schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107674",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-06T07:54:00Z",
"trace_id": "2ad8fb79-7cdf-1ff0-4e6f-f9e4136e7f3f"
} | {
"account_age_days": 22,
"account_id": "ACCT-788285E38707",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_1",
"session_entropy": 0.544
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 964,
"timestamp": "2026-01-06T07:54:00Z",
"transaction_amount_usd": 193.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1008.83,
"financial_exposure_usd": 1647.65,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104561",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-04T04:01:00Z",
"trace_id": "57276233-5a14-499b-4116-89a6d486e60c"
} | {
"account_age_days": 506,
"account_id": "ACCT-D351CC22339E",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 348,
"timestamp": "2026-01-03T19:44:00Z",
"transaction_amount_usd": 1.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2488050.6,
"financial_exposure_usd": 3069453.89,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103094",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "critical",
"timestamp": "2026-01-03T03:34:00Z",
"trace_id": "83aca404-39f8-c8de-4531-ffd8d7ef850f"
} | {
"account_age_days": 647,
"account_id": "ACCT-BF0CF56CC50F",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.351
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 313,
"timestamp": "2026-01-02T23:41:00Z",
"transaction_amount_usd": 12.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 609725.54,
"financial_exposure_usd": 632933.59,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101335",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "critical",
"timestamp": "2026-01-01T22:15:00Z",
"trace_id": "3dc60420-16a9-79fa-5b07-3c0df17d7d20"
} | {
"account_age_days": 909,
"account_id": "ACCT-C2CCDB88741C",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_1",
"session_entropy": 0.555
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 289,
"timestamp": "2026-01-01T22:15:00Z",
"transaction_amount_usd": 10455.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.755,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 547093.71,
"financial_exposure_usd": 862064.45,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102735",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-02T21:35:00Z",
"trace_id": "479e454d-df37-daa5-afc4-1d40399704e9"
} | {
"account_age_days": 556,
"account_id": "ACCT-470B974A9FA3",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 622,
"timestamp": "2026-01-02T21:35:00Z",
"transaction_amount_usd": 86658.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 969716.62,
"financial_exposure_usd": 1217356.66,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100605",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "medium",
"timestamp": "2026-01-01T10:05:00Z",
"trace_id": "e3c03b6f-8e59-de43-a449-bb3ae78bfdbd"
} | {
"account_age_days": 972,
"account_id": "ACCT-A2262E37E885",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.103
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 971,
"timestamp": "2026-01-01T10:05:00Z",
"transaction_amount_usd": 58634.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 588901.61,
"financial_exposure_usd": 641100.85,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106867",
"label": "benign",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-05T18:27:00Z",
"trace_id": "a5f9e26b-5308-1fd7-ae89-9ed7dfda72e0"
} | {
"account_age_days": 1393,
"account_id": "ACCT-84A11322E7CB",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_3",
"session_entropy": 0.561
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 109,
"timestamp": "2026-01-05T18:27:00Z",
"transaction_amount_usd": 288.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1592.16,
"financial_exposure_usd": 1990.13,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102608",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-02T19:28:00Z",
"trace_id": "ac15c208-e666-5495-f2f9-862dff36556c"
} | {
"account_age_days": 1995,
"account_id": "ACCT-14891C911524",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.207
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 825,
"timestamp": "2026-01-02T19:28:00Z",
"transaction_amount_usd": 31696.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 192296.3,
"financial_exposure_usd": 396179.08,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103150",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-03T04:30:00Z",
"trace_id": "ffef37be-e9c8-16e0-ceaa-8c7970bff454"
} | {
"account_age_days": 447,
"account_id": "ACCT-7A3557598350",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.764
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1175,
"timestamp": "2026-01-03T04:30:00Z",
"transaction_amount_usd": 38840.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.754,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 283681.13,
"financial_exposure_usd": 581837.35,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100539",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-01T08:59:00Z",
"trace_id": "94167854-bf05-c5cc-c50d-751e6b112953"
} | {
"account_age_days": 3,
"account_id": "ACCT-8B4AD6256977",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_3",
"session_entropy": 0.709
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 330,
"timestamp": "2026-01-01T04:45:00Z",
"transaction_amount_usd": 3.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 512952.83,
"financial_exposure_usd": 1231545.38,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108286",
"label": "benign",
"label_confidence": 0.624,
"severity": "critical",
"timestamp": "2026-01-06T18:06:00Z",
"trace_id": "22141c66-85ef-6f5b-6c09-ce2fc90f71f8"
} | {
"account_age_days": 1832,
"account_id": "ACCT-14E71A0C3A28",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 559,
"timestamp": "2026-01-06T18:06:00Z",
"transaction_amount_usd": 9951.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 984.04,
"financial_exposure_usd": 1306.49,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109561",
"label": "benign",
"label_confidence": 0.46,
"severity": "high",
"timestamp": "2026-01-07T15:21:00Z",
"trace_id": "66b09b41-c2ad-c4fe-1210-eae98f7f8801"
} | {
"account_age_days": 1466,
"account_id": "ACCT-8E568F9DF408",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_2",
"session_entropy": 0.641
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 749,
"timestamp": "2026-01-07T15:21:00Z",
"transaction_amount_usd": 11720.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1370.41,
"financial_exposure_usd": 1433.4,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104327",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-04T00:07:00Z",
"trace_id": "c2eda28a-551f-075a-12ca-639095c08a6e"
} | {
"account_age_days": 1868,
"account_id": "ACCT-A00DECEDD3DB",
"baseline_risk_score": 0.247,
"kyc_tier": "tier_1",
"session_entropy": 0.283
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 290,
"timestamp": "2026-01-04T00:07:00Z",
"transaction_amount_usd": 2131053.48
