schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101316",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "critical",
"timestamp": "2026-01-01T21:56:00Z",
"trace_id": "1e000dc9-8923-83f4-2463-0012166b79d1"
} | {
"account_age_days": 931,
"account_id": "ACCT-8D3E4EB7048F",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.12
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 371,
"timestamp": "2026-01-01T18:35:00Z",
"transaction_amount_usd": 10.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.758,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 94860.8,
"financial_exposure_usd": 189171.72,
"recoverable_pct": 0.241
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106614",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-05T14:14:00Z",
"trace_id": "97b462ea-bd35-a710-aca4-a9f2bafb646a"
} | {
"account_age_days": 1801,
"account_id": "ACCT-004D3F2E742F",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_3",
"session_entropy": 0.593
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 248,
"timestamp": "2026-01-05T08:43:00Z",
"transaction_amount_usd": 24.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2499820.93,
"financial_exposure_usd": 3260948.09,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104043",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-03T19:23:00Z",
"trace_id": "faa27461-5e7c-bee9-b56e-007713aa3b9e"
} | {
"account_age_days": 1304,
"account_id": "ACCT-10315BEC1DC2",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_2",
"session_entropy": 0.599
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 111,
"timestamp": "2026-01-03T19:23:00Z",
"transaction_amount_usd": 1889419.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.781,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1987531.08,
"financial_exposure_usd": 1999892.16,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102657",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "critical",
"timestamp": "2026-01-02T20:17:00Z",
"trace_id": "ac053e70-d867-45bc-48bd-01529dbb5c76"
} | {
"account_age_days": 1891,
"account_id": "ACCT-FD5F2B05C9ED",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 793,
"timestamp": "2026-01-02T20:17:00Z",
"transaction_amount_usd": 42379.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.727,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 577114.36,
"financial_exposure_usd": 871618.35,
"recoverable_pct": 0.234
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109878",
"label": "benign",
"label_confidence": 0.538,
"severity": "critical",
"timestamp": "2026-01-07T20:38:00Z",
"trace_id": "cc738481-aa67-3735-0404-ca9022bd8d72"
} | {
"account_age_days": 176,
"account_id": "ACCT-79F3CA342FEE",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.683
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 937,
"timestamp": "2026-01-07T20:38:00Z",
"transaction_amount_usd": 7686.96
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1465.72,
"financial_exposure_usd": 2342.55,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104648",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-04T05:28:00Z",
"trace_id": "9b048d96-a6ad-401c-27db-a761da1b3635"
} | {
"account_age_days": 1839,
"account_id": "ACCT-5AA18E065E92",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_3",
"session_entropy": 0.328
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 80,
"timestamp": "2026-01-04T01:46:00Z",
"transaction_amount_usd": 23.48
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2830178.28,
"financial_exposure_usd": 3541794.88,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104922",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-04T10:02:00Z",
"trace_id": "e99d1ea4-a6d1-41fa-9668-d8c51350b12d"
} | {
"account_age_days": 1037,
"account_id": "ACCT-B4CFCE36C259",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 695,
"timestamp": "2026-01-04T10:02:00Z",
"transaction_amount_usd": 2158253.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3404773.07,
"financial_exposure_usd": 5738470.97,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105793",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-05T00:33:00Z",
"trace_id": "bde627c4-d0ab-228e-333e-b96b58ea01ed"
} | {
"account_age_days": 960,
"account_id": "ACCT-75976468FBFB",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_2",
"session_entropy": 0.864
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 172,
"timestamp": "2026-01-04T17:29:00Z",
"transaction_amount_usd": 15.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.713,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4022941.36,
"financial_exposure_usd": 5659427.05,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100599",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "low",
"timestamp": "2026-01-01T09:59:00Z",
"trace_id": "bf02676c-6958-ade0-4a31-1006f343eaa7"
} | {
"account_age_days": 367,
"account_id": "ACCT-18F056AC07B8",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_3",
"session_entropy": 0.731
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 1138,
"timestamp": "2026-01-01T09:59:00Z",
"transaction_amount_usd": 63278.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.751,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 630228.25,
"financial_exposure_usd": 989264.56,
"recoverable_pct": 0.272
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102836",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-02T23:16:00Z",
"trace_id": "fe75a5f2-168f-fbcc-2e9d-8b067a27a2ec"
} | {
"account_age_days": 1011,
"account_id": "ACCT-550423E2B2C4",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_2",
"session_entropy": 0.687
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 253,
"timestamp": "2026-01-02T23:16:00Z",
"transaction_amount_usd": 116657.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.606,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 345510.46,
"financial_exposure_usd": 351589.66,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107829",
"label": "benign",
"label_confidence": 0.506,
"severity": "critical",
"timestamp": "2026-01-06T10:29:00Z",
"trace_id": "c1b50d3c-9ccc-e7c4-92ca-ba3c5158c229"
} | {
"account_age_days": 1023,
"account_id": "ACCT-02BB57905F56",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.193
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 124,
"timestamp": "2026-01-06T03:05:00Z",
"transaction_amount_usd": 13.43
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.702,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1695.73,
"financial_exposure_usd": 1895.38,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100250",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "critical",
"timestamp": "2026-01-01T04:10:00Z",
"trace_id": "05ddffbf-bd21-0b7d-f5b3-50ab731bd233"
} | {
"account_age_days": 484,
"account_id": "ACCT-C5C734B488C5",
"baseline_risk_score": 0.552,
"kyc_tier": "tier_2",
"session_entropy": 0.68
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 323,
"timestamp": "2026-01-01T04:10:00Z",
"transaction_amount_usd": 70839.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 500246.6,
"financial_exposure_usd": 574989.75,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109550",
"label": "benign",
"label_confidence": 0.582,
"severity": "low",
