eacc1"
} | {
"account_age_days": 648,
"account_id": "ACCT-BE92D3A1BAAE",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_2",
"session_entropy": 0.461
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 360,
"timestamp": "2026-01-03T02:02:00Z",
"transaction_amount_usd": 54559.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.371,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 415883.13,
"financial_exposure_usd": 550060.15,
"recoverable_pct": 0.127
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100802",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-01T13:22:00Z",
"trace_id": "6b83998f-6139-0456-ca2d-48424959ecf9"
} | {
"account_age_days": 1268,
"account_id": "ACCT-5264979D4444",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_2",
"session_entropy": 0.206
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 390,
"timestamp": "2026-01-01T13:22:00Z",
"transaction_amount_usd": 52190.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 503366.47,
"financial_exposure_usd": 722972.9,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100309",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-01T05:09:00Z",
"trace_id": "9534ee94-7533-c4df-b964-fbed9d755e6c"
} | {
"account_age_days": 1009,
"account_id": "ACCT-3EEA3CF093FF",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.618
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 793,
"timestamp": "2026-01-01T05:09:00Z",
"transaction_amount_usd": 67544.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 272337.07,
"financial_exposure_usd": 365130.33,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104301",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "medium",
"timestamp": "2026-01-03T23:41:00Z",
"trace_id": "3a60c841-13e8-ab6d-7414-adbe221b4f08"
} | {
"account_age_days": 1720,
"account_id": "ACCT-C4CB0EBD9D89",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_2",
"session_entropy": 0.204
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 285,
"timestamp": "2026-01-03T23:41:00Z",
"transaction_amount_usd": 213210.59
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.936,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4018383.34,
"financial_exposure_usd": 6422008.26,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101945",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-02T08:25:00Z",
"trace_id": "9c928890-3de9-1dbb-c0d5-785190f3c57d"
} | {
"account_age_days": 1492,
"account_id": "ACCT-A2B24143E74D",
"baseline_risk_score": 0.543,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 108,
"timestamp": "2026-01-02T05:23:00Z",
"transaction_amount_usd": 0.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 806523.01,
"financial_exposure_usd": 1196373.56,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100815",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-01T13:35:00Z",
"trace_id": "82dc58f0-d6ad-785f-4c4e-0560b27eabff"
} | {
"account_age_days": 1230,
"account_id": "ACCT-F9500564A416",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_3",
"session_entropy": 0.126
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 559,
"timestamp": "2026-01-01T13:35:00Z",
"transaction_amount_usd": 106372.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 239899.56,
"financial_exposure_usd": 278621.25,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100569",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-01T09:29:00Z",
"trace_id": "2b7cede7-5ed2-9e43-f7f1-e4dd1292a80d"
} | {
"account_age_days": 792,
"account_id": "ACCT-AF6B521CCD48",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.734
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 1182,
"timestamp": "2026-01-01T09:29:00Z",
"transaction_amount_usd": 117406.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 392905.13,
"financial_exposure_usd": 567226.69,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106483",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-05T12:03:00Z",
"trace_id": "81e44324-34bf-5585-ae12-0ac21cfd9dbc"
} | {
"account_age_days": 1952,
"account_id": "ACCT-7EC25C5B4451",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 142,
"timestamp": "2026-01-05T12:03:00Z",
"transaction_amount_usd": 2388359.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.56,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 450676.17,
"financial_exposure_usd": 712126.86,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103777",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "low",
"timestamp": "2026-01-03T14:57:00Z",
"trace_id": "1bc903d7-6a2c-66ff-1cfe-411be6b47fa8"
} | {
"account_age_days": 971,
"account_id": "ACCT-7353EA95831E",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_1",
"session_entropy": 0.507
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 160,
"timestamp": "2026-01-03T10:27:00Z",
"transaction_amount_usd": 7.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.775,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5410929.82,
"financial_exposure_usd": 8055409.39,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104536",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-04T03:36:00Z",
"trace_id": "4ac1312c-fb3b-10bd-0f44-a404463bbbea"