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.904,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 447562.19,
"financial_exposure_usd": 934484.52,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103309",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T07:09:00Z",
"trace_id": "09df416c-b976-bbfb-ef03-d3cdd168e72b"
} | {
"account_age_days": 1731,
"account_id": "ACCT-0A3A0FA2D7F9",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_1",
"session_entropy": 0.627
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 295,
"timestamp": "2026-01-02T23:08:00Z",
"transaction_amount_usd": 9.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 263776.05,
"financial_exposure_usd": 587478.29,
"recoverable_pct": 0.149
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106246",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-05T08:06:00Z",
"trace_id": "e842c3b7-f65d-bd74-18b2-2608f12ea333"
} | {
"account_age_days": 743,
"account_id": "ACCT-17E1ED221BF5",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 119,
"timestamp": "2026-01-05T04:38:00Z",
"transaction_amount_usd": 8.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.904,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2467692.66,
"financial_exposure_usd": 2951561.28,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103143",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-03T04:23:00Z",
"trace_id": "55fda0e5-d5d7-bae9-5a0b-7c23f9c0f03e"
} | {
"account_age_days": 1017,
"account_id": "ACCT-EE07F5EADCDB",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_2",
"session_entropy": 0.325
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 94,
"timestamp": "2026-01-03T04:23:00Z",
"transaction_amount_usd": 4854.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 890839.47,
"financial_exposure_usd": 1204190.84,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101981",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-02T09:01:00Z",
"trace_id": "27906225-7532-5e0a-51d8-f93702c244b0"
} | {
"account_age_days": 463,
"account_id": "ACCT-92C6C3877D7E",
"baseline_risk_score": 0.459,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 293,
"timestamp": "2026-01-01T21:24:00Z",
"transaction_amount_usd": 16.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 338668.08,
"financial_exposure_usd": 384978.16,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106435",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-05T11:15:00Z",
"trace_id": "e27b2ebb-94f7-4a74-f4db-f4e38e1af9d6"
} | {
"account_age_days": 1416,
"account_id": "ACCT-A0DBC657D6A7",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.339
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 120,
"timestamp": "2026-01-04T22:47:00Z",
"transaction_amount_usd": 10.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3480250.22,
"financial_exposure_usd": 6267587.04,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109778",
"label": "benign",
"label_confidence": 0.51,
"severity": "high",
"timestamp": "2026-01-07T18:58:00Z",
"trace_id": "2986e1b1-e346-9bf3-6c40-36511b0f432e"
} | {
"account_age_days": 1487,
"account_id": "ACCT-C642A52EC4FF",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_1",
"session_entropy": 0.704
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 694,
"timestamp": "2026-01-07T18:58:00Z",
"transaction_amount_usd": 2551.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1718.93,
"financial_exposure_usd": 2712.43,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104221",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-03T22:21:00Z",
"trace_id": "7f67aca7-136a-a200-e138-ca5289f086fe"
} | {
"account_age_days": 1677,
"account_id": "ACCT-067D4552A15F",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_2",
"session_entropy": 0.674
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 527,
"timestamp": "2026-01-03T22:21:00Z",
"transaction_amount_usd": 261993.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2524810.73,
"financial_exposure_usd": 4654150.4,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109659",
"label": "benign",
"label_confidence": 0.498,
"severity": "medium",
"timestamp": "2026-01-07T16:59:00Z",
"trace_id": "999c6755-7bdb-8096-2aed-cf239c6f5d7c"
} | {
"account_age_days": 124,
"account_id": "ACCT-D9A890A5B875",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.218
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 115,
"timestamp": "2026-01-07T06:31:00Z",
"transaction_amount_usd": 0.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1745.47,
"financial_exposure_usd": 3836.16,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104123",
"label": "fraudulent",
"label_confidence": 0.62,
"severity": "critical",
"timestamp": "2026-01-03T20:43:00Z",
"trace_id": "3e09d009-36ec-2032-8bcf-285c71c644d1"
} | {
"account_age_days": 3,
"account_id": "ACCT-B54DF448B4E9",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_3",
"session_entropy": 0.827
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 698,
"timestamp": "2026-01-03T20:43:00Z",
"transaction_amount_usd": 119181.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.468,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3526239.99,
"financial_exposure_usd": 3572591.16,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109842",
"label": "benign",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-07T20:02:00Z",
"trace_id": "a643547a-9981-1acc-9bb3-06c31df7fa4d"
} | {
"account_age_days": 781,
"account_id": "ACCT-C48ECC8BF84D",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.612
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 313,
"timestamp": "2026-01-07T10:06:00Z",
"transaction_amount_usd": 22.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.53,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4271.38,
"financial_exposure_usd": 4526.69,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100140",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-01T02:20:00Z",
"trace_id": "66ba7e51-21de-2360-1ed6-8b713ab8ec3f"
} | {
"account_age_days": 398,
"account_id": "ACCT-A783D1C8E250",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_3",
"session_entropy": 0.795
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 106,
"timestamp": "2026-01-01T00:40:00Z",
"transaction_amount_usd": 15.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 668215.26,
"financial_exposure_usd": 692385.9,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106439",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "low",
"timestamp": "2026-01-05T11:19:00Z",
"trace_id": "f52ec3d5-cebb-538b-02da-6a91a9f64770"
} | {
"account_age_days": 608,
"account_id": "ACCT-703BA07AD78B",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_2",
"session_entropy": 0.791
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 135,
"timestamp": "2026-01-05T11:19:00Z",
"transaction_amount_usd": 1399320.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.852,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4232715.65,
"financial_exposure_usd": 5264190.16,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108345",
"label": "benign",
"label_confidence": 0.575,
"severity": "medium",