"timestamp": "2026-01-07T15:10:00Z",
"trace_id": "8c4507ba-3faf-593e-ade3-bd903b970d67"
} | {
"account_age_days": 1580,
"account_id": "ACCT-1476AAF1A6AD",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_1",
"session_entropy": 0.878
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 319,
"timestamp": "2026-01-07T15:10:00Z",
"transaction_amount_usd": 14584.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1937.72,
"financial_exposure_usd": 3096.72,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108299",
"label": "benign",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-06T18:19:00Z",
"trace_id": "75e29175-9d80-7d2a-786f-5d31a7c54cdf"
} | {
"account_age_days": 1410,
"account_id": "ACCT-A8B28F16D341",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.292
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 104,
"timestamp": "2026-01-06T09:34:00Z",
"transaction_amount_usd": 18.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 595.86,
"financial_exposure_usd": 1371.48,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109604",
"label": "benign",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-07T16:04:00Z",
"trace_id": "922e62f2-fa52-20ca-aba4-72321d177674"
} | {
"account_age_days": 1282,
"account_id": "ACCT-91694F2AD634",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.928
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 618,
"timestamp": "2026-01-07T16:04:00Z",
"transaction_amount_usd": 8767.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 876.08,
"financial_exposure_usd": 1133.73,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108640",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-07T00:00:00Z",
"trace_id": "58eb705c-ee3f-17f4-71d9-aa1c477c4e61"
} | {
"account_age_days": 234,
"account_id": "ACCT-4866211418D1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.422
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 283,
"timestamp": "2026-01-06T21:40:00Z",
"transaction_amount_usd": 12.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1490.17,
"financial_exposure_usd": 1502.19,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101296",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "critical",
"timestamp": "2026-01-01T21:36:00Z",
"trace_id": "27913868-9c9e-6623-8ba2-b87033c6906c"
} | {
"account_age_days": 1646,
"account_id": "ACCT-AA2977025C01",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_1",
"session_entropy": 0.916
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 485,
"timestamp": "2026-01-01T21:36:00Z",
"transaction_amount_usd": 66598.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 528967.82,
"financial_exposure_usd": 1013106.78,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102787",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-02T22:27:00Z",
"trace_id": "02c55ae2-f2ff-f8ac-134c-fead3bc0c112"
} | {
"account_age_days": 992,
"account_id": "ACCT-5E35F27E9C05",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.104
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 208,
"timestamp": "2026-01-02T22:27:00Z",
"transaction_amount_usd": 45200.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.548,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 655055.49,
"financial_exposure_usd": 792862.77,
"recoverable_pct": 0.369
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108921",
"label": "benign",
"label_confidence": 0.5,
"severity": "medium",
"timestamp": "2026-01-07T04:41:00Z",
"trace_id": "63da3afe-650e-f144-441c-e6d21d9fe072"
} | {
"account_age_days": 1310,
"account_id": "ACCT-C8F2BFDFD626",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.714
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 189,
"timestamp": "2026-01-06T21:11:00Z",
"transaction_amount_usd": 22.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 345.84,
"financial_exposure_usd": 354.2,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107988",
"label": "benign",
"label_confidence": 0.714,
"severity": "low",
"timestamp": "2026-01-06T13:08:00Z",
"trace_id": "333cc701-29d0-07bf-75d9-fb097ab56d30"
} | {
"account_age_days": 845,
"account_id": "ACCT-6623A1174A93",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_3",
"session_entropy": 0.843
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 727,
"timestamp": "2026-01-06T13:08:00Z",
"transaction_amount_usd": 13417.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 385.32,
"financial_exposure_usd": 533.82,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103872",
"label": "fraudulent",
"label_confidence": 0.616,
"severity": "high",
"timestamp": "2026-01-03T16:32:00Z",
"trace_id": "48db95e3-a38b-ca5a-0c3d-667e770f08af"
} | {
"account_age_days": 1936,
"account_id": "ACCT-F1D469087989",
"baseline_risk_score": 0.247,
"kyc_tier": "tier_2",
"session_entropy": 0.399
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 496,
"timestamp": "2026-01-03T16:32:00Z",
"transaction_amount_usd": 1171744.22
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.696,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3303908.65,
"financial_exposure_usd": 3635293.37,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103255",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "critical",
"timestamp": "2026-01-03T06:15:00Z",
"trace_id": "0823c333-27a0-a22b-4872-76f3fcfa7ead"
} | {
"account_age_days": 1104,
"account_id": "ACCT-849E96FF1D51",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_1",
"session_entropy": 0.168
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 815,
"timestamp": "2026-01-03T06:15:00Z",
"transaction_amount_usd": 6725.86
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.713,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 544740.65,
"financial_exposure_usd": 632193.93,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107336",
"label": "benign",
"label_confidence": 0.656,
"severity": "high",
"timestamp": "2026-01-06T02:16:00Z",
"trace_id": "a8792ccf-964c-9d28-4e5a-6fb965429789"
} | {
"account_age_days": 1247,
"account_id": "ACCT-7B25ABF313E9",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_2",
"session_entropy": 0.218
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 773,
"timestamp": "2026-01-06T02:16:00Z",
"transaction_amount_usd": 14064.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.767,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1613.08,
"financial_exposure_usd": 1977.72,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105339",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "critical",
"timestamp": "2026-01-04T16:59:00Z",
"trace_id": "c9134ab1-bc26-c66b-9410-b6575efdfce4"
} | {
"account_age_days": 736,
"account_id": "ACCT-0148B48F36EE",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_1",
"session_entropy": 0.322
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 980,
"timestamp": "2026-01-04T16:59:00Z",
"transaction_amount_usd": 65377.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3440365.97,
"financial_exposure_usd": 5144003.38,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108855",
"label": "benign",
"label_confidence": 0.476,
"severity": "medium",
"timestamp": "2026-01-07T03:35:00Z",
"trace_id": "8e32ff38-93cd-0bc9-a85a-8b338bdb58d2"
} | {
"account_age_days": 1331,
"account_id": "ACCT-EE53802A32CE",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_2",
