schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103899",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-03T16:59:00Z",
"trace_id": "0db80372-a616-8768-9b17-c5aa9252a5fc"
} | {
"account_age_days": 77,
"account_id": "ACCT-B791BE178A2C",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_3",
"session_entropy": 0.302
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 215,
"timestamp": "2026-01-03T16:59:00Z",
"transaction_amount_usd": 2330877.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.463,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6269521.36,
"financial_exposure_usd": 6729267.24,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101018",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "low",
"timestamp": "2026-01-01T16:58:00Z",
"trace_id": "e8fbcbb5-bb48-0db3-49fa-9ada24b30a5d"
} | {
"account_age_days": 800,
"account_id": "ACCT-DD700ABB1B6B",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_2",
"session_entropy": 0.872
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 262,
"timestamp": "2026-01-01T05:24:00Z",
"transaction_amount_usd": 14.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 280366.26,
"financial_exposure_usd": 508497.13,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109493",
"label": "benign",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-07T14:13:00Z",
"trace_id": "1fce3ff1-9873-c1e7-1ef6-b3ec906a7df2"
} | {
"account_age_days": 1177,
"account_id": "ACCT-1B59D75200FC",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_3",
"session_entropy": 0.197
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 242,
"timestamp": "2026-01-07T14:13:00Z",
"transaction_amount_usd": 10149.64
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3359.15,
"financial_exposure_usd": 3479,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102051",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "critical",
"timestamp": "2026-01-02T10:11:00Z",
"trace_id": "9e116e36-7148-0cec-9e2b-51ff677bf7d4"
} | {
"account_age_days": 876,
"account_id": "ACCT-E201F7325EFC",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 245,
"timestamp": "2026-01-02T10:11:00Z",
"transaction_amount_usd": 12779.95
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 506223.49,
"financial_exposure_usd": 1001001.48,
"recoverable_pct": 0.113
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105921",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-05T02:41:00Z",
"trace_id": "7973845c-0d8a-6edb-86d2-33f265cbeffa"
} | {
"account_age_days": 739,
"account_id": "ACCT-3217C0DE2867",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_2",
"session_entropy": 0.744
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 320,
"timestamp": "2026-01-04T18:55:00Z",
"transaction_amount_usd": 21.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.621,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3712617.36,
"financial_exposure_usd": 6266038.14,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101011",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "high",
"timestamp": "2026-01-01T16:51:00Z",
"trace_id": "7bd7f5b0-0c4a-4749-2c6c-b095db2d62ea"
} | {
"account_age_days": 1648,
"account_id": "ACCT-CC10D7F1E2E5",
"baseline_risk_score": 0.641,
"kyc_tier": "tier_2",
"session_entropy": 0.797
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1088,
"timestamp": "2026-01-01T16:51:00Z",
"transaction_amount_usd": 93441.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 304842.67,
"financial_exposure_usd": 691852.44,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108224",
"label": "benign",
"label_confidence": 0.721,
"severity": "high",
"timestamp": "2026-01-06T17:04:00Z",
"trace_id": "19f53ca7-6e64-80cb-ed2a-433ccba584aa"
} | {
"account_age_days": 1068,
"account_id": "ACCT-6E63CF283E29",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.875
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 278,
"timestamp": "2026-01-06T17:04:00Z",
"transaction_amount_usd": 14672.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1239.34,
"financial_exposure_usd": 2852.58,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102591",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-02T19:11:00Z",
"trace_id": "69415245-a3b6-41b2-8e81-8205e4dc82ea"
} | {
"account_age_days": 1062,
"account_id": "ACCT-1190EF546ACC",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_1",
"session_entropy": 0.736
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 428,
"timestamp": "2026-01-02T19:11:00Z",
"transaction_amount_usd": 71804.64
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 611372.66,
"financial_exposure_usd": 1060024.2,
"recoverable_pct": 0.086
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107974",
"label": "benign",
"label_confidence": 0.655,
"severity": "medium",
"timestamp": "2026-01-06T12:54:00Z",
"trace_id": "5352a47f-d30f-2e93-7555-4d84d50131c7"
} | {
"account_age_days": 788,
"account_id": "ACCT-5D4CE0B910DF",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_1",
"session_entropy": 0.358
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 233,
"timestamp": "2026-01-06T04:27:00Z",
"transaction_amount_usd": 2.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4132.08,
"financial_exposure_usd": 7033.62,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103371",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-03T08:11:00Z",
"trace_id": "b7e03d8e-1aef-7dde-3d69-c37e0b341146"
} | {
"account_age_days": 62,
"account_id": "ACCT-39F23A48B870",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_1",
"session_entropy": 0.311
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 678,
"timestamp": "2026-01-03T08:11:00Z",
"transaction_amount_usd": 663924.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.37,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7747579.82,
"financial_exposure_usd": 8688669.04,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106455",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-05T11:35:00Z",
"trace_id": "c89ba758-51a3-1748-9738-fc7af0a02bb3"
} | {
"account_age_days": 582,
"account_id": "ACCT-57A9B8D2270F",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 866,
"timestamp": "2026-01-05T11:35:00Z",
"transaction_amount_usd": 1753497.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1048222.46,
"financial_exposure_usd": 1869344.11,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108943",
"label": "benign",
"label_confidence": 0.65,
"severity": "low",
"timestamp": "2026-01-07T05:03:00Z",
"trace_id": "5f8b1a1b-4450-d08b-7276-5c8da4b83b06"
} | {
"account_age_days": 69,
"account_id": "ACCT-389B9E56A033",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.505
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1126,
"timestamp": "2026-01-07T05:03:00Z",
"transaction_amount_usd": 14753.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.743,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2407.72,
"financial_exposure_usd": 3960.29,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109862",
"label": "benign",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-07T20:22:00Z",
"trace_id": "7461e1b2-d6ee-72f6-7689-3cbc0f52f279"
} | {
"account_age_days": 1143,