"timestamp": "2026-01-06T19:05:00Z",
"trace_id": "c0ec987e-1637-c1cd-decc-dc57f3b999ae"
} | {
"account_age_days": 1442,
"account_id": "ACCT-E1F1F240FB10",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.906
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 301,
"timestamp": "2026-01-06T17:34:00Z",
"transaction_amount_usd": 8.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1197.13,
"financial_exposure_usd": 2629.47,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109010",
"label": "benign",
"label_confidence": 0.642,
"severity": "critical",
"timestamp": "2026-01-07T06:10:00Z",
"trace_id": "1e0ac96c-3aa4-8ff4-665e-47fc8f174d0f"
} | {
"account_age_days": 510,
"account_id": "ACCT-CABA3DA4930C",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.295
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 220,
"timestamp": "2026-01-07T06:10:00Z",
"transaction_amount_usd": 3294.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1672.73,
"financial_exposure_usd": 2784.85,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104311",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-03T23:51:00Z",
"trace_id": "ac72f17c-1105-8154-9ab6-ab9752320822"
} | {
"account_age_days": 161,
"account_id": "ACCT-3C3FAE32F9AD",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.218
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 753,
"timestamp": "2026-01-03T23:51:00Z",
"transaction_amount_usd": 1155223.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 544899.01,
"financial_exposure_usd": 1359142.98,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102576",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "low",
"timestamp": "2026-01-02T18:56:00Z",
"trace_id": "661dc661-8f45-6f16-bb70-602dff4aabcc"
} | {
"account_age_days": 1041,
"account_id": "ACCT-67B3FF6A6425",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 1075,
"timestamp": "2026-01-02T18:56:00Z",
"transaction_amount_usd": 69902.35
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 860768.54,
"financial_exposure_usd": 1084509.6,
"recoverable_pct": 0.194
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109557",
"label": "benign",
"label_confidence": 0.578,
"severity": "low",
"timestamp": "2026-01-07T15:17:00Z",
"trace_id": "c3b6e089-4511-8f05-fe37-e496058d6c21"
} | {
"account_age_days": 1837,
"account_id": "ACCT-A121CC878ABF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.231
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 231,
"timestamp": "2026-01-07T15:17:00Z",
"transaction_amount_usd": 4012.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2315.3,
"financial_exposure_usd": 3483.46,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104170",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-03T21:30:00Z",
"trace_id": "2d813881-619b-2985-d052-91945db42969"
} | {
"account_age_days": 1856,
"account_id": "ACCT-68C1B7B6952E",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1015,
"timestamp": "2026-01-03T21:30:00Z",
"transaction_amount_usd": 2744087.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1183679.71,
"financial_exposure_usd": 2226144.53,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108563",
"label": "benign",
"label_confidence": 0.473,
"severity": "medium",
"timestamp": "2026-01-06T22:43:00Z",
"trace_id": "77ec9336-91cd-de4c-eca5-e831fd43595a"
} | {
"account_age_days": 1957,
"account_id": "ACCT-5524B1B67318",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_1",
"session_entropy": 0.433
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 863,
"timestamp": "2026-01-06T22:43:00Z",
"transaction_amount_usd": 6330.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 289.29,
"financial_exposure_usd": 513.22,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106206",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-05T07:26:00Z",
"trace_id": "82bd2102-7125-6be2-8813-f935f5e8db36"
} | {
"account_age_days": 715,
"account_id": "ACCT-AB0D3A8B7FAE",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.517
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 573,
"timestamp": "2026-01-05T07:26:00Z",
"transaction_amount_usd": 854862.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5034172.2,
"financial_exposure_usd": 6941904.11,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100807",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-01T13:27:00Z",
"trace_id": "e9f11fa5-dde5-9153-5ba2-80323f30ba99"
} | {
"account_age_days": 1420,
"account_id": "ACCT-8A151E9AFCA7",
"baseline_risk_score": 0.488,
"kyc_tier": "tier_2",
"session_entropy": 0.738
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 516,
"timestamp": "2026-01-01T13:27:00Z",
"transaction_amount_usd": 82511.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 335127.45,
"financial_exposure_usd": 646342.14,
"recoverable_pct": 0.313
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103973",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "low",
"timestamp": "2026-01-03T18:13:00Z",
"trace_id": "5f6e7d94-d14e-d2df-f29c-4b4286c50ee4"
} | {
"account_age_days": 1198,
"account_id": "ACCT-D37F1C1953F5",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_3",
"session_entropy": 0.802
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 877,
"timestamp": "2026-01-03T18:13:00Z",
"transaction_amount_usd": 1930555.52
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2784712.29,
"financial_exposure_usd": 6596835.88,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101107",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-01T18:27:00Z",
"trace_id": "5d21854e-5564-248f-6dc7-07c8f4d34a04"
} | {
"account_age_days": 129,
"account_id": "ACCT-82888ADAE72D",
"baseline_risk_score": 0.453,
"kyc_tier": "tier_3",
"session_entropy": 0.896
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 253,
"timestamp": "2026-01-01T10:58:00Z",
"transaction_amount_usd": 20.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 323024.78,
"financial_exposure_usd": 565934.84,
"recoverable_pct": 0.256
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101330",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "critical",
"timestamp": "2026-01-01T22:10:00Z",
"trace_id": "e3e5ef84-49d0-c69c-0686-514a3508b646"
} | {
"account_age_days": 12,
"account_id": "ACCT-9CEBEE3EFAE4",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_3",
"session_entropy": 0.481
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 715,
"timestamp": "2026-01-01T22:10:00Z",
"transaction_amount_usd": 4900.25
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1250217.47,
"financial_exposure_usd": 1277102.93,
"recoverable_pct": 0.093
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108928",
"label": "benign",
"label_confidence": 0.607,
"severity": "low",
"timestamp": "2026-01-07T04:48:00Z",
"trace_id": "caeea655-568a-2c63-80ec-2fd298b12655"
} | {
"account_age_days": 351,
"account_id": "ACCT-2E8A92B0BBB3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.381
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1055,
"timestamp": "2026-01-07T04:48:00Z",
"transaction_amount_usd": 5228.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4180.68,