} | {
"account_age_days": 1561,
"account_id": "ACCT-749C894217EB",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_1",
"session_entropy": 0.609
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 332,
"timestamp": "2026-01-04T03:36:00Z",
"transaction_amount_usd": 2959595.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.599,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2736629.08,
"financial_exposure_usd": 6762520.3,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108469",
"label": "benign",
"label_confidence": 0.593,
"severity": "medium",
"timestamp": "2026-01-06T21:09:00Z",
"trace_id": "afe90abf-529c-1fcb-2c13-aab53391c194"
} | {
"account_age_days": 29,
"account_id": "ACCT-C18057D4D011",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 531,
"timestamp": "2026-01-06T21:09:00Z",
"transaction_amount_usd": 3646.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.748,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2786.76,
"financial_exposure_usd": 5434.87,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105254",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "critical",
"timestamp": "2026-01-04T15:34:00Z",
"trace_id": "ab257684-06d3-4d83-0598-7c8dca603649"
} | {
"account_age_days": 1610,
"account_id": "ACCT-17A151B52CD1",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.839
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 268,
"timestamp": "2026-01-04T03:01:00Z",
"transaction_amount_usd": 8.39
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.648,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2656059.87,
"financial_exposure_usd": 6147327.92,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109812",
"label": "benign",
"label_confidence": 0.588,
"severity": "low",
"timestamp": "2026-01-07T19:32:00Z",
"trace_id": "81b8bd65-6bd3-ca9d-4f21-91399672720a"
} | {
"account_age_days": 1083,
"account_id": "ACCT-4C6DD87D45E2",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.597
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1003,
"timestamp": "2026-01-07T19:32:00Z",
"transaction_amount_usd": 3050.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 341.87,
"financial_exposure_usd": 795.51,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101203",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-01T20:03:00Z",
"trace_id": "c4578b7c-1498-3aed-8926-e294071f0086"
} | {
"account_age_days": 614,
"account_id": "ACCT-7DA38F7CF157",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 336,
"timestamp": "2026-01-01T20:03:00Z",
"transaction_amount_usd": 85384.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.558,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 432807.57,
"financial_exposure_usd": 820873.68,
"recoverable_pct": 0.1
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104990",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-04T11:10:00Z",
"trace_id": "4e9cdf17-e554-08b9-4a7b-fdc16be67b65"
} | {
"account_age_days": 1114,
"account_id": "ACCT-E8DFFD3382CE",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.423
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 535,
"timestamp": "2026-01-04T11:10:00Z",
"transaction_amount_usd": 1346837.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.533,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3442176.31,
"financial_exposure_usd": 4297070.68,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100803",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "low",
"timestamp": "2026-01-01T13:23:00Z",
"trace_id": "add28dc7-1415-596f-f5c3-1837d4611d95"
} | {
"account_age_days": 1486,
"account_id": "ACCT-FA6C82879B66",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 691,
"timestamp": "2026-01-01T13:23:00Z",
"transaction_amount_usd": 91505.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 480744.93,
"financial_exposure_usd": 689471.32,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104902",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-04T09:42:00Z",
"trace_id": "b6f7326b-c998-a19f-2f52-cf07e6158de5"
} | {
"account_age_days": 1755,
"account_id": "ACCT-E58CB49A754B",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_2",
"session_entropy": 0.46
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 203,
"timestamp": "2026-01-04T09:42:00Z",
"transaction_amount_usd": 1385720.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1513422.22,
"financial_exposure_usd": 2914217.86,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100090",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "low",
"timestamp": "2026-01-01T01:30:00Z",
"trace_id": "1735f36b-a5a6-ab3a-f575-7b77ff3c6d4e"
} | {
"account_age_days": 1439,
"account_id": "ACCT-9E4DA214EB03",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.139
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 673,
"timestamp": "2026-01-01T01:30:00Z",
"transaction_amount_usd": 115330.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.359,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1010342.25,
"financial_exposure_usd": 1071643,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104282",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-03T23:22:00Z",