"account_id": "ACCT-B8AB292F8336",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.678
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1188,
"timestamp": "2026-01-07T20:22:00Z",
"transaction_amount_usd": 7524.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1366.66,
"financial_exposure_usd": 2070.02,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109619",
"label": "benign",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-07T16:19:00Z",
"trace_id": "cb81b5a7-1887-9d58-4284-5b6ae33063af"
} | {
"account_age_days": 719,
"account_id": "ACCT-76BD188CFA6A",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_3",
"session_entropy": 0.801
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 355,
"timestamp": "2026-01-07T11:19:00Z",
"transaction_amount_usd": 23.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1037.14,
"financial_exposure_usd": 2172.95,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103168",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-03T04:48:00Z",
"trace_id": "fbd80a35-7feb-4a40-0a45-b7a4f53edfa5"
} | {
"account_age_days": 1463,
"account_id": "ACCT-3F065E1409DA",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_2",
"session_entropy": 0.536
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 830,
"timestamp": "2026-01-03T04:48:00Z",
"transaction_amount_usd": 41100.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 572005.31,
"financial_exposure_usd": 786626.23,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108917",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-07T04:37:00Z",
"trace_id": "6bfa2a00-b18a-0443-97f2-f05f485c60b6"
} | {
"account_age_days": 1587,
"account_id": "ACCT-5E23FF292032",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.843
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 401,
"timestamp": "2026-01-07T04:37:00Z",
"transaction_amount_usd": 12359.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1670.68,
"financial_exposure_usd": 4048.29,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106023",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "medium",
"timestamp": "2026-01-05T04:23:00Z",
"trace_id": "8fdbc84d-beca-79b9-ac7f-56ae72ed03df"
} | {
"account_age_days": 638,
"account_id": "ACCT-AA319DE667EE",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.538
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 578,
"timestamp": "2026-01-05T04:23:00Z",
"transaction_amount_usd": 2606894.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2516267.39,
"financial_exposure_usd": 2834025.25,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107455",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-06T04:15:00Z",
"trace_id": "49b324ea-da13-8390-8d42-81f3952e4f4b"
} | {
"account_age_days": 268,
"account_id": "ACCT-0875A55AA9AD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.464
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 174,
"timestamp": "2026-01-06T04:15:00Z",
"transaction_amount_usd": 2538.63
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1679.39,
"financial_exposure_usd": 2340.01,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104666",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-04T05:46:00Z",
"trace_id": "2e2105a0-5428-0fbf-3c74-c3a3e81d41d7"
} | {
"account_age_days": 1928,
"account_id": "ACCT-405BF03F13E9",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.469
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 208,
"timestamp": "2026-01-04T04:34:00Z",
"transaction_amount_usd": 0.59
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.946,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3437066.84,
"financial_exposure_usd": 4430531.01,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102964",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-03T01:24:00Z",
"trace_id": "46c2a267-f1f6-16b2-7e29-d28e90122cd4"
} | {
"account_age_days": 729,
"account_id": "ACCT-B7D610215F6E",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_3",
"session_entropy": 0.926
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 405,
"timestamp": "2026-01-03T01:24:00Z",
"transaction_amount_usd": 79509.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 532790.11,
"financial_exposure_usd": 533314.74,
"recoverable_pct": 0.097
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104521",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-04T03:21:00Z",
"trace_id": "0e8a8ccd-0e44-3795-e4aa-5d2f415de129"
} | {
"account_age_days": 595,
"account_id": "ACCT-F5596830C060",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_3",
"session_entropy": 0.377
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 821,
"timestamp": "2026-01-04T03:21:00Z",
"transaction_amount_usd": 431202.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3860805,
"financial_exposure_usd": 4588999.22,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104094",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "high",
"timestamp": "2026-01-03T20:14:00Z",
"trace_id": "4a2afe42-5a60-ab3e-e066-b89dd9d12c11"
} | {
"account_age_days": 813,
"account_id": "ACCT-A1C548F5311B",
"baseline_risk_score": 0.246,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 256,
"timestamp": "2026-01-03T13:26:00Z",
"transaction_amount_usd": 19.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.441,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4626436.83,
"financial_exposure_usd": 5335519.36,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109644",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-07T16:44:00Z",
"trace_id": "ade63f23-1700-ef2b-763f-9bbffa67d190"
} | {
"account_age_days": 1760,
"account_id": "ACCT-5114DC5E8C7C",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.189
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1002,
"timestamp": "2026-01-07T16:44:00Z",
"transaction_amount_usd": 7787.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1841.85,
"financial_exposure_usd": 2321.32,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102197",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-02T12:37:00Z",
"trace_id": "f7ed2188-69b3-7304-5cb1-635e41ca534d"
} | {
"account_age_days": 597,
"account_id": "ACCT-424CD538AB2F",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_1",
"session_entropy": 0.169
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 570,
"timestamp": "2026-01-02T12:37:00Z",
"transaction_amount_usd": 95402.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 698763.84,
"financial_exposure_usd": 881038.89,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103467",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-03T09:47:00Z",
"trace_id": "2845ef2a-8ab3-0149-4f49-3cac60780541"
} | {
"account_age_days": 210,
"account_id": "ACCT-78ABD0A89891",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_2",
"session_entropy": 0.942
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1013,
"timestamp": "2026-01-03T09:47:00Z",
"transaction_amount_usd": 2879139.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.795,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1938726.95,
"financial_exposure_usd": 2414390.86,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107695",
"label": "benign",
"label_confidence": 0.465,