"session_entropy": 0.614
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 289,
"timestamp": "2026-01-06T22:42:00Z",
"transaction_amount_usd": 3.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 898.41,
"financial_exposure_usd": 1237.73,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109171",
"label": "benign",
"label_confidence": 0.715,
"severity": "low",
"timestamp": "2026-01-07T08:51:00Z",
"trace_id": "2eacb3a1-3b45-5fb4-57a6-9176ce7704f4"
} | {
"account_age_days": 1722,
"account_id": "ACCT-47C3EC9F779A",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 257,
"timestamp": "2026-01-07T00:09:00Z",
"transaction_amount_usd": 14.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3508.14,
"financial_exposure_usd": 4110.32,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109647",
"label": "benign",
"label_confidence": 0.504,
"severity": "low",
"timestamp": "2026-01-07T16:47:00Z",
"trace_id": "939190e8-b85c-105e-b9a5-d806ed9e7032"
} | {
"account_age_days": 1677,
"account_id": "ACCT-E28FE3EA42BF",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.751
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 277,
"timestamp": "2026-01-07T16:47:00Z",
"transaction_amount_usd": 8287.32
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.582,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 467.53,
"financial_exposure_usd": 1051.58,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105760",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-05T00:00:00Z",
"trace_id": "bc93580a-7939-5999-012c-8a65e9984e62"
} | {
"account_age_days": 864,
"account_id": "ACCT-522E445A46FE",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_1",
"session_entropy": 0.296
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 130,
"timestamp": "2026-01-05T00:00:00Z",
"transaction_amount_usd": 730833.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.916,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1368101.03,
"financial_exposure_usd": 2278995.74,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105854",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-05T01:34:00Z",
"trace_id": "2584708c-3f8b-ee3e-097f-1c5579da9d81"
} | {
"account_age_days": 1296,
"account_id": "ACCT-92B6E41173E0",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 437,
"timestamp": "2026-01-05T01:34:00Z",
"transaction_amount_usd": 1009118.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.478,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2276434.41,
"financial_exposure_usd": 3196763.99,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104926",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "low",
"timestamp": "2026-01-04T10:06:00Z",
"trace_id": "c7687aa3-27e3-9105-195e-a8778b0b7a45"
} | {
"account_age_days": 1479,
"account_id": "ACCT-8508DA2D70B1",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_2",
"session_entropy": 0.522
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1127,
"timestamp": "2026-01-04T10:06:00Z",
"transaction_amount_usd": 392877.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.824,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3874463.23,
"financial_exposure_usd": 6908387.61,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102986",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "critical",
"timestamp": "2026-01-03T01:46:00Z",
"trace_id": "1568b21a-0368-a5f4-023c-6eba460b4b61"
} | {
"account_age_days": 1646,
"account_id": "ACCT-5A91B840044C",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.352
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 290,
"timestamp": "2026-01-02T21:29:00Z",
"transaction_amount_usd": 1.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 448400.91,
"financial_exposure_usd": 621416.97,
"recoverable_pct": 0.086
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108565",
"label": "benign",
"label_confidence": 0.481,
"severity": "medium",
"timestamp": "2026-01-06T22:45:00Z",
"trace_id": "12525afd-cbda-cd3e-d47f-4f334c07afc5"
} | {
"account_age_days": 227,
"account_id": "ACCT-899547200ADF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.203
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 250,
"timestamp": "2026-01-06T11:23:00Z",
"transaction_amount_usd": 24.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1409.92,
"financial_exposure_usd": 1536.52,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100319",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "low",
"timestamp": "2026-01-01T05:19:00Z",
"trace_id": "60040d0d-5257-c31b-724c-5cd007ac3372"
} | {
"account_age_days": 222,
"account_id": "ACCT-8D399EC423B5",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.696
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 908,
"timestamp": "2026-01-01T05:19:00Z",
"transaction_amount_usd": 30420.75
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 602824.73,
"financial_exposure_usd": 775831.14,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103068",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "high",
"timestamp": "2026-01-03T03:08:00Z",
"trace_id": "18fd61e2-b48d-0e01-f245-56a982e66a76"
} | {
"account_age_days": 257,
"account_id": "ACCT-482EEEEEA2C4",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_1",
"session_entropy": 0.229
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 293,
"timestamp": "2026-01-02T16:02:00Z",
"transaction_amount_usd": 20.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.672,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 472910.37,
"financial_exposure_usd": 788365.84,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101292",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-01T21:32:00Z",
"trace_id": "c02ff977-4b86-8cf7-be29-173f6e9c8c37"
} | {
"account_age_days": 373,
"account_id": "ACCT-50EFE60637D1",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_1",
"session_entropy": 0.463
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 612,
"timestamp": "2026-01-01T21:32:00Z",
"transaction_amount_usd": 103986.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.365,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 604128.04,
"financial_exposure_usd": 697404.75,
"recoverable_pct": 0.316
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102123",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "low",
"timestamp": "2026-01-02T11:23:00Z",
"trace_id": "ed801aa3-1a00-d282-4eba-e81bbf95acda"
} | {
"account_age_days": 1876,
"account_id": "ACCT-088DD6C7E118",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_3",
"session_entropy": 0.349
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 437,
"timestamp": "2026-01-02T11:23:00Z",
"transaction_amount_usd": 7804.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 477654.22,
"financial_exposure_usd": 1114086.35,
"recoverable_pct": 0.203
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106002",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-05T04:02:00Z",
"trace_id": "d9f40816-7da7-d950-c93b-b9b16c9a7053"
} | {
"account_age_days": 461,
"account_id": "ACCT-7E49C21BA678",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_2",
"session_entropy": 0.491
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 96,
"timestamp": "2026-01-05T04:02:00Z",
"transaction_amount_usd": 1534998.49