"trace_id": "4a936ea4-9bf3-47d2-019d-55e6323fce44"
} | {
"account_age_days": 1751,
"account_id": "ACCT-304BD6DEF1F3",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.11
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 218,
"timestamp": "2026-01-03T11:14:00Z",
"transaction_amount_usd": 13.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5231993.1,
"financial_exposure_usd": 5791449.3,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107787",
"label": "benign",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-06T09:47:00Z",
"trace_id": "05bb22e3-c3c6-3173-4ab9-2648c3917104"
} | {
"account_age_days": 1923,
"account_id": "ACCT-EB34E058701D",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 178,
"timestamp": "2026-01-06T09:47:00Z",
"transaction_amount_usd": 6058.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2824.65,
"financial_exposure_usd": 6322.53,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101528",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "critical",
"timestamp": "2026-01-02T01:28:00Z",
"trace_id": "25d7809c-4519-a6a6-7ca0-b11a4a162356"
} | {
"account_age_days": 1344,
"account_id": "ACCT-5ACD5E7FEBA0",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_2",
"session_entropy": 0.654
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 344,
"timestamp": "2026-01-01T15:26:00Z",
"transaction_amount_usd": 13.12
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.722,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 764078.64,
"financial_exposure_usd": 777963.07,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108964",
"label": "benign",
"label_confidence": 0.557,
"severity": "medium",
"timestamp": "2026-01-07T05:24:00Z",
"trace_id": "1c47a86b-c7c7-3bf3-cb3a-30ebc5e3e012"
} | {
"account_age_days": 423,
"account_id": "ACCT-B9FB65E5A81A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.398
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 786,
"timestamp": "2026-01-07T05:24:00Z",
"transaction_amount_usd": 9287.87
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 905.6,
"financial_exposure_usd": 1779.43,
"recoverable_pct": 0.673
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107342",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-06T02:22:00Z",
"trace_id": "e43267d4-a244-484e-d6a2-261c4dd9affa"
} | {
"account_age_days": 1952,
"account_id": "ACCT-1C994F15B7AB",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.608
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1083,
"timestamp": "2026-01-06T02:22:00Z",
"transaction_amount_usd": 8381.54
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1509.69,
"financial_exposure_usd": 2936.84,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100475",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "medium",
"timestamp": "2026-01-01T07:55:00Z",
"trace_id": "8fc43937-f6d7-7d91-647e-7d755228b1af"
} | {
"account_age_days": 193,
"account_id": "ACCT-80FAE7B2A47A",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_3",
"session_entropy": 0.719
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 330,
"timestamp": "2026-01-01T03:28:00Z",
"transaction_amount_usd": 22.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.539,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 562499.38,
"financial_exposure_usd": 570525.39,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103943",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "critical",
"timestamp": "2026-01-03T17:43:00Z",
"trace_id": "ba7b461a-e290-dc7b-585f-0b128dbf08ca"
} | {
"account_age_days": 922,
"account_id": "ACCT-D2F6A84F8C3D",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_3",
"session_entropy": 0.424
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1154,
"timestamp": "2026-01-03T17:43:00Z",
"transaction_amount_usd": 2119973.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.423,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2901414.78,
"financial_exposure_usd": 4692716.53,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102571",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "medium",
"timestamp": "2026-01-02T18:51:00Z",
"trace_id": "5ac85620-2a07-136b-040b-827065404ece"
} | {
"account_age_days": 1688,
"account_id": "ACCT-55267FE3B7D5",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_1",
"session_entropy": 0.529
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 176,
"timestamp": "2026-01-02T18:51:00Z",
"transaction_amount_usd": 112940.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 690131.34,
"financial_exposure_usd": 769004.98,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103531",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-03T10:51:00Z",
"trace_id": "31383cca-9c91-9023-53c6-3a48701b2870"
} | {
"account_age_days": 358,
"account_id": "ACCT-570D5F07805C",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_2",
"session_entropy": 0.625
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1167,
"timestamp": "2026-01-03T10:51:00Z",
"transaction_amount_usd": 322404.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.457,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3061320.97,