"severity": "medium",
"timestamp": "2026-01-06T08:15:00Z",
"trace_id": "faf9655a-2d2c-8444-5d5e-089bd1a89be0"
} | {
"account_age_days": 1557,
"account_id": "ACCT-DC32D3B6079B",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_3",
"session_entropy": 0.628
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 335,
"timestamp": "2026-01-06T02:23:00Z",
"transaction_amount_usd": 7.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1877.43,
"financial_exposure_usd": 3439.5,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109701",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-07T17:41:00Z",
"trace_id": "47f0f424-1f22-aac6-93ae-75b3d898c852"
} | {
"account_age_days": 726,
"account_id": "ACCT-164476199ECA",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_3",
"session_entropy": 0.555
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 87,
"timestamp": "2026-01-07T09:43:00Z",
"transaction_amount_usd": 0.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1493.75,
"financial_exposure_usd": 1991.99,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101830",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "critical",
"timestamp": "2026-01-02T06:30:00Z",
"trace_id": "d45849ea-e540-ca0c-7fa3-22438a5a6017"
} | {
"account_age_days": 55,
"account_id": "ACCT-9E6233D58868",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 743,
"timestamp": "2026-01-02T06:30:00Z",
"transaction_amount_usd": 40258.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.609,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 440975.63,
"financial_exposure_usd": 978115.65,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102504",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "critical",
"timestamp": "2026-01-02T17:44:00Z",
"trace_id": "e034c72b-0fc8-6e96-f8f7-623a3bf49a83"
} | {
"account_age_days": 778,
"account_id": "ACCT-0F4566E574F0",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_2",
"session_entropy": 0.568
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 327,
"timestamp": "2026-01-02T12:09:00Z",
"transaction_amount_usd": 13.11
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 606188.35,
"financial_exposure_usd": 729619.41,
"recoverable_pct": 0.365
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106548",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-05T13:08:00Z",
"trace_id": "69167549-fdc5-8b99-3cff-57906e8c66e1"
} | {
"account_age_days": 1763,
"account_id": "ACCT-7FEDD8A0A0CA",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.855
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 239,
"timestamp": "2026-01-05T13:08:00Z",
"transaction_amount_usd": 1048948.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3700270.84,
"financial_exposure_usd": 4566484.61,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101027",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-01T17:07:00Z",
"trace_id": "36d38c50-a718-6dec-f0f4-9e60f832f963"
} | {
"account_age_days": 1954,
"account_id": "ACCT-0B20D1F1D92B",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.543
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 108,
"timestamp": "2026-01-01T08:46:00Z",
"transaction_amount_usd": 12.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 407040.99,
"financial_exposure_usd": 754783.38,
"recoverable_pct": 0.198
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103069",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "medium",
"timestamp": "2026-01-03T03:09:00Z",
"trace_id": "cf789297-be03-26e4-82d2-07a7d9d39d66"
} | {
"account_age_days": 741,
"account_id": "ACCT-AB572FA79673",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_1",
"session_entropy": 0.886
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1186,
"timestamp": "2026-01-03T03:09:00Z",
"transaction_amount_usd": 9001.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 243743.66,
"financial_exposure_usd": 329866.16,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101903",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-02T07:43:00Z",
"trace_id": "b1eb354f-f333-8c66-e4b3-b784547d2993"
} | {
"account_age_days": 1745,
"account_id": "ACCT-30946670D1C0",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_2",
"session_entropy": 0.327
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 180,
"timestamp": "2026-01-01T22:26:00Z",
"transaction_amount_usd": 3.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.447,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 790692.28,
"financial_exposure_usd": 1050898.25,
"recoverable_pct": 0.178
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106735",
"label": "benign",
"label_confidence": 0.531,
"severity": "high",
"timestamp": "2026-01-05T16:15:00Z",
"trace_id": "cb71ab0d-cff3-b05d-60a2-917d7a18971c"
} | {
"account_age_days": 432,
"account_id": "ACCT-A5EA471DFDD6",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_1",
"session_entropy": 0.59
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 761,
"timestamp": "2026-01-05T16:15:00Z",
"transaction_amount_usd": 13797.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 685.71,
"financial_exposure_usd": 1067.38,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108242",
"label": "benign",
"label_confidence": 0.5,
"severity": "medium",
"timestamp": "2026-01-06T17:22:00Z",
"trace_id": "a5c8e124-cbe7-da85-d76e-71d338dea75f"
} | {
"account_age_days": 1251,
"account_id": "ACCT-DE9102137D33",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.337
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 254,
"timestamp": "2026-01-06T07:54:00Z",
"transaction_amount_usd": 0.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3487.54,
"financial_exposure_usd": 5422.93,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105041",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-04T12:01:00Z",
"trace_id": "278218b7-d79d-28c0-6b76-fe0c413ade7a"
} | {
"account_age_days": 542,
"account_id": "ACCT-240C1F1B3293",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 373,
"timestamp": "2026-01-04T12:01:00Z",
"transaction_amount_usd": 228623.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.913,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 538048.77,
"financial_exposure_usd": 1265388.34,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104512",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-04T03:12:00Z",
"trace_id": "9c00c8c5-b13e-0409-ac4f-c6ea8eff6988"
} | {
"account_age_days": 462,
"account_id": "ACCT-2320F9A78BFC",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_2",
"session_entropy": 0.643
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1128,
"timestamp": "2026-01-04T03:12:00Z",
"transaction_amount_usd": 881212.66
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.708,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6662227.57,
"financial_exposure_usd": 6732373.68,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100481",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "critical",
"timestamp": "2026-01-01T08:01:00Z",
"trace_id": "78ec221b-b602-7a95-f359-92e374d30179"
} | {
"account_age_days": 1150,
"account_id": "ACCT-01361B8B755F",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_3",
"session_entropy": 0.148