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 5613553.89,
"financial_exposure_usd": 5948580.71,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104379",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-04T00:59:00Z",
"trace_id": "edd3fee6-8e82-a267-4906-dff2131fa3cb"
} | {
"account_age_days": 173,
"account_id": "ACCT-D7167DA21CF1",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.852
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 814,
"timestamp": "2026-01-04T00:59:00Z",
"transaction_amount_usd": 1948545.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.401,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1596698.86,
"financial_exposure_usd": 2651082.03,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103933",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "low",
"timestamp": "2026-01-03T17:33:00Z",
"trace_id": "285bb855-c3c6-bff3-a4f3-fdf4948e49fd"
} | {
"account_age_days": 279,
"account_id": "ACCT-0FDC5C5BAE72",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_2",
"session_entropy": 0.638
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 371,
"timestamp": "2026-01-03T09:54:00Z",
"transaction_amount_usd": 4.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.368,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6934895.72,
"financial_exposure_usd": 8616809.04,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102963",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "low",
"timestamp": "2026-01-03T01:23:00Z",
"trace_id": "e3b44b36-f272-483a-45fd-f3578119dc5a"
} | {
"account_age_days": 947,
"account_id": "ACCT-B8406CAE8FDF",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_2",
"session_entropy": 0.229
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 255,
"timestamp": "2026-01-02T17:50:00Z",
"transaction_amount_usd": 11.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.538,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 315981.2,
"financial_exposure_usd": 641732.25,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101205",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "critical",
"timestamp": "2026-01-01T20:05:00Z",
"trace_id": "f3bdf446-870c-c4cb-854b-e984e3edc8ee"
} | {
"account_age_days": 1679,
"account_id": "ACCT-171811278F00",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.448
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 339,
"timestamp": "2026-01-01T10:11:00Z",
"transaction_amount_usd": 4.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.784,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 606671.21,
"financial_exposure_usd": 731396.42,
"recoverable_pct": 0.132
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109952",
"label": "benign",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-07T21:52:00Z",
"trace_id": "b3776a30-205a-0278-b9ed-6166e1952e67"
} | {
"account_age_days": 317,
"account_id": "ACCT-2FB3AE588021",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.276
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 168,
"timestamp": "2026-01-07T18:56:00Z",
"transaction_amount_usd": 13.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 454.84,
"financial_exposure_usd": 942.06,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103722",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "low",
"timestamp": "2026-01-03T14:02:00Z",
"trace_id": "b58dd3c4-adfe-5711-f0b5-57dd3ee33da6"
} | {
"account_age_days": 690,
"account_id": "ACCT-6696B3F27418",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_2",
"session_entropy": 0.159
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 861,
"timestamp": "2026-01-03T14:02:00Z",
"transaction_amount_usd": 2183574.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4068085.72,
"financial_exposure_usd": 4796877.08,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106254",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "medium",
"timestamp": "2026-01-05T08:14:00Z",
"trace_id": "71b8c968-93fd-5f0f-8417-c0762894c557"
} | {
"account_age_days": 780,
"account_id": "ACCT-AF9441EDFCBE",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_1",
"session_entropy": 0.647
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 315,
"timestamp": "2026-01-05T02:18:00Z",
"transaction_amount_usd": 6.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.717,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1878597.74,
"financial_exposure_usd": 4157383.2,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105846",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "high",
"timestamp": "2026-01-05T01:26:00Z",
"trace_id": "4b3eae18-adde-bbb8-7851-a16550e0d10e"
} | {
"account_age_days": 8,
"account_id": "ACCT-F8685902AD1C",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 477,
"timestamp": "2026-01-05T01:26:00Z",
"transaction_amount_usd": 296695.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.509,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3583472.7,
"financial_exposure_usd": 4305402.04,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106745",
"label": "benign",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-05T16:25:00Z",
"trace_id": "24bc69a7-4ef4-1ad1-7d8d-9eeeb5d66b49"
} | {
"account_age_days": 448,
"account_id": "ACCT-12283DAFE14A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.72
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 166,
"timestamp": "2026-01-05T13:13:00Z",
"transaction_amount_usd": 16.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 963.65,
"financial_exposure_usd": 2098.02,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101953",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "low",
"timestamp": "2026-01-02T08:33:00Z",
"trace_id": "43671b02-7cce-3532-3071-559787033d11"
} | {
"account_age_days": 1748,
"account_id": "ACCT-D1782BD22411",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_2",
"session_entropy": 0.623
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 390,
"timestamp": "2026-01-02T07:07:00Z",
"transaction_amount_usd": 24.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1017154.36,
"financial_exposure_usd": 1346066.84,
"recoverable_pct": 0.186
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106454",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "high",
"timestamp": "2026-01-05T11:34:00Z",
"trace_id": "a2132c57-6f35-6f8e-0aae-73b04d79f563"
} | {
"account_age_days": 1667,
"account_id": "ACCT-E844B5308A7F",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_1",
"session_entropy": 0.282
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 156,
"timestamp": "2026-01-05T06:24:00Z",
"transaction_amount_usd": 3.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1851279.25,
"financial_exposure_usd": 4264420.39,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104189",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "low",
"timestamp": "2026-01-03T21:49:00Z",
"trace_id": "8967dee6-78cb-d039-940c-42f57987d6c4"
} | {
"account_age_days": 911,
"account_id": "ACCT-FBE9FF272E8A",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.314
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 241,
"timestamp": "2026-01-03T16:49:00Z",
"transaction_amount_usd": 1.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.599,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1177071.28,