"financial_exposure_usd": 3944968.2,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102861",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-02T23:41:00Z",
"trace_id": "a72b62db-4e57-853b-0e8a-dcdc91005714"
} | {
"account_age_days": 1123,
"account_id": "ACCT-5C5C64179699",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.164
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 215,
"timestamp": "2026-01-02T23:41:00Z",
"transaction_amount_usd": 66016.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 729775.13,
"financial_exposure_usd": 916996.1,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107824",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-06T10:24:00Z",
"trace_id": "76c63aea-892b-67a6-c0d9-e927a94b1613"
} | {
"account_age_days": 1951,
"account_id": "ACCT-014E70FB00ED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.146
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 972,
"timestamp": "2026-01-06T10:24:00Z",
"transaction_amount_usd": 8689.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1517.23,
"financial_exposure_usd": 1522.45,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108295",
"label": "benign",
"label_confidence": 0.518,
"severity": "low",
"timestamp": "2026-01-06T18:15:00Z",
"trace_id": "fd9eefaf-362e-c394-8817-3a080daeed44"
} | {
"account_age_days": 714,
"account_id": "ACCT-86D0304FA2C7",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.398
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 127,
"timestamp": "2026-01-06T16:24:00Z",
"transaction_amount_usd": 13.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1198.94,
"financial_exposure_usd": 2505.69,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106034",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-05T04:34:00Z",
"trace_id": "dcb48c7c-601a-166a-a67b-291e1407d096"
} | {
"account_age_days": 772,
"account_id": "ACCT-56897A8786D7",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.35
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 213,
"timestamp": "2026-01-04T20:41:00Z",
"transaction_amount_usd": 1.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.415,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1074333.05,
"financial_exposure_usd": 1260831.75,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100625",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-01T10:25:00Z",
"trace_id": "cfffdd05-0905-13a7-44f7-f400dca143cf"
} | {
"account_age_days": 1006,
"account_id": "ACCT-7DED034CA68A",
"baseline_risk_score": 0.533,
"kyc_tier": "tier_2",
"session_entropy": 0.298
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1079,
"timestamp": "2026-01-01T10:25:00Z",
"transaction_amount_usd": 110708.95
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 705431.98,
"financial_exposure_usd": 875507.73,
"recoverable_pct": 0.263
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109461",
"label": "benign",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-07T13:41:00Z",
"trace_id": "340321be-14da-d6dd-3e07-77696f830bbc"
} | {
"account_age_days": 396,
"account_id": "ACCT-EDAA20D064E6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.264
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 751,
"timestamp": "2026-01-07T13:41:00Z",
"transaction_amount_usd": 7280.49
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1251.49,
"financial_exposure_usd": 1382.65,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106916",
"label": "benign",
"label_confidence": 0.725,
"severity": "low",
"timestamp": "2026-01-05T19:16:00Z",
"trace_id": "0e1b4cf8-12ae-d399-5e55-a305f24277a5"
} | {
"account_age_days": 431,
"account_id": "ACCT-93BC0CF1E3F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.345
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 742,
"timestamp": "2026-01-05T19:16:00Z",
"transaction_amount_usd": 9326.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.46,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 715.74,
"financial_exposure_usd": 1108.12,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105644",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-04T22:04:00Z",
"trace_id": "a666d7fc-2282-52aa-fc2d-a98067214050"
} | {
"account_age_days": 910,
"account_id": "ACCT-A572D92789D2",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_1",
"session_entropy": 0.862
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1010,
"timestamp": "2026-01-04T22:04:00Z",
"transaction_amount_usd": 1609613.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4857468.44,
"financial_exposure_usd": 6161403.16,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104367",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "critical",
"timestamp": "2026-01-04T00:47:00Z",
"trace_id": "71eda30a-88c9-7fd3-a748-76208933ca1f"
} | {
"account_age_days": 1761,
"account_id": "ACCT-93EDC2431DF9",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.267
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 191,
"timestamp": "2026-01-03T21:05:00Z",
"transaction_amount_usd": 24.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.469,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4465999.13,