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 212,
"timestamp": "2026-01-01T08:01:00Z",
"transaction_amount_usd": 41327.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.73,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 233598.53,
"financial_exposure_usd": 428345.86,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102512",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-02T17:52:00Z",
"trace_id": "4467d6d7-e11a-dd22-0fd8-0a88287fc7e6"
} | {
"account_age_days": 1449,
"account_id": "ACCT-CAA6FF607CBB",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.137
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 343,
"timestamp": "2026-01-02T07:43:00Z",
"transaction_amount_usd": 10.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 969909.22,
"financial_exposure_usd": 1060524.97,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103655",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "medium",
"timestamp": "2026-01-03T12:55:00Z",
"trace_id": "805eca8f-a373-cd4b-e42d-0765d9b0eae8"
} | {
"account_age_days": 1651,
"account_id": "ACCT-EDA93D369A2A",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_1",
"session_entropy": 0.871
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 964,
"timestamp": "2026-01-03T12:55:00Z",
"transaction_amount_usd": 1331011.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.805,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2534852.09,
"financial_exposure_usd": 6201320.12,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108734",
"label": "benign",
"label_confidence": 0.702,
"severity": "critical",
"timestamp": "2026-01-07T01:34:00Z",
"trace_id": "0d51d77a-bff0-a660-7206-b7ffe4a69524"
} | {
"account_age_days": 1710,
"account_id": "ACCT-986F40C364B0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.855
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 214,
"timestamp": "2026-01-06T22:24:00Z",
"transaction_amount_usd": 23.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2179.19,
"financial_exposure_usd": 3185.46,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106802",
"label": "benign",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-05T17:22:00Z",
"trace_id": "6b6ff2ec-a5eb-0cdc-7fbb-8ce12989f76d"
} | {
"account_age_days": 953,
"account_id": "ACCT-72F36B85B2A1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.455
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 842,
"timestamp": "2026-01-05T17:22:00Z",
"transaction_amount_usd": 14236.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2429.19,
"financial_exposure_usd": 3957.92,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105329",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-04T16:49:00Z",
"trace_id": "29a93ca8-1e3c-d6b5-82e5-6f74bed6f1c2"
} | {
"account_age_days": 68,
"account_id": "ACCT-ABAFC6DC25CC",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.598
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 111,
"timestamp": "2026-01-04T14:56:00Z",
"transaction_amount_usd": 13.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.469,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2553742.85,
"financial_exposure_usd": 2792239.56,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103962",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "low",
"timestamp": "2026-01-03T18:02:00Z",
"trace_id": "586139c3-acd6-1e84-6d89-1cb1e9880211"
} | {
"account_age_days": 1838,
"account_id": "ACCT-FC594391600D",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_2",
"session_entropy": 0.325
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 610,
"timestamp": "2026-01-03T18:02:00Z",
"transaction_amount_usd": 598110.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.409,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1803086.56,
"financial_exposure_usd": 4432025.84,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103850",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "critical",
"timestamp": "2026-01-03T16:10:00Z",
"trace_id": "bcd207c1-2b9b-cec5-c1ad-5415b49cc83c"
} | {
"account_age_days": 1498,
"account_id": "ACCT-A0CF26A36B85",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.323
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 151,
"timestamp": "2026-01-03T05:19:00Z",
"transaction_amount_usd": 18.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4337682.93,
"financial_exposure_usd": 4613179.48,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106752",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-05T16:32:00Z",
"trace_id": "260d3c68-4c26-49da-b20d-474f5c6d8123"
} | {
"account_age_days": 1141,
"account_id": "ACCT-EE376ED6BD79",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.844
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 728,
"timestamp": "2026-01-05T16:32:00Z",
"transaction_amount_usd": 280.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 851.45,
"financial_exposure_usd": 1884.13,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105708",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "high",
"timestamp": "2026-01-04T23:08:00Z",
"trace_id": "d3b65e93-4126-d2f5-1269-8bb6bbade3d1"
} | {
"account_age_days": 1965,
"account_id": "ACCT-22B2150CC41C",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_1",
"session_entropy": 0.128
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 479,
"timestamp": "2026-01-04T23:08:00Z",
"transaction_amount_usd": 2679509.56
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.928,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3252037.38,
"financial_exposure_usd": 5743305.74,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102496",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "medium",
"timestamp": "2026-01-02T17:36:00Z",
"trace_id": "fcec8177-d29e-40a5-6a3c-6d0239fb7494"
} | {
"account_age_days": 1661,
"account_id": "ACCT-D790C7A21E72",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.539
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1177,
"timestamp": "2026-01-02T17:36:00Z",
"transaction_amount_usd": 36596.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 414901.74,
"financial_exposure_usd": 637867.22,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103455",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "high",
"timestamp": "2026-01-03T09:35:00Z",
"trace_id": "f524fdb9-558d-3f52-157d-4a4588157053"
} | {
"account_age_days": 67,
"account_id": "ACCT-96062424B9A5",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 190,
"timestamp": "2026-01-03T03:15:00Z",
"transaction_amount_usd": 11.23
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.449,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1327748.86,
"financial_exposure_usd": 3082118.78,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100267",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-01T04:27:00Z",
"trace_id": "d554fadf-7633-9d1d-6694-940dddc5c146"
} | {
"account_age_days": 535,
"account_id": "ACCT-199A25092032",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 195,
"timestamp": "2025-12-31T17:58:00Z",
"transaction_amount_usd": 10.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 839456.62,
"financial_exposure_usd": 1214307.39,
"recoverable_pct": 0.042