"financial_exposure_usd": 2201705.74,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101968",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-02T08:48:00Z",
"trace_id": "d551e72b-4566-e004-5756-a13cabfdd5ad"
} | {
"account_age_days": 1229,
"account_id": "ACCT-D7C385FC2B52",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_2",
"session_entropy": 0.782
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 590,
"timestamp": "2026-01-02T08:48:00Z",
"transaction_amount_usd": 4771.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 431198.29,
"financial_exposure_usd": 839373.79,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106876",
"label": "benign",
"label_confidence": 0.57,
"severity": "medium",
"timestamp": "2026-01-05T18:36:00Z",
"trace_id": "4a6e6a1d-5b88-e2c2-bb25-37f7ec51f24e"
} | {
"account_age_days": 607,
"account_id": "ACCT-C042E9DE4C69",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.151
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1026,
"timestamp": "2026-01-05T18:36:00Z",
"transaction_amount_usd": 9622.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1669.03,
"financial_exposure_usd": 2290.98,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100727",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "low",
"timestamp": "2026-01-01T12:07:00Z",
"trace_id": "fbb7e845-cdb3-ade4-afbb-ce7f83ff7f39"
} | {
"account_age_days": 1206,
"account_id": "ACCT-9D7D02839790",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_3",
"session_entropy": 0.529
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 718,
"timestamp": "2026-01-01T12:07:00Z",
"transaction_amount_usd": 52312.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 765442.94,
"financial_exposure_usd": 881234.03,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107158",
"label": "benign",
"label_confidence": 0.551,
"severity": "medium",
"timestamp": "2026-01-05T23:18:00Z",
"trace_id": "d2bbcab9-d96a-3d54-90cf-6feb1e0cb933"
} | {
"account_age_days": 602,
"account_id": "ACCT-A2CB0592345C",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 958,
"timestamp": "2026-01-05T23:18:00Z",
"transaction_amount_usd": 606.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 829.71,
"financial_exposure_usd": 1959.67,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100873",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-01T14:33:00Z",
"trace_id": "e713ca88-5b44-4ff0-f9bd-97ea3bee00d8"
} | {
"account_age_days": 915,
"account_id": "ACCT-E5776900C034",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_2",
"session_entropy": 0.531
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 287,
"timestamp": "2026-01-01T13:07:00Z",
"transaction_amount_usd": 23.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.773,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 704633.37,
"financial_exposure_usd": 805540.19,
"recoverable_pct": 0.071
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108945",
"label": "benign",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-07T05:05:00Z",
"trace_id": "1495f555-a6b2-1c62-ef6f-1acaad2d9c1a"
} | {
"account_age_days": 81,
"account_id": "ACCT-24614FF202E3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1011,
"timestamp": "2026-01-07T05:05:00Z",
"transaction_amount_usd": 11797.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 702.69,
"financial_exposure_usd": 1634.96,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107410",
"label": "benign",
"label_confidence": 0.535,
"severity": "medium",
"timestamp": "2026-01-06T03:30:00Z",
"trace_id": "bd2fafc2-c18f-279b-d9a7-8a8a57d64bdf"
} | {
"account_age_days": 237,
"account_id": "ACCT-CD0B78C1AF35",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_3",
"session_entropy": 0.586
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 283,
"timestamp": "2026-01-05T17:28:00Z",
"transaction_amount_usd": 11.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.689,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2244.45,
"financial_exposure_usd": 4152.58,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107946",
"label": "benign",
"label_confidence": 0.627,
"severity": "medium",
"timestamp": "2026-01-06T12:26:00Z",
"trace_id": "f740ea39-6cf1-50b0-1368-9f5b6f4f710a"
} | {
"account_age_days": 1416,
"account_id": "ACCT-B8B4E2F5FAD0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 191,
"timestamp": "2026-01-06T02:54:00Z",
"transaction_amount_usd": 9.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4716.96,
"financial_exposure_usd": 4754.73,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102413",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-02T16:13:00Z",
"trace_id": "39b48339-81e5-6da9-fb67-5ec81dae8746"
} | {
"account_age_days": 280,
"account_id": "ACCT-DA8266E254B7",
"baseline_risk_score": 0.513,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 843,
"timestamp": "2026-01-02T16:13:00Z",
"transaction_amount_usd": 46373.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 582488.71,
"financial_exposure_usd": 1005326.47,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101880",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-02T07:20:00Z",
"trace_id": "5feef2a3-c4a6-7960-11a7-263a8b78fbbf"
} | {
"account_age_days": 290,
"account_id": "ACCT-94F57A365E7E",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_2",
"session_entropy": 0.516
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 146,
"timestamp": "2026-01-02T06:04:00Z",
"transaction_amount_usd": 17.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.483,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 735366.42,
"financial_exposure_usd": 1002280.66,
"recoverable_pct": 0.382
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102455",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-02T16:55:00Z",
"trace_id": "642c7bc2-1090-7525-efb8-c37be27137c6"
} | {
"account_age_days": 1982,
"account_id": "ACCT-98FC187D65E3",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 244,
"timestamp": "2026-01-02T16:55:00Z",
"transaction_amount_usd": 43931.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.873,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 521540.34,
"financial_exposure_usd": 636097.91,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104752",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-04T07:12:00Z",
"trace_id": "b19181b5-4ff6-24dd-37be-564a83def7bb"
} | {
"account_age_days": 384,
"account_id": "ACCT-10F407358B07",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.644
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 282,
"timestamp": "2026-01-04T07:12:00Z",
"transaction_amount_usd": 2339986.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.654,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3637181.07,
"financial_exposure_usd": 3736436.44,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102924",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "high",
"timestamp": "2026-01-03T00:44:00Z",
"trace_id": "ff9c02ef-db28-c70c-48ce-7edb8213ef3f"
} | {
"account_age_days": 1194,
"account_id": "ACCT-DF5C0C87CA58",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.226
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 427,
"timestamp": "2026-01-03T00:44:00Z",
"transaction_amount_usd": 31531.43