"financial_exposure_usd": 6053.97,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101439",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "critical",
"timestamp": "2026-01-01T23:59:00Z",
"trace_id": "e3039b08-641c-d39a-2ad2-fc4e6fd9c9f8"
} | {
"account_age_days": 1984,
"account_id": "ACCT-96FDB439AC16",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.72
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 358,
"timestamp": "2026-01-01T19:01:00Z",
"transaction_amount_usd": 24.76
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1147280.81,
"financial_exposure_usd": 1356532.46,
"recoverable_pct": 0.187
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108403",
"label": "benign",
"label_confidence": 0.484,
"severity": "low",
"timestamp": "2026-01-06T20:03:00Z",
"trace_id": "3dc00c23-8b6d-4c09-b303-aff76dfec5da"
} | {
"account_age_days": 931,
"account_id": "ACCT-F740CD4835D8",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1021,
"timestamp": "2026-01-06T20:03:00Z",
"transaction_amount_usd": 10527.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2418.52,
"financial_exposure_usd": 2750.34,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101405",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "medium",
"timestamp": "2026-01-01T23:25:00Z",
"trace_id": "16267c74-2678-9663-c800-40ea8f21656e"
} | {
"account_age_days": 330,
"account_id": "ACCT-6E1A33AE16B3",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.791
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 305,
"timestamp": "2026-01-01T12:10:00Z",
"transaction_amount_usd": 7.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 783309.86,
"financial_exposure_usd": 894232.6,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102462",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "high",
"timestamp": "2026-01-02T17:02:00Z",
"trace_id": "7cea323d-debb-9909-4b75-9a47ee9101c0"
} | {
"account_age_days": 208,
"account_id": "ACCT-73097BA1A619",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_1",
"session_entropy": 0.631
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 516,
"timestamp": "2026-01-02T17:02:00Z",
"transaction_amount_usd": 4782.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.599,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 472007.24,
"financial_exposure_usd": 1130213.06,
"recoverable_pct": 0.338
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107185",
"label": "benign",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-05T23:45:00Z",
"trace_id": "ed6c4e67-419f-24cf-4c28-05c0f1a9fd50"
} | {
"account_age_days": 755,
"account_id": "ACCT-AA233B96EB89",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 477,
"timestamp": "2026-01-05T23:45:00Z",
"transaction_amount_usd": 7197.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 626.81,
"financial_exposure_usd": 1086.68,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104725",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-04T06:45:00Z",
"trace_id": "7a989ace-9e57-e21e-07f6-202fac452c99"
} | {
"account_age_days": 548,
"account_id": "ACCT-B0ECB766611A",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.579
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 548,
"timestamp": "2026-01-04T06:45:00Z",
"transaction_amount_usd": 2632333.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.7,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3561484.43,
"financial_exposure_usd": 7857063.36,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102791",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T22:31:00Z",
"trace_id": "96f63af8-3730-3c38-9b68-95f1c11dd196"
} | {
"account_age_days": 1791,
"account_id": "ACCT-73D9E9671308",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_2",
"session_entropy": 0.761
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 967,
"timestamp": "2026-01-02T22:31:00Z",
"transaction_amount_usd": 60283.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.445,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 22198.29,
"financial_exposure_usd": 33473.44,
"recoverable_pct": 0.306
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107181",
"label": "benign",
"label_confidence": 0.582,
"severity": "high",
"timestamp": "2026-01-05T23:41:00Z",
"trace_id": "453e1669-3b04-6dd3-e31a-71c326a49feb"
} | {
"account_age_days": 1158,
"account_id": "ACCT-9A2D7E5CD8F4",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_1",
"session_entropy": 0.556
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 230,
"timestamp": "2026-01-05T23:41:00Z",
"transaction_amount_usd": 14996.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1903.38,
"financial_exposure_usd": 3267.35,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102368",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-02T15:28:00Z",
"trace_id": "e90af85f-2239-ff51-d332-d008b585b1b6"
} | {
"account_age_days": 777,
"account_id": "ACCT-14B4D58008AF",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_2",
"session_entropy": 0.576
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 239,
"timestamp": "2026-01-02T13:16:00Z",
"transaction_amount_usd": 19.69
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.95,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103317",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "medium",
"timestamp": "2026-01-03T07:17:00Z",
"trace_id": "ed3f65d1-5d0c-9795-9326-2cfe2b7706c4"
} | {
"account_age_days": 171,
"account_id": "ACCT-000F1F742BF2",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_2",
"session_entropy": 0.463
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 346,
"timestamp": "2026-01-02T21:09:00Z",
"transaction_amount_usd": 5.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 608345.02,
"financial_exposure_usd": 1306866.61,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108356",
"label": "benign",
"label_confidence": 0.518,
"severity": "low",
"timestamp": "2026-01-06T19:16:00Z",
"trace_id": "38ff5637-c137-432e-19da-62db4cdd0a4b"
} | {
"account_age_days": 836,
"account_id": "ACCT-EBE3F8A78189",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.489
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 591,
"timestamp": "2026-01-06T19:16:00Z",
"transaction_amount_usd": 3890.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.768,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1929.91,
"financial_exposure_usd": 2790.21,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101262",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-01T21:02:00Z",
"trace_id": "a75d9819-302f-fa44-c4f8-cb17dde6af33"
} | {
"account_age_days": 580,
"account_id": "ACCT-F241DA4D0695",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_1",
"session_entropy": 0.896
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 128,
"timestamp": "2026-01-01T19:10:00Z",
"transaction_amount_usd": 14.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.813,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 536144.02,
"financial_exposure_usd": 974313.65,
"recoverable_pct": 0.091
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100042",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-01T00:42:00Z",