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103251",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-03T06:11:00Z",
"trace_id": "5b2e25da-e889-4cb0-b652-63c410c99252"
} | {
"account_age_days": 419,
"account_id": "ACCT-BAB530AA0680",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_2",
"session_entropy": 0.4
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 267,
"timestamp": "2026-01-02T20:22:00Z",
"transaction_amount_usd": 21.54
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 560991.27,
"financial_exposure_usd": 842278.24,
"recoverable_pct": 0.179
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109500",
"label": "benign",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-07T14:20:00Z",
"trace_id": "593cc819-7cd7-fa18-387d-6430e632e081"
} | {
"account_age_days": 781,
"account_id": "ACCT-FFD2A9FE589F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.515
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 785,
"timestamp": "2026-01-07T14:20:00Z",
"transaction_amount_usd": 12357.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 467.19,
"financial_exposure_usd": 651.49,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105266",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-04T15:46:00Z",
"trace_id": "086d854c-cc1f-0388-2430-6a4f637cdd22"
} | {
"account_age_days": 1402,
"account_id": "ACCT-1946CD11D4FF",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_2",
"session_entropy": 0.533
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 561,
"timestamp": "2026-01-04T15:46:00Z",
"transaction_amount_usd": 1730734.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.412,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1617013.26,
"financial_exposure_usd": 3738221.02,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105332",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "high",
"timestamp": "2026-01-04T16:52:00Z",
"trace_id": "72c64502-0886-fe87-fd42-98dc3d74a3be"
} | {
"account_age_days": 865,
"account_id": "ACCT-DAAE7DF80320",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 105,
"timestamp": "2026-01-04T15:35:00Z",
"transaction_amount_usd": 20.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1788821.67,
"financial_exposure_usd": 2961281.45,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104487",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "critical",
"timestamp": "2026-01-04T02:47:00Z",
"trace_id": "5f936889-8f03-44e2-042c-f9d5c7f7a72b"
} | {
"account_age_days": 1054,
"account_id": "ACCT-C007DC41ACB7",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_1",
"session_entropy": 0.762
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 392,
"timestamp": "2026-01-04T02:47:00Z",
"transaction_amount_usd": 2477222.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.435,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3294658.61,
"financial_exposure_usd": 3545293.7,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109762",
"label": "benign",
"label_confidence": 0.58,
"severity": "medium",
"timestamp": "2026-01-07T18:42:00Z",
"trace_id": "57c60bb1-10cf-4987-8833-3104e7257bbe"
} | {
"account_age_days": 407,
"account_id": "ACCT-19636F5E6E33",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.338
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 211,
"timestamp": "2026-01-07T18:42:00Z",
"transaction_amount_usd": 14178.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2250.35,
"financial_exposure_usd": 3674.93,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100097",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-01T01:37:00Z",
"trace_id": "23bab528-6a08-9aa0-e57c-5c02ba85e403"
} | {
"account_age_days": 1052,
"account_id": "ACCT-D17AD9BDB1BA",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_3",
"session_entropy": 0.202
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 766,
"timestamp": "2026-01-01T01:37:00Z",
"transaction_amount_usd": 17664.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.361,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 554223.42,
"financial_exposure_usd": 1113550.6,
"recoverable_pct": 0.05
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104485",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-04T02:45:00Z",
"trace_id": "77b4c1b2-f6f3-8c6e-1a9c-27166089c344"
} | {
"account_age_days": 1643,
"account_id": "ACCT-33B9026359C5",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_1",
"session_entropy": 0.644
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1114,
"timestamp": "2026-01-04T02:45:00Z",
"transaction_amount_usd": 466082.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 7040942.11,
"financial_exposure_usd": 7857310.35,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100903",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "medium",
"timestamp": "2026-01-01T15:03:00Z",
"trace_id": "5f1651d6-fee9-7df3-2670-f38a9aa6bb08"
} | {
"account_age_days": 1569,
"account_id": "ACCT-00F7B844C7CF",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_3",
"session_entropy": 0.625
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 552,
"timestamp": "2026-01-01T15:03:00Z",
"transaction_amount_usd": 104546.12
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 92986.97,
"financial_exposure_usd": 163773.44,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102815",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "low",
"timestamp": "2026-01-02T22:55:00Z",
"trace_id": "3a31e3bf-98e9-f3f5-ee78-d3da24d8d5ea"
} | {
"account_age_days": 1145,
"account_id": "ACCT-A5926BA48CD8",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_2",
"session_entropy": 0.577
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 446,
"timestamp": "2026-01-02T22:55:00Z",
"transaction_amount_usd": 85410.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.4,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 501779.88,
"financial_exposure_usd": 540849.92,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107888",
"label": "benign",
"label_confidence": 0.467,
"severity": "low",
"timestamp": "2026-01-06T11:28:00Z",
"trace_id": "058433e0-91c9-1d24-ed67-daabc6f76bf0"
} | {
"account_age_days": 1340,
"account_id": "ACCT-3A7C40474462",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_1",
"session_entropy": 0.63
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 756,
"timestamp": "2026-01-06T11:28:00Z",
"transaction_amount_usd": 10513.86
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 5222.41,
"financial_exposure_usd": 8786.47,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109930",
"label": "benign",
"label_confidence": 0.487,
"severity": "high",
"timestamp": "2026-01-07T21:30:00Z",
"trace_id": "6bf3c3d5-625a-b328-5fdc-cee4089b721d"
} | {
"account_age_days": 1335,
"account_id": "ACCT-D9511D93D411",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1043,
"timestamp": "2026-01-07T21:30:00Z",
"transaction_amount_usd": 11730.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3014.78,
"financial_exposure_usd": 3921.06,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109213",
"label": "benign",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-07T09:33:00Z",
"trace_id": "a65af55e-926e-b7b5-d9b0-e356f8edae6b"
} | {
"account_age_days": 926,