"financial_exposure_usd": 5502220.08,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105043",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-04T12:03:00Z",
"trace_id": "e876101b-00e6-78a2-c1a0-da89bd242148"
} | {
"account_age_days": 780,
"account_id": "ACCT-279BF2557191",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_1",
"session_entropy": 0.552
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 371,
"timestamp": "2026-01-04T12:03:00Z",
"transaction_amount_usd": 1622621.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.471,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2711533.06,
"financial_exposure_usd": 4572640.33,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101143",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "low",
"timestamp": "2026-01-01T19:03:00Z",
"trace_id": "d3bd36a5-9781-c643-bea4-8b30a942b580"
} | {
"account_age_days": 839,
"account_id": "ACCT-F785CE14C264",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_1",
"session_entropy": 0.309
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 558,
"timestamp": "2026-01-01T19:03:00Z",
"transaction_amount_usd": 57868.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.742,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 341494.3,
"financial_exposure_usd": 468316.91,
"recoverable_pct": 0.256
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101603",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "high",
"timestamp": "2026-01-02T02:43:00Z",
"trace_id": "e2d4daf4-db2f-828c-1ec1-5006cf7dcd6e"
} | {
"account_age_days": 1334,
"account_id": "ACCT-C15497845D97",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_3",
"session_entropy": 0.102
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 431,
"timestamp": "2026-01-02T02:43:00Z",
"transaction_amount_usd": 13569.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 296818.2,
"financial_exposure_usd": 540937.32,
"recoverable_pct": 0.229
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102558",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "low",
"timestamp": "2026-01-02T18:38:00Z",
"trace_id": "651acebc-b340-0f3b-4cbc-6d6bfcd1a3a7"
} | {
"account_age_days": 1273,
"account_id": "ACCT-0EAD76800D15",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 184,
"timestamp": "2026-01-02T07:12:00Z",
"transaction_amount_usd": 21.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 463604.4,
"financial_exposure_usd": 899803.03,
"recoverable_pct": 0.386
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101696",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "critical",
"timestamp": "2026-01-02T04:16:00Z",
"trace_id": "dfa97cd6-78be-b9ad-17ed-5f7f20d56328"
} | {
"account_age_days": 802,
"account_id": "ACCT-3A63C6FF3A1D",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.757
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1031,
"timestamp": "2026-01-02T04:16:00Z",
"transaction_amount_usd": 10854.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.395,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 638079.29,
"financial_exposure_usd": 1209649.74,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102602",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-02T19:22:00Z",
"trace_id": "5041a062-2487-626f-1ca2-eaad5188ee71"
} | {
"account_age_days": 1158,
"account_id": "ACCT-C12E4EED637C",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_3",
"session_entropy": 0.704
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 229,
"timestamp": "2026-01-02T19:22:00Z",
"transaction_amount_usd": 40592.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.461,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 361337.73,
"financial_exposure_usd": 469378.2,
"recoverable_pct": 0.353
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100867",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-01T14:27:00Z",
"trace_id": "46c45d07-07fe-95c2-2db3-701f6b67998a"
} | {
"account_age_days": 1410,
"account_id": "ACCT-5F51249ED4D6",
"baseline_risk_score": 0.62,
"kyc_tier": "tier_2",
"session_entropy": 0.234
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1191,
"timestamp": "2026-01-01T14:27:00Z",
"transaction_amount_usd": 67634.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.642,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 168541.49,
"financial_exposure_usd": 309346.98,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107025",
"label": "benign",
"label_confidence": 0.641,
"severity": "high",
"timestamp": "2026-01-05T21:05:00Z",
"trace_id": "149f9d2d-6124-d20b-f388-078c2643728d"
} | {
"account_age_days": 1737,
"account_id": "ACCT-605225362768",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.224
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 192,
"timestamp": "2026-01-05T19:02:00Z",
"transaction_amount_usd": 3.68
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 166.8,
"financial_exposure_usd": 361.06,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105162",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "low",
"timestamp": "2026-01-04T14:02:00Z",
"trace_id": "417da7ee-773c-1277-1bd9-7565b0c31364"
} | {
"account_age_days": 751,
"account_id": "ACCT-196BC5476786",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1068,