"trace_id": "71efe72a-ae13-591e-84fa-4c7239e7a4f1"
} | {
"account_age_days": 651,
"account_id": "ACCT-FCA455670316",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_1",
"session_entropy": 0.407
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 324,
"timestamp": "2026-01-01T00:15:00Z",
"transaction_amount_usd": 21.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 513863.88,
"financial_exposure_usd": 829819.9,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105565",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-04T20:45:00Z",
"trace_id": "cd53008e-a9d9-75de-ab26-a4139972ffaf"
} | {
"account_age_days": 1743,
"account_id": "ACCT-44089414E73C",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.827
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 328,
"timestamp": "2026-01-04T20:45:00Z",
"transaction_amount_usd": 514328.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3572341.18,
"financial_exposure_usd": 6832673.11,
"recoverable_pct": 0.518
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100547",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "critical",
"timestamp": "2026-01-01T09:07:00Z",
"trace_id": "ef2c6b0d-6cb0-80bd-dc57-97c943844449"
} | {
"account_age_days": 873,
"account_id": "ACCT-180695CB0920",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_2",
"session_entropy": 0.432
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 885,
"timestamp": "2026-01-01T09:07:00Z",
"transaction_amount_usd": 56727.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 496981.47,
"financial_exposure_usd": 653084.84,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109670",
"label": "benign",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-07T17:10:00Z",
"trace_id": "68548101-71e9-37d1-c1aa-9c121e9062c5"
} | {
"account_age_days": 160,
"account_id": "ACCT-2E3792C8C06F",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_3",
"session_entropy": 0.16
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 152,
"timestamp": "2026-01-07T10:26:00Z",
"transaction_amount_usd": 15.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2278.84,
"financial_exposure_usd": 2423.7,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106923",
"label": "benign",
"label_confidence": 0.533,
"severity": "low",
"timestamp": "2026-01-05T19:23:00Z",
"trace_id": "bb2fb6fc-b039-adc9-0fc6-d062b34d47d5"
} | {
"account_age_days": 1751,
"account_id": "ACCT-513C22B0055D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.507
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 771,
"timestamp": "2026-01-05T19:23:00Z",
"transaction_amount_usd": 11987.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2527.88,
"financial_exposure_usd": 6230.31,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108065",
"label": "benign",
"label_confidence": 0.487,
"severity": "low",
"timestamp": "2026-01-06T14:25:00Z",
"trace_id": "e0ab7fe5-1e74-3521-3ce3-ff1a9320561e"
} | {
"account_age_days": 368,
"account_id": "ACCT-33FBBE033408",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.906
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 454,
"timestamp": "2026-01-06T14:25:00Z",
"transaction_amount_usd": 12712
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3579.43,
"financial_exposure_usd": 4442.1,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104014",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-03T18:54:00Z",
"trace_id": "a949afd6-e0cd-1042-0b06-9fe4eaab5c42"
} | {
"account_age_days": 1740,
"account_id": "ACCT-F7A20CF488F9",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_1",
"session_entropy": 0.196
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 723,
"timestamp": "2026-01-03T18:54:00Z",
"transaction_amount_usd": 1302485.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.402,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2242966.13,
"financial_exposure_usd": 4649094.66,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106620",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-05T14:20:00Z",
"trace_id": "1f14d85e-b4cc-11a8-a331-7a11ccb9fe3c"
} | {
"account_age_days": 768,
"account_id": "ACCT-D5D951180924",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_3",
"session_entropy": 0.198
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 498,
"timestamp": "2026-01-05T14:20:00Z",
"transaction_amount_usd": 2075187.08
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1731004.69,
"financial_exposure_usd": 3467952.17,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106048",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-05T04:48:00Z",
"trace_id": "cabce121-f96e-5185-9667-67af46a6c119"
} | {
"account_age_days": 472,
"account_id": "ACCT-3952DB108E06",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.293
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 945,
"timestamp": "2026-01-05T04:48:00Z",
"transaction_amount_usd": 701886.49
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.421,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5687836.79,
"financial_exposure_usd": 6879122.72,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108566",
"label": "benign",
"label_confidence": 0.481,
"severity": "medium",
"timestamp": "2026-01-06T22:46:00Z",
"trace_id": "660878c3-2ceb-f299-efc2-0fe6ab8b576f"
} | {
"account_age_days": 1145,
"account_id": "ACCT-1858A13E6D9D",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.716
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 243,
"timestamp": "2026-01-06T17:17:00Z",
"transaction_amount_usd": 11.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 418.85,
"financial_exposure_usd": 1044.04,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101275",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-01T21:15:00Z",
"trace_id": "2ecdf591-3733-0290-13b4-40df7a7a389a"
} | {
"account_age_days": 622,
"account_id": "ACCT-44FF7982CCFF",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_3",
"session_entropy": 0.428
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1194,
"timestamp": "2026-01-01T21:15:00Z",
"transaction_amount_usd": 109601.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.682,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 612180.52,
"financial_exposure_usd": 1036694.12,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106264",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-05T08:24:00Z",
"trace_id": "76ff7d97-f867-acf4-c4e8-45639c292c56"
} | {
"account_age_days": 1404,
"account_id": "ACCT-9686049FDBCB",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_2",
"session_entropy": 0.599
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 362,
"timestamp": "2026-01-04T20:49:00Z",
"transaction_amount_usd": 24.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.934,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4162581.77,
"financial_exposure_usd": 7013197.45,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101133",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-01T18:53:00Z",
"trace_id": "5732af79-b7d3-447f-4fe2-6f045847367b"
} | {
"account_age_days": 1411,