"account_id": "ACCT-26E666716928",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.326
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 392,
"timestamp": "2026-01-06T21:26:00Z",
"transaction_amount_usd": 17.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1690.59,
"financial_exposure_usd": 2445.07,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101366",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "low",
"timestamp": "2026-01-01T22:46:00Z",
"trace_id": "27e9ab67-17b4-d201-8c79-590d4dfb6861"
} | {
"account_age_days": 980,
"account_id": "ACCT-F042A00D1AD9",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 952,
"timestamp": "2026-01-01T22:46:00Z",
"transaction_amount_usd": 111543.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.494,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 309013.33,
"financial_exposure_usd": 736528.14,
"recoverable_pct": 0.398
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106775",
"label": "benign",
"label_confidence": 0.703,
"severity": "high",
"timestamp": "2026-01-05T16:55:00Z",
"trace_id": "b8c3ca78-16ec-510c-2255-a7d2a9087e10"
} | {
"account_age_days": 309,
"account_id": "ACCT-FCB6A31B66F1",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 331,
"timestamp": "2026-01-05T07:01:00Z",
"transaction_amount_usd": 19.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 821.48,
"financial_exposure_usd": 1567.29,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109622",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-07T16:22:00Z",
"trace_id": "55836d7a-5185-9e5f-38dc-eed1e92d288d"
} | {
"account_age_days": 127,
"account_id": "ACCT-E8A06168791F",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_3",
"session_entropy": 0.879
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 937,
"timestamp": "2026-01-07T16:22:00Z",
"transaction_amount_usd": 13230.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7333.98,
"financial_exposure_usd": 8659.33,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101817",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "medium",
"timestamp": "2026-01-02T06:17:00Z",
"trace_id": "50d73c40-3db1-c249-c5f1-dcb460de1a9f"
} | {
"account_age_days": 1683,
"account_id": "ACCT-C04A12F27C4D",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 959,
"timestamp": "2026-01-02T06:17:00Z",
"transaction_amount_usd": 118826.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.686,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 674205.77,
"financial_exposure_usd": 970269.87,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102500",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "low",
"timestamp": "2026-01-02T17:40:00Z",
"trace_id": "6ade5155-1a90-975b-369f-19827813c630"
} | {
"account_age_days": 401,
"account_id": "ACCT-DA70D9A300E8",
"baseline_risk_score": 0.513,
"kyc_tier": "tier_3",
"session_entropy": 0.457
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 1016,
"timestamp": "2026-01-02T17:40:00Z",
"transaction_amount_usd": 7222.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 293359.01,
"financial_exposure_usd": 307501.08,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109944",
"label": "benign",
"label_confidence": 0.681,
"severity": "high",
"timestamp": "2026-01-07T21:44:00Z",
"trace_id": "967c13be-afcb-dd0b-796f-5e8b8599c37b"
} | {
"account_age_days": 28,
"account_id": "ACCT-F9596448C774",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.932
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 258,
"timestamp": "2026-01-07T12:15:00Z",
"transaction_amount_usd": 2.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 7071.57,
"financial_exposure_usd": 8031.7,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102105",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-02T11:05:00Z",
"trace_id": "1fbf1d80-c789-0b16-29b5-123b65a1730a"
} | {
"account_age_days": 1937,
"account_id": "ACCT-B502A2A10CC0",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_3",
"session_entropy": 0.32
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1173,
"timestamp": "2026-01-02T11:05:00Z",
"transaction_amount_usd": 3783.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 320485.58,
"financial_exposure_usd": 395561.7,
"recoverable_pct": 0.382
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105614",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-04T21:34:00Z",
"trace_id": "96dc011e-a938-c721-50d2-c85dc4547f0a"
} | {
"account_age_days": 1350,
"account_id": "ACCT-C35B542FF66B",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_2",
"session_entropy": 0.796
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 183,
"timestamp": "2026-01-04T19:34:00Z",
"transaction_amount_usd": 8.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 817024.33,
"financial_exposure_usd": 1056769.62,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108275",
"label": "benign",
"label_confidence": 0.749,
"severity": "critical",
"timestamp": "2026-01-06T17:55:00Z",
"trace_id": "5fcbbb43-f863-c3eb-5343-d094abf240ce"
} | {
"account_age_days": 1108,
"account_id": "ACCT-FFC3F858263E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.427
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 170,
"timestamp": "2026-01-06T17:55:00Z",
"transaction_amount_usd": 8938.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4658.01,
"financial_exposure_usd": 6771.94,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101655",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "high",
"timestamp": "2026-01-02T03:35:00Z",
"trace_id": "9c121e7c-ccec-a813-3029-d965537fd3b1"
} | {
"account_age_days": 966,
"account_id": "ACCT-81BA72C7BBCF",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_3",
"session_entropy": 0.703
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 320,
"timestamp": "2026-01-01T18:21:00Z",
"transaction_amount_usd": 0.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.438,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 263670.62,
"financial_exposure_usd": 474157.94,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102788",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "critical",
"timestamp": "2026-01-02T22:28:00Z",
"trace_id": "bd9ef12e-ae53-fb22-8349-21bae1baeb0c"
} | {
"account_age_days": 743,
"account_id": "ACCT-26ED65654554",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_2",
"session_entropy": 0.663
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 839,
"timestamp": "2026-01-02T22:28:00Z",
"transaction_amount_usd": 112543.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.529,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 901366.24,
"financial_exposure_usd": 1553330.28,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101032",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "high",
"timestamp": "2026-01-01T17:12:00Z",
"trace_id": "08310ab1-b88a-9c95-a426-c86da549dbf6"
} | {
"account_age_days": 565,
"account_id": "ACCT-4B89264AE100",
"baseline_risk_score": 0.477,
"kyc_tier": "tier_3",
"session_entropy": 0.675
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 117,
"timestamp": "2026-01-01T17:12:00Z",
"transaction_amount_usd": 9364.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 687039.02,