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 591480.54,
"financial_exposure_usd": 877705.06,
"recoverable_pct": 0.101
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109053",
"label": "benign",
"label_confidence": 0.665,
"severity": "high",
"timestamp": "2026-01-07T06:53:00Z",
"trace_id": "c7ec6979-da5a-5066-9aa0-1e8b0019944b"
} | {
"account_age_days": 1304,
"account_id": "ACCT-081E4442005A",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 924,
"timestamp": "2026-01-07T06:53:00Z",
"transaction_amount_usd": 14506.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1803.82,
"financial_exposure_usd": 3340.21,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109356",
"label": "benign",
"label_confidence": 0.457,
"severity": "high",
"timestamp": "2026-01-07T11:56:00Z",
"trace_id": "e2409268-2bd7-915e-bf84-b9bac3bc3160"
} | {
"account_age_days": 322,
"account_id": "ACCT-AFD25B69239C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.595
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 337,
"timestamp": "2026-01-07T06:36:00Z",
"transaction_amount_usd": 18.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.45,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3430.27,
"financial_exposure_usd": 5268.09,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102955",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-03T01:15:00Z",
"trace_id": "db721148-e776-5edf-1494-4fd3de8e7066"
} | {
"account_age_days": 1829,
"account_id": "ACCT-12498B29AB72",
"baseline_risk_score": 0.477,
"kyc_tier": "tier_1",
"session_entropy": 0.313
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 942,
"timestamp": "2026-01-03T01:15:00Z",
"transaction_amount_usd": 81133.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 481523.68,
"financial_exposure_usd": 1097662.74,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101881",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-02T07:21:00Z",
"trace_id": "2101f2be-f9b1-5dae-3974-93dd05da85a9"
} | {
"account_age_days": 609,
"account_id": "ACCT-A13F034C3F84",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_3",
"session_entropy": 0.53
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 379,
"timestamp": "2026-01-02T07:21:00Z",
"transaction_amount_usd": 30604.76
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.571,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 95431.02,
"financial_exposure_usd": 183086.13,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105199",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "high",
"timestamp": "2026-01-04T14:39:00Z",
"trace_id": "a73f7a57-516e-725d-b291-553fc077a4a8"
} | {
"account_age_days": 1073,
"account_id": "ACCT-6528D3488489",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 335,
"timestamp": "2026-01-04T14:39:00Z",
"transaction_amount_usd": 1068484.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.929,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3544346.2,
"financial_exposure_usd": 4424353.95,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104781",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "high",
"timestamp": "2026-01-04T07:41:00Z",
"trace_id": "505a621c-6e3b-427c-9f84-e0034b132647"
} | {
"account_age_days": 1433,
"account_id": "ACCT-E049D3770583",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_1",
"session_entropy": 0.239
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 163,
"timestamp": "2026-01-04T05:46:00Z",
"transaction_amount_usd": 3.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.395,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3974136.7,
"financial_exposure_usd": 4072668.93,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101993",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-02T09:13:00Z",
"trace_id": "068fc40d-51ac-77d2-bf3c-a8cbf2a1beeb"
} | {
"account_age_days": 465,
"account_id": "ACCT-6AE632C7BB65",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.805
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1184,
"timestamp": "2026-01-02T09:13:00Z",
"transaction_amount_usd": 73646.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 719664.13,
"financial_exposure_usd": 1194229.7,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109716",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-07T17:56:00Z",
"trace_id": "f2101be2-f127-87fb-424a-749ca1629c4c"
} | {
"account_age_days": 1037,
"account_id": "ACCT-D439C4374AB3",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_1",
"session_entropy": 0.111
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 233,
"timestamp": "2026-01-07T12:48:00Z",
"transaction_amount_usd": 16.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3225.7,
"financial_exposure_usd": 3915.74,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100886",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-01T14:46:00Z",
"trace_id": "086ae1cd-d5ec-5cd5-5be1-ab7335cf7816"
} | {
"account_age_days": 1178,
"account_id": "ACCT-FC852065AD67",
"baseline_risk_score": 0.567,
"kyc_tier": "tier_1",
"session_entropy": 0.32
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 286,
"timestamp": "2026-01-01T13:23:00Z",
"transaction_amount_usd": 6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 382631.68,
"financial_exposure_usd": 411296.58,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101173",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-01T19:33:00Z",
"trace_id": "5ba9376d-43d8-1bac-377f-3356ac8ca9fd"
} | {
"account_age_days": 1130,
"account_id": "ACCT-4E4DC19F9FD8",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_2",
"session_entropy": 0.778
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 758,
"timestamp": "2026-01-01T19:33:00Z",
"transaction_amount_usd": 27287.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 604447.21,
"financial_exposure_usd": 923534.07,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102706",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-02T21:06:00Z",
"trace_id": "d93e71e6-4c9c-458a-4dc0-9bebb60876e8"
} | {
"account_age_days": 557,
"account_id": "ACCT-DD15F18FE84D",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_3",
"session_entropy": 0.718
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 146,
"timestamp": "2026-01-02T11:29:00Z",
"transaction_amount_usd": 21.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 320710.58,
"financial_exposure_usd": 411664.38,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106431",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-05T11:11:00Z",
"trace_id": "d3565471-893e-05f1-4333-a7f5c0f1221e"
} | {
"account_age_days": 1386,
"account_id": "ACCT-036937A927A5",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 213,
"timestamp": "2026-01-05T04:44:00Z",
"transaction_amount_usd": 14.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3914749.09,
"financial_exposure_usd": 5572441.92,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104012",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-03T18:52:00Z",
"trace_id": "e49a6e0a-2830-609f-1106-916dfe624f19"
} | {
"account_age_days": 679,
"account_id": "ACCT-CDC15829F139",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1131,
"timestamp": "2026-01-03T18:52:00Z",
"transaction_amount_usd": 1999581.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1335988,