"account_id": "ACCT-E6150ED57F68",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.665
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 175,
"timestamp": "2026-01-01T15:29:00Z",
"transaction_amount_usd": 9.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.689,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 200718.78,
"financial_exposure_usd": 247231.3,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109221",
"label": "benign",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-07T09:41:00Z",
"trace_id": "337466d0-45cc-db29-7cb3-9a15d704ff92"
} | {
"account_age_days": 510,
"account_id": "ACCT-A10EB12F3F74",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.141
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 211,
"timestamp": "2026-01-07T09:41:00Z",
"transaction_amount_usd": 11115.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2491.86,
"financial_exposure_usd": 3825.74,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106479",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-05T11:59:00Z",
"trace_id": "11a02e94-f2f5-6d42-c890-c39e7eec460d"
} | {
"account_age_days": 967,
"account_id": "ACCT-91631553331F",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 180,
"timestamp": "2026-01-05T11:59:00Z",
"transaction_amount_usd": 793957.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.821,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4595736.75,
"financial_exposure_usd": 7397192.12,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107045",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-05T21:25:00Z",
"trace_id": "08da8797-7a16-430b-71b2-66bd707275b3"
} | {
"account_age_days": 1272,
"account_id": "ACCT-476DAC21C17E",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.898
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 712,
"timestamp": "2026-01-05T21:25:00Z",
"transaction_amount_usd": 13573.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 635.2,
"financial_exposure_usd": 1546.73,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109346",
"label": "benign",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-07T11:46:00Z",
"trace_id": "f1978ce6-b2bb-3334-f0be-074bd9faec8c"
} | {
"account_age_days": 896,
"account_id": "ACCT-F8B1068B0801",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_1",
"session_entropy": 0.621
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 213,
"timestamp": "2026-01-07T02:02:00Z",
"transaction_amount_usd": 17.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2272.53,
"financial_exposure_usd": 3995.46,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102561",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-02T18:41:00Z",
"trace_id": "de4ea788-f6ee-3981-0c8b-ba43d412f3dc"
} | {
"account_age_days": 1688,
"account_id": "ACCT-6D34ED17825A",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 194,
"timestamp": "2026-01-02T13:56:00Z",
"transaction_amount_usd": 10.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.471,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 804062.73,
"financial_exposure_usd": 952610.64,
"recoverable_pct": 0.138
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102768",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "low",
"timestamp": "2026-01-02T22:08:00Z",
"trace_id": "53572be4-3add-9c77-a318-18db5096f2fe"
} | {
"account_age_days": 1695,
"account_id": "ACCT-87B324F84B01",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_3",
"session_entropy": 0.146
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 284,
"timestamp": "2026-01-02T19:28:00Z",
"transaction_amount_usd": 18.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 833126.03,
"financial_exposure_usd": 1134681.77,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100780",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-01T13:00:00Z",
"trace_id": "6fbd6f6b-df4f-43c0-6759-19e1d574cbe1"
} | {
"account_age_days": 972,
"account_id": "ACCT-66F9F4654883",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.111
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 250,
"timestamp": "2026-01-01T13:00:00Z",
"transaction_amount_usd": 10110.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.599,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 328067.57,
"financial_exposure_usd": 550949.81,
"recoverable_pct": 0.256
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107041",
"label": "benign",
"label_confidence": 0.469,
"severity": "low",
"timestamp": "2026-01-05T21:21:00Z",
"trace_id": "ddbea0e4-bd8d-fb00-1985-c6ed8739ce1a"
} | {
"account_age_days": 1874,
"account_id": "ACCT-5BA2AC470472",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.741
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1178,
"timestamp": "2026-01-05T21:21:00Z",
"transaction_amount_usd": 4887.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3621.71,
"financial_exposure_usd": 4269.45,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101899",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-02T07:39:00Z",
"trace_id": "6cf09c90-a58f-70fc-6a4f-ccf17d8d5979"
} | {
"account_age_days": 417,
"account_id": "ACCT-5D38FE840B8D",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.315
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1146,
"timestamp": "2026-01-02T07:39:00Z",
"transaction_amount_usd": 93861.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 1452596.67,
"financial_exposure_usd": 1493834.18,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102382",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "low",
"timestamp": "2026-01-02T15:42:00Z",
"trace_id": "afe5018d-0b05-167d-3c81-5e872e8cb40b"
} | {
"account_age_days": 1243,
"account_id": "ACCT-5DAAA6D51C91",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.121
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 476,
"timestamp": "2026-01-02T15:42:00Z",
"transaction_amount_usd": 109700.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 358575.75,
"financial_exposure_usd": 454923.16,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106457",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-05T11:37:00Z",
"trace_id": "9b7c51d2-4857-7e84-374d-49d5b48612f9"
} | {
"account_age_days": 1638,
"account_id": "ACCT-CA66937FB303",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 231,
"timestamp": "2026-01-05T11:37:00Z",
"transaction_amount_usd": 2620348.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.762,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1475777.66,
"financial_exposure_usd": 1533602.93,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108962",
"label": "benign",
"label_confidence": 0.621,
"severity": "medium",
"timestamp": "2026-01-07T05:22:00Z",
"trace_id": "ec98bdf2-f1f5-3199-e85b-1904d50a1738"
} | {
"account_age_days": 861,
"account_id": "ACCT-C97141C05621",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.672
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1089,
"timestamp": "2026-01-07T05:22:00Z",
"transaction_amount_usd": 14406.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1728.22,
"financial_exposure_usd": 1968.54,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106631",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-05T14:31:00Z",