"timestamp": "2026-01-04T14:02:00Z",
"transaction_amount_usd": 1740531.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.904,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7717411.09,
"financial_exposure_usd": 7765607.25,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107897",
"label": "benign",
"label_confidence": 0.633,
"severity": "medium",
"timestamp": "2026-01-06T11:37:00Z",
"trace_id": "d522cf1f-d966-c095-519d-0d585600e109"
} | {
"account_age_days": 578,
"account_id": "ACCT-A7604EAF168E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.551
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 674,
"timestamp": "2026-01-06T11:37:00Z",
"transaction_amount_usd": 5718.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.57,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 240.54,
"financial_exposure_usd": 584.04,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109404",
"label": "benign",
"label_confidence": 0.587,
"severity": "low",
"timestamp": "2026-01-07T12:44:00Z",
"trace_id": "31cb2bf9-4307-1917-12c4-0ccbfd086b89"
} | {
"account_age_days": 1887,
"account_id": "ACCT-E8B75C4FD508",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 612,
"timestamp": "2026-01-07T12:44:00Z",
"transaction_amount_usd": 6218.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2042.09,
"financial_exposure_usd": 2402.15,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100996",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-01T16:36:00Z",
"trace_id": "39d2797b-3284-4849-2a16-75a1f97cbde7"
} | {
"account_age_days": 552,
"account_id": "ACCT-F0D56702C524",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1085,
"timestamp": "2026-01-01T16:36:00Z",
"transaction_amount_usd": 2928.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 808566.66,
"financial_exposure_usd": 1009585.08,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106358",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-05T09:58:00Z",
"trace_id": "ab69b841-9a76-4e48-03a6-e77b59a0583a"
} | {
"account_age_days": 1729,
"account_id": "ACCT-7F84E7E57C22",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_1",
"session_entropy": 0.852
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 275,
"timestamp": "2026-01-05T06:26:00Z",
"transaction_amount_usd": 21.39
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3198594.64,
"financial_exposure_usd": 5642517.23,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109376",
"label": "benign",
"label_confidence": 0.537,
"severity": "medium",
"timestamp": "2026-01-07T12:16:00Z",
"trace_id": "abbcaf5b-38d7-0fcf-cfb7-c14bc69f7f01"
} | {
"account_age_days": 700,
"account_id": "ACCT-079C237D57D4",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_2",
"session_entropy": 0.272
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 399,
"timestamp": "2026-01-07T12:16:00Z",
"transaction_amount_usd": 5846.74
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2085.38,
"financial_exposure_usd": 2522.35,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108592",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-06T23:12:00Z",
"trace_id": "32398fe0-0d7b-f816-c548-04f52432c097"
} | {
"account_age_days": 1259,
"account_id": "ACCT-602E66727972",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.758
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 885,
"timestamp": "2026-01-06T23:12:00Z",
"transaction_amount_usd": 5461.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1440.16,
"financial_exposure_usd": 2528.3,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103442",
"label": "fraudulent",
"label_confidence": 0.637,
"severity": "high",
"timestamp": "2026-01-03T09:22:00Z",
"trace_id": "9a401025-f9be-c0da-103e-cd33a45be83a"
} | {
"account_age_days": 1753,
"account_id": "ACCT-1D0E55A45E22",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_2",
"session_entropy": 0.452
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 305,
"timestamp": "2026-01-02T22:49:00Z",
"transaction_amount_usd": 12.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1888338.26,
"financial_exposure_usd": 2075390.59,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108409",
"label": "benign",
"label_confidence": 0.615,
"severity": "low",
"timestamp": "2026-01-06T20:09:00Z",
"trace_id": "a0bc8ddd-541a-7a77-279c-0bc57799e5fc"
} | {
"account_age_days": 1634,
"account_id": "ACCT-70DF893B601C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 630,
"timestamp": "2026-01-06T20:09:00Z",
"transaction_amount_usd": 13614.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1407.43,
"financial_exposure_usd": 1693.13,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108039",
"label": "benign",
"label_confidence": 0.535,
"severity": "low",
"timestamp": "2026-01-06T13:59:00Z",
"trace_id": "0a50c8b1-4695-4f47-502e-5ce6d67834e5"
} | {
"account_age_days": 354,
"account_id": "ACCT-8918B8F3FE52",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 137,
"timestamp": "2026-01-06T13:59:00Z",
"transaction_amount_usd": 8279.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 973.43,
"financial_exposure_usd": 2313.05,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.