"financial_exposure_usd": 1060869.25,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107412",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-06T03:32:00Z",
"trace_id": "737aa7a1-4aea-2dd0-cb03-12c970ae2120"
} | {
"account_age_days": 207,
"account_id": "ACCT-72C136AB3A20",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.714
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 227,
"timestamp": "2026-01-05T22:20:00Z",
"transaction_amount_usd": 12.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1822.83,
"financial_exposure_usd": 3475.48,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100170",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-01T02:50:00Z",
"trace_id": "84868583-906a-e95d-0c5c-994057537534"
} | {
"account_age_days": 913,
"account_id": "ACCT-EB4F9EFBB4D1",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_2",
"session_entropy": 0.818
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 445,
"timestamp": "2026-01-01T02:50:00Z",
"transaction_amount_usd": 101365.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.508,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 938074.17,
"financial_exposure_usd": 941986.85,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102463",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-02T17:03:00Z",
"trace_id": "1eabb6f1-3114-b744-b15c-ffc9c3397b73"
} | {
"account_age_days": 266,
"account_id": "ACCT-4E8E9815E6A5",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_1",
"session_entropy": 0.656
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 725,
"timestamp": "2026-01-02T17:03:00Z",
"transaction_amount_usd": 87934.18
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1038043.87,
"financial_exposure_usd": 1181216.42,
"recoverable_pct": 0.133
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108238",
"label": "benign",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-06T17:18:00Z",
"trace_id": "a86131e2-60c1-23e9-45ae-282ac20426e7"
} | {
"account_age_days": 108,
"account_id": "ACCT-06B4B25C852A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.462
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 218,
"timestamp": "2026-01-06T12:51:00Z",
"transaction_amount_usd": 23.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.767,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2235.73,
"financial_exposure_usd": 3545.68,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100878",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "low",
"timestamp": "2026-01-01T14:38:00Z",
"trace_id": "196d3d73-eaf1-ea4b-f4ca-11cd24250f11"
} | {
"account_age_days": 630,
"account_id": "ACCT-7BAE0AC476F2",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_3",
"session_entropy": 0.12
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 121,
"timestamp": "2026-01-01T13:56:00Z",
"transaction_amount_usd": 11.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 312591.78,
"financial_exposure_usd": 492703.63,
"recoverable_pct": 0.393
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107761",
"label": "benign",
"label_confidence": 0.47,
"severity": "medium",
"timestamp": "2026-01-06T09:21:00Z",
"trace_id": "35d5e050-0983-64c7-0c7f-59a335b3d43f"
} | {
"account_age_days": 1254,
"account_id": "ACCT-3A874D8D1895",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.655
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 260,
"timestamp": "2026-01-06T09:21:00Z",
"transaction_amount_usd": 8078.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6429.93,
"financial_exposure_usd": 7784.22,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106538",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "critical",
"timestamp": "2026-01-05T12:58:00Z",
"trace_id": "e507d45c-d304-244f-e68b-b4336f31fdde"
} | {
"account_age_days": 1293,
"account_id": "ACCT-7AAC6F6B845B",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.604
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 993,
"timestamp": "2026-01-05T12:58:00Z",
"transaction_amount_usd": 1239499.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1410720.6,
"financial_exposure_usd": 2550723.68,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102641",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "critical",
"timestamp": "2026-01-02T20:01:00Z",
"trace_id": "ad043b2c-d2d9-d8be-cbcc-4bccb6775302"
} | {
"account_age_days": 1934,
"account_id": "ACCT-90C3110CCB29",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_3",
"session_entropy": 0.612
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 303,
"timestamp": "2026-01-02T20:01:00Z",
"transaction_amount_usd": 64185.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 683370.47,
"financial_exposure_usd": 795963.6,
"recoverable_pct": 0.107
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109146",
"label": "benign",
"label_confidence": 0.647,
"severity": "medium",
"timestamp": "2026-01-07T08:26:00Z",
"trace_id": "b0281cb7-576a-46c1-506f-f64e9c528e5b"
} | {
"account_age_days": 1645,
"account_id": "ACCT-140162B6BF3C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.176
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 375,
"timestamp": "2026-01-07T08:26:00Z",
"transaction_amount_usd": 10406.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3357.56,
"financial_exposure_usd": 3840.57,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106353",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-05T09:53:00Z",
"trace_id": "6d821d9e-e31f-8473-e5b4-d62d962ee66c"
} | {
"account_age_days": 1336,
"account_id": "ACCT-73F8D5E2ED98",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 910,
"timestamp": "2026-01-05T09:53:00Z",
"transaction_amount_usd": 2064277.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.693,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3747214.91,
"financial_exposure_usd": 3971820.19,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101075",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "high",
"timestamp": "2026-01-01T17:55:00Z",
"trace_id": "bd513ea9-6777-69ad-6f1a-5e33c154bb75"
} | {
"account_age_days": 1722,
"account_id": "ACCT-F6ED13CE2E89",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1020,
"timestamp": "2026-01-01T17:55:00Z",
"transaction_amount_usd": 94849.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 698703.84,
"financial_exposure_usd": 1000673.2,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106055",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "low",
"timestamp": "2026-01-05T04:55:00Z",
"trace_id": "e6e651c9-fad0-5f0f-0fa1-6b0c115fa404"
} | {
"account_age_days": 1251,
"account_id": "ACCT-D4C5776F46A8",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 787,
"timestamp": "2026-01-05T04:55:00Z",
"transaction_amount_usd": 2121603.21
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4498827.37,
"financial_exposure_usd": 6958957.71,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105511",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-04T19:51:00Z",
"trace_id": "08438ccf-2c9e-8b89-06c9-fba4e2f407ee"
} | {
"account_age_days": 577,
"account_id": "ACCT-BCE88676A5DC",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_3",
"session_entropy": 0.446
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 355,