"trace_id": "b301a2d4-76e7-8368-6027-d18f5cc1507f"
} | {
"account_age_days": 67,
"account_id": "ACCT-DAF2F0830E01",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 344,
"timestamp": "2026-01-05T12:17:00Z",
"transaction_amount_usd": 23.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3446842.14,
"financial_exposure_usd": 4525466.32,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108351",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-06T19:11:00Z",
"trace_id": "094a6618-5785-a6f2-4fa3-a440e6ab492f"
} | {
"account_age_days": 1067,
"account_id": "ACCT-5C4455696F93",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.197
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 219,
"timestamp": "2026-01-06T15:42:00Z",
"transaction_amount_usd": 0.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 571.4,
"financial_exposure_usd": 908.66,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105885",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-05T02:05:00Z",
"trace_id": "66f607a8-d71b-53f0-1521-0aee2f6dc178"
} | {
"account_age_days": 1794,
"account_id": "ACCT-36E65E5EAE8A",
"baseline_risk_score": 0.231,
"kyc_tier": "tier_2",
"session_entropy": 0.779
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 903,
"timestamp": "2026-01-05T02:05:00Z",
"transaction_amount_usd": 1707199.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3617754.41,
"financial_exposure_usd": 5722131.99,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106974",
"label": "benign",
"label_confidence": 0.501,
"severity": "medium",
"timestamp": "2026-01-05T20:14:00Z",
"trace_id": "9b4b1975-103a-0df0-4cae-20cae016d2b7"
} | {
"account_age_days": 369,
"account_id": "ACCT-5EC969075E1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.358
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 410,
"timestamp": "2026-01-05T20:14:00Z",
"transaction_amount_usd": 12786.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 488.32,
"financial_exposure_usd": 1086.61,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103749",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-03T14:29:00Z",
"trace_id": "91d6dff7-4614-01a3-53a2-1cbf5e602634"
} | {
"account_age_days": 1762,
"account_id": "ACCT-9CEC5771942E",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_3",
"session_entropy": 0.79
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 958,
"timestamp": "2026-01-03T14:29:00Z",
"transaction_amount_usd": 2177590
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.547,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3752861.03,
"financial_exposure_usd": 6256885.5,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102617",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-02T19:37:00Z",
"trace_id": "30e07f02-b3c7-eb8c-31f2-f886d55f9219"
} | {
"account_age_days": 1217,
"account_id": "ACCT-F5E9C1E4090E",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1141,
"timestamp": "2026-01-02T19:37:00Z",
"transaction_amount_usd": 107482.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 743401.97,
"financial_exposure_usd": 1357493.6,
"recoverable_pct": 0.084
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107826",
"label": "benign",
"label_confidence": 0.634,
"severity": "medium",
"timestamp": "2026-01-06T10:26:00Z",
"trace_id": "92027f2a-337c-4f7c-c7d5-5fea7e43d78d"
} | {
"account_age_days": 853,
"account_id": "ACCT-A37A7D879293",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 106,
"timestamp": "2026-01-06T05:37:00Z",
"transaction_amount_usd": 20.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2488.97,
"financial_exposure_usd": 2849.84,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109114",
"label": "benign",
"label_confidence": 0.663,
"severity": "high",
"timestamp": "2026-01-07T07:54:00Z",
"trace_id": "c8730d80-e808-fdb8-c829-69fecc01c7fb"
} | {
"account_age_days": 449,
"account_id": "ACCT-8E040869D609",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.869
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 392,
"timestamp": "2026-01-07T07:54:00Z",
"transaction_amount_usd": 6645.58
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3508.43,
"financial_exposure_usd": 4533,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103719",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "high",
"timestamp": "2026-01-03T13:59:00Z",
"trace_id": "7b5b8a7f-855b-f9fd-65f6-65c2f4fbca18"
} | {
"account_age_days": 1116,
"account_id": "ACCT-53ADC036DE2C",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_1",
"session_entropy": 0.655
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 170,
"timestamp": "2026-01-03T13:59:00Z",
"transaction_amount_usd": 1156387.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.85,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1343055.17,
"financial_exposure_usd": 2705210.32,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106859",
"label": "benign",
"label_confidence": 0.742,
"severity": "medium",
"timestamp": "2026-01-05T18:19:00Z",
"trace_id": "ca73e48a-120e-f4df-bfe6-26f9edfebd33"
} | {
"account_age_days": 628,
"account_id": "ACCT-234C34BC2ABD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 826,
"timestamp": "2026-01-05T18:19:00Z",
"transaction_amount_usd": 526.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1204.17,
"financial_exposure_usd": 1957.76,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101060",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "high",
"timestamp": "2026-01-01T17:40:00Z",
"trace_id": "aba38e8f-971a-c8ee-0cc7-dd371f62b44a"
} | {
"account_age_days": 109,
"account_id": "ACCT-33C3B4F56350",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.314
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 279,
"timestamp": "2026-01-01T05:39:00Z",
"transaction_amount_usd": 3.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.608,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 522208.09,
"financial_exposure_usd": 588244.37,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105701",
"label": "fraudulent",
"label_confidence": 0.62,
"severity": "high",
"timestamp": "2026-01-04T23:01:00Z",
"trace_id": "306e9f38-c53a-b651-d1ba-24cd2e94fc4a"
} | {
"account_age_days": 398,
"account_id": "ACCT-5C5A811C5E72",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_3",
"session_entropy": 0.237
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 515,
"timestamp": "2026-01-04T23:01:00Z",
"transaction_amount_usd": 1265272.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5863530.83,
"financial_exposure_usd": 8240597.37,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106596",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "critical",
"timestamp": "2026-01-05T13:56:00Z",
"trace_id": "23c6378c-c728-8698-8fcf-19cbf489cccd"
} | {
"account_age_days": 1033,
"account_id": "ACCT-88E6276E6B49",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_2",
"session_entropy": 0.514
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 313,
"timestamp": "2026-01-05T10:13:00Z",
"transaction_amount_usd": 5.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1818997,