"financial_exposure_usd": 2533387.24,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101134",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "high",
"timestamp": "2026-01-01T18:54:00Z",
"trace_id": "4ceff595-3b53-7a6c-3754-1ce6d312115e"
} | {
"account_age_days": 1465,
"account_id": "ACCT-9C4660170096",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_1",
"session_entropy": 0.633
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 320,
"timestamp": "2026-01-01T07:04:00Z",
"transaction_amount_usd": 7.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.83,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 553418.29,
"financial_exposure_usd": 1281295.9,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104359",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "high",
"timestamp": "2026-01-04T00:39:00Z",
"trace_id": "33a067ee-0d47-7e72-5bdb-1c1b0ed9fef8"
} | {
"account_age_days": 426,
"account_id": "ACCT-7194DA5386DF",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_3",
"session_entropy": 0.224
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 346,
"timestamp": "2026-01-04T00:39:00Z",
"transaction_amount_usd": 1538128.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.798,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2640288.03,
"financial_exposure_usd": 5442890.76,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100692",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "low",
"timestamp": "2026-01-01T11:32:00Z",
"trace_id": "9db6679a-c69c-0c1c-b57a-9c4fcffc019f"
} | {
"account_age_days": 1846,
"account_id": "ACCT-0033D65C1B0F",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 365,
"timestamp": "2026-01-01T11:32:00Z",
"transaction_amount_usd": 94893.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.95,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 80247.15,
"financial_exposure_usd": 81510.09,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102337",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-02T14:57:00Z",
"trace_id": "758c70b9-992f-894d-88e9-a571971bee35"
} | {
"account_age_days": 1996,
"account_id": "ACCT-800EDC00EDA4",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_3",
"session_entropy": 0.714
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 131,
"timestamp": "2026-01-02T08:55:00Z",
"transaction_amount_usd": 19.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.931,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 320187.51,
"financial_exposure_usd": 666553.06,
"recoverable_pct": 0.229
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107052",
"label": "benign",
"label_confidence": 0.632,
"severity": "low",
"timestamp": "2026-01-05T21:32:00Z",
"trace_id": "05a22085-b834-f5b9-ec99-5dcf16609a3c"
} | {
"account_age_days": 7,
"account_id": "ACCT-FA2DDD4CAB42",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 805,
"timestamp": "2026-01-05T21:32:00Z",
"transaction_amount_usd": 12350.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 396.79,
"financial_exposure_usd": 692.65,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100026",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "critical",
"timestamp": "2026-01-01T00:26:00Z",
"trace_id": "4ddb1b36-272c-0588-84a2-576c1fc905f8"
} | {
"account_age_days": 656,
"account_id": "ACCT-83D5BCEB5EDB",
"baseline_risk_score": 0.594,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 120,
"timestamp": "2025-12-31T20:50:00Z",
"transaction_amount_usd": 12.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 264103.87,
"financial_exposure_usd": 481281.51,
"recoverable_pct": 0.082
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108149",
"label": "benign",
"label_confidence": 0.453,
"severity": "medium",
"timestamp": "2026-01-06T15:49:00Z",
"trace_id": "3203a50c-9be4-dd49-c88f-0a4148661f58"
} | {
"account_age_days": 965,
"account_id": "ACCT-629F53CD2C96",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.574
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 408,
"timestamp": "2026-01-06T15:49:00Z",
"transaction_amount_usd": 3966.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 501.74,
"financial_exposure_usd": 570.89,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109215",
"label": "benign",
"label_confidence": 0.585,
"severity": "medium",
"timestamp": "2026-01-07T09:35:00Z",
"trace_id": "d9840082-a8c1-72df-042d-6d26099fc48a"
} | {
"account_age_days": 814,
"account_id": "ACCT-FBCA0FC5A930",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 770,
"timestamp": "2026-01-07T09:35:00Z",
"transaction_amount_usd": 10750.49
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.732,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2807.46,
"financial_exposure_usd": 4801.78,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102232",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-02T13:12:00Z",
"trace_id": "6c22ba81-f6df-8082-b73d-4107dbd2ce10"
} | {
"account_age_days": 620,
"account_id": "ACCT-46773115A041",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.341
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 958,
"timestamp": "2026-01-02T13:12:00Z",
"transaction_amount_usd": 115447.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.428,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 684813.33,
"financial_exposure_usd": 892983.86,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104746",
"label": "fraudulent",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-04T07:06:00Z",
"trace_id": "b392a294-18c3-b6d6-0bc1-4dbe530d2a7a"
} | {
"account_age_days": 1509,
"account_id": "ACCT-9803BF38A1FE",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_2",
"session_entropy": 0.328
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 98,
"timestamp": "2026-01-04T07:06:00Z",
"transaction_amount_usd": 472981.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.635,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1394779.92,
"financial_exposure_usd": 2856218.63,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104411",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "critical",
"timestamp": "2026-01-04T01:31:00Z",
"trace_id": "8b0ee317-cdfa-b2be-50ce-f523b33da677"
} | {
"account_age_days": 1479,
"account_id": "ACCT-5963847DF24B",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.2
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 988,
"timestamp": "2026-01-04T01:31:00Z",
"transaction_amount_usd": 1331290.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.64,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3339454.99,
"financial_exposure_usd": 3432116.44,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105905",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-05T02:25:00Z",
"trace_id": "d81c28e7-ab28-ce07-1ff0-d03eff3e518c"
} | {
"account_age_days": 1043,
"account_id": "ACCT-A50464D098F7",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.82
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1061,
"timestamp": "2026-01-05T02:25:00Z",
"transaction_amount_usd": 2632357.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.705,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2846401.63,
"financial_exposure_usd": 3121700.12,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105836",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-05T01:16:00Z",