"timestamp": "2026-01-04T19:51:00Z",
"transaction_amount_usd": 1944073.58
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.706,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4404126.75,
"financial_exposure_usd": 5134352.71,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104827",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "low",
"timestamp": "2026-01-04T08:27:00Z",
"trace_id": "cb3357e4-e474-f994-4613-622de1a1f334"
} | {
"account_age_days": 1149,
"account_id": "ACCT-D952045A37D1",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.439
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1023,
"timestamp": "2026-01-04T08:27:00Z",
"transaction_amount_usd": 1132167.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1892417.51,
"financial_exposure_usd": 3618818.1,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107483",
"label": "benign",
"label_confidence": 0.616,
"severity": "medium",
"timestamp": "2026-01-06T04:43:00Z",
"trace_id": "861678b8-89d3-a159-e46a-cb563642bfa7"
} | {
"account_age_days": 312,
"account_id": "ACCT-DE025FF4371B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.751
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 265,
"timestamp": "2026-01-06T04:43:00Z",
"transaction_amount_usd": 10244.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 338.53,
"financial_exposure_usd": 808.44,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100209",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-01T03:29:00Z",
"trace_id": "781e2d35-2fa1-f2bc-b4ce-5f319aff48af"
} | {
"account_age_days": 540,
"account_id": "ACCT-F5946DE4AD9E",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_3",
"session_entropy": 0.156
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 92,
"timestamp": "2026-01-01T03:29:00Z",
"transaction_amount_usd": 71221.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.62,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 623742.92,
"financial_exposure_usd": 1002373.39,
"recoverable_pct": 0.255
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107711",
"label": "benign",
"label_confidence": 0.708,
"severity": "medium",
"timestamp": "2026-01-06T08:31:00Z",
"trace_id": "b6406391-4c0a-bf2a-70f8-a62a6f563b0b"
} | {
"account_age_days": 812,
"account_id": "ACCT-6C7A0FBE12A4",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.244
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 933,
"timestamp": "2026-01-06T08:31:00Z",
"transaction_amount_usd": 3648.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 7442.14,
"financial_exposure_usd": 8676.1,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106875",
"label": "benign",
"label_confidence": 0.661,
"severity": "high",
"timestamp": "2026-01-05T18:35:00Z",
"trace_id": "2904fa93-4d6d-e0ee-4cee-bfbe10e55a6b"
} | {
"account_age_days": 1305,
"account_id": "ACCT-FA936719E83D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.338
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1054,
"timestamp": "2026-01-05T18:35:00Z",
"transaction_amount_usd": 12831.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 740.26,
"financial_exposure_usd": 1821.85,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106466",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-05T11:46:00Z",
"trace_id": "fd062be1-5be0-c39b-b71f-c9a6f29478a3"
} | {
"account_age_days": 254,
"account_id": "ACCT-BAFF74C49C94",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_3",
"session_entropy": 0.158
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1193,
"timestamp": "2026-01-05T11:46:00Z",
"transaction_amount_usd": 1908126.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.412,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3742891.55,
"financial_exposure_usd": 5015748.24,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101604",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-02T02:44:00Z",
"trace_id": "66f7a436-3430-5f89-5d2e-73595cab4ee8"
} | {
"account_age_days": 765,
"account_id": "ACCT-4F1C8A92198A",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_1",
"session_entropy": 0.594
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1010,
"timestamp": "2026-01-02T02:44:00Z",
"transaction_amount_usd": 84525.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 574302.99,
"financial_exposure_usd": 625579.42,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108570",
"label": "benign",
"label_confidence": 0.497,
"severity": "low",
"timestamp": "2026-01-06T22:50:00Z",
"trace_id": "1f30ba3e-fcff-7e8b-0763-2a5d7a19d90d"
} | {
"account_age_days": 1988,
"account_id": "ACCT-D2386A3F7653",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 350,
"timestamp": "2026-01-06T20:40:00Z",
"transaction_amount_usd": 14.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 64.79,
"financial_exposure_usd": 100.64,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104504",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "medium",
"timestamp": "2026-01-04T03:04:00Z",
"trace_id": "9634e3d0-fea7-c014-a675-a28f1ce716ea"
} | {
"account_age_days": 342,
"account_id": "ACCT-B2DCAA606A5A",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 133,
"timestamp": "2026-01-04T03:04:00Z",
"transaction_amount_usd": 1437169.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.43,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1580227.57,
"financial_exposure_usd": 3132853.25,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105040",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-04T12:00:00Z",
"trace_id": "4d047337-9b83-1e24-ba05-bd6c660086cf"
} | {
"account_age_days": 1797,
"account_id": "ACCT-9F656A2FEDE8",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_1",
"session_entropy": 0.599
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 524,
"timestamp": "2026-01-04T12:00:00Z",
"transaction_amount_usd": 602886.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.446,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5269587.94,
"financial_exposure_usd": 6036114.89,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100114",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-01T01:54:00Z",
"trace_id": "853d8090-2041-e7ed-e13f-8740bd740fe0"
} | {
"account_age_days": 811,
"account_id": "ACCT-8F188E729696",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.541
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 91,
"timestamp": "2025-12-31T16:03:00Z",
"transaction_amount_usd": 13.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.649,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 831637.28,
"financial_exposure_usd": 833381.49,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105457",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-04T18:57:00Z",
"trace_id": "fdcbd3bc-20eb-7481-1fa6-d0fd07815205"
} | {
"account_age_days": 1862,
"account_id": "ACCT-CBA53913D17A",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_1",
"session_entropy": 0.946
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 417,
"timestamp": "2026-01-04T18:57:00Z",
"transaction_amount_usd": 400332.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 523553.49,
"financial_exposure_usd": 585127.55,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.