"financial_exposure_usd": 2291911.16,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104896",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-04T09:36:00Z",
"trace_id": "9a48d757-b103-fe98-e51b-fcb9ac592560"
} | {
"account_age_days": 994,
"account_id": "ACCT-6E157CBA0C7C",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_1",
"session_entropy": 0.348
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 184,
"timestamp": "2026-01-04T09:36:00Z",
"transaction_amount_usd": 1606974.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1254687.67,
"financial_exposure_usd": 1963024.25,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105974",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-05T03:34:00Z",
"trace_id": "c1531a14-e886-b0ed-dd48-a1e64cc86db2"
} | {
"account_age_days": 1500,
"account_id": "ACCT-3E49BDE6EBE5",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1055,
"timestamp": "2026-01-05T03:34:00Z",
"transaction_amount_usd": 1684992.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3397242.85,
"financial_exposure_usd": 5474629.66,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100315",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "critical",
"timestamp": "2026-01-01T05:15:00Z",
"trace_id": "3e4f22ba-7eb3-eae7-1885-048a0f57bc75"
} | {
"account_age_days": 298,
"account_id": "ACCT-A5DFC68A17C4",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_2",
"session_entropy": 0.438
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 522,
"timestamp": "2026-01-01T05:15:00Z",
"transaction_amount_usd": 95853.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1355110.29,
"financial_exposure_usd": 1588273.09,
"recoverable_pct": 0.121
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101185",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-01T19:45:00Z",
"trace_id": "5ce19b63-1b02-f4bc-e310-0a2e5e4db563"
} | {
"account_age_days": 1481,
"account_id": "ACCT-1F6CF1C6F685",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_3",
"session_entropy": 0.617
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 656,
"timestamp": "2026-01-01T19:45:00Z",
"transaction_amount_usd": 59296.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.765,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 541470.79,
"financial_exposure_usd": 1000149.39,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101737",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "critical",
"timestamp": "2026-01-02T04:57:00Z",
"trace_id": "87a090ac-0b31-4ef1-cab3-5400686af015"
} | {
"account_age_days": 841,
"account_id": "ACCT-6C329E2394DD",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_3",
"session_entropy": 0.443
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 454,
"timestamp": "2026-01-02T04:57:00Z",
"transaction_amount_usd": 19571.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 85531.83,
"financial_exposure_usd": 161651.09,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101585",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-02T02:25:00Z",
"trace_id": "e3593376-34c5-058f-b161-c41fa5e7a5ab"
} | {
"account_age_days": 477,
"account_id": "ACCT-354F3B4EECB6",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_1",
"session_entropy": 0.692
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 185,
"timestamp": "2026-01-01T13:54:00Z",
"transaction_amount_usd": 2.12
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.554,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 879969.4,
"financial_exposure_usd": 1130332.92,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109184",
"label": "benign",
"label_confidence": 0.571,
"severity": "low",
"timestamp": "2026-01-07T09:04:00Z",
"trace_id": "49facd7f-e85d-e728-8ec9-5a3f329048c4"
} | {
"account_age_days": 596,
"account_id": "ACCT-3CD8410C6AD8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.27
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1033,
"timestamp": "2026-01-07T09:04:00Z",
"transaction_amount_usd": 899.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1414.96,
"financial_exposure_usd": 1609.48,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100247",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "low",
"timestamp": "2026-01-01T04:07:00Z",
"trace_id": "e1dd8d91-af88-239f-d4a3-218dac08f401"
} | {
"account_age_days": 910,
"account_id": "ACCT-DF30F2F53226",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.595
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 326,
"timestamp": "2026-01-01T04:07:00Z",
"transaction_amount_usd": 96964.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 784674.28,
"financial_exposure_usd": 936381.32,
"recoverable_pct": 0.187
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109408",
"label": "benign",
"label_confidence": 0.486,
"severity": "medium",
"timestamp": "2026-01-07T12:48:00Z",
"trace_id": "4e605b3b-ff08-a38e-2881-6fc50d762954"
} | {
"account_age_days": 1043,
"account_id": "ACCT-3FA11C4DBB6C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 313,
"timestamp": "2026-01-07T12:48:00Z",
"transaction_amount_usd": 9045.72
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1479.36,
"financial_exposure_usd": 3548.66,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102143",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "high",
"timestamp": "2026-01-02T11:43:00Z",
"trace_id": "2c2056aa-e0e3-c2ca-6dab-69dd84ca0724"
} | {
"account_age_days": 1328,
"account_id": "ACCT-AEE646EF485A",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 968,
"timestamp": "2026-01-02T11:43:00Z",
"transaction_amount_usd": 6974.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.876,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 847728.2,
"financial_exposure_usd": 878773.43,
"recoverable_pct": 0.268
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106542",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-05T13:02:00Z",
"trace_id": "33597a05-f54a-36bd-7339-17b0df73553c"
} | {
"account_age_days": 1007,
"account_id": "ACCT-AE1D1AA6F5D3",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_2",
"session_entropy": 0.264
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1170,
"timestamp": "2026-01-05T13:02:00Z",
"transaction_amount_usd": 1898682.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.361,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2945565.32,
"financial_exposure_usd": 4496904.02,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103735",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "high",
"timestamp": "2026-01-03T14:15:00Z",
"trace_id": "9a2a2d99-6b92-16b9-d588-cf8fef6a76df"
} | {
"account_age_days": 999,
"account_id": "ACCT-F71B6709C9C6",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_1",
"session_entropy": 0.206
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 255,
"timestamp": "2026-01-03T10:08:00Z",
"transaction_amount_usd": 22.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.556,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4356174.44,
"financial_exposure_usd": 6477296.42,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.