"trace_id": "9dd758bc-3ba7-d815-ad2b-4b9c13ecb0d4"
} | {
"account_age_days": 1431,
"account_id": "ACCT-54BEB98E02C8",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_2",
"session_entropy": 0.797
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 108,
"timestamp": "2026-01-04T14:35:00Z",
"transaction_amount_usd": 21.97
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.808,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2041524.17,
"financial_exposure_usd": 2137803.43,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102325",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-02T14:45:00Z",
"trace_id": "e059122a-5dd8-0908-c780-1e71940507eb"
} | {
"account_age_days": 549,
"account_id": "ACCT-BB24023CFA08",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_2",
"session_entropy": 0.698
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 301,
"timestamp": "2026-01-02T10:58:00Z",
"transaction_amount_usd": 12.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107979",
"label": "benign",
"label_confidence": 0.623,
"severity": "low",
"timestamp": "2026-01-06T12:59:00Z",
"trace_id": "73424513-91c8-ce04-dc02-983db5a2aef1"
} | {
"account_age_days": 74,
"account_id": "ACCT-9B44C432B63D",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.258
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 85,
"timestamp": "2026-01-06T12:59:00Z",
"transaction_amount_usd": 2341.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2560.73,
"financial_exposure_usd": 3957.44,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100579",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-01T09:39:00Z",
"trace_id": "256e7315-8826-e7b4-84a9-4794d2d76444"
} | {
"account_age_days": 693,
"account_id": "ACCT-DD1347515119",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_3",
"session_entropy": 0.849
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 137,
"timestamp": "2026-01-01T03:40:00Z",
"transaction_amount_usd": 15.09
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.862,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 389606.1,
"financial_exposure_usd": 607376.71,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103634",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-03T12:34:00Z",
"trace_id": "1c144042-e3b0-f26c-7380-11a5ac79b10e"
} | {
"account_age_days": 1555,
"account_id": "ACCT-B681E89A4AE9",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_2",
"session_entropy": 0.511
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1089,
"timestamp": "2026-01-03T12:34:00Z",
"transaction_amount_usd": 198035.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.444,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2388081.26,
"financial_exposure_usd": 3175955.38,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105377",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-04T17:37:00Z",
"trace_id": "fd2b5c22-ad1a-b969-b101-688839be56fe"
} | {
"account_age_days": 803,
"account_id": "ACCT-5D768E5D436A",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.305
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 893,
"timestamp": "2026-01-04T17:37:00Z",
"transaction_amount_usd": 288249.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.826,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3479371.31,
"financial_exposure_usd": 3677143.16,
"recoverable_pct": 0.962
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104444",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "high",
"timestamp": "2026-01-04T02:04:00Z",
"trace_id": "45715080-7f99-576c-5834-b5e7b3c6c2a1"
} | {
"account_age_days": 1939,
"account_id": "ACCT-609539A77B3F",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_3",
"session_entropy": 0.556
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 302,
"timestamp": "2026-01-03T18:03:00Z",
"transaction_amount_usd": 11.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1885889.06,
"financial_exposure_usd": 4653751.04,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100588",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-01T09:48:00Z",
"trace_id": "7f35adcc-aca7-55e7-b4ac-cc151c088b33"
} | {
"account_age_days": 1803,
"account_id": "ACCT-951EB7D6AC7C",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 410,
"timestamp": "2026-01-01T09:48:00Z",
"transaction_amount_usd": 76875.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 161815.89,
"financial_exposure_usd": 351810.11,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106560",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-05T13:20:00Z",
"trace_id": "2303aebc-8fad-eae7-ff37-20764a5180ee"
} | {
"account_age_days": 231,
"account_id": "ACCT-925D0017438E",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 151,
"timestamp": "2026-01-05T08:37:00Z",
"transaction_amount_usd": 17.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.384,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2174526.61,
"financial_exposure_usd": 2543238.4,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100218",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-01T03:38:00Z",
"trace_id": "b96a5305-3ed1-d8f8-153d-2c6b1790834b"
} | {
"account_age_days": 1658,
"account_id": "ACCT-3A8E36FD7E4C",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.707
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1041,
"timestamp": "2026-01-01T03:38:00Z",
"transaction_amount_usd": 54835
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 280038.64,
"financial_exposure_usd": 584388.55,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109174",
"label": "benign",
"label_confidence": 0.575,
"severity": "medium",
"timestamp": "2026-01-07T08:54:00Z",
"trace_id": "c30b7163-07ee-91f2-3b17-8382b53283fa"
} | {
"account_age_days": 1880,
"account_id": "ACCT-74C66F978D9B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.487
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 570,
"timestamp": "2026-01-07T08:54:00Z",
"transaction_amount_usd": 14437.23
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1402.83,
"financial_exposure_usd": 1524.11,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108062",
"label": "benign",
"label_confidence": 0.689,
"severity": "low",
"timestamp": "2026-01-06T14:22:00Z",
"trace_id": "31bddc9a-7cf8-13f3-400f-f3370c16a444"
} | {
"account_age_days": 421,
"account_id": "ACCT-407CBC3E5341",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.237
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1198,
"timestamp": "2026-01-06T14:22:00Z",
"transaction_amount_usd": 10103.29
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 462.79,
"financial_exposure_usd": 1024.41,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106306",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "low",
"timestamp": "2026-01-05T09:06:00Z",
"trace_id": "cca2e445-e95e-b19b-2c0a-cad4cf327567"
} | {
"account_age_days": 855,
"account_id": "ACCT-8CAB5518C429",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.679
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 196,
"timestamp": "2026-01-05T01:22:00Z",
"transaction_amount_usd": 0.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.593,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2800243.43,
"financial_exposure_usd": 3353101.73,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.