schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104529",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-04T03:29:00Z",
"trace_id": "44081206-ba98-a679-9b4e-6ac7e48349e7"
} | {
"account_age_days": 1534,
"account_id": "ACCT-DCD40C12D6F7",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_3",
"session_entropy": 0.429
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 215,
"timestamp": "2026-01-04T03:29:00Z",
"transaction_amount_usd": 2328633.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.744,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1757417.11,
"financial_exposure_usd": 2635967.25,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103785",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-03T15:05:00Z",
"trace_id": "9b6cf38a-6a9f-e2b8-08cb-d91f2cb2f78f"
} | {
"account_age_days": 1548,
"account_id": "ACCT-137CCC9AC50E",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.944
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 501,
"timestamp": "2026-01-03T15:05:00Z",
"transaction_amount_usd": 2134549.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4419145.91,
"financial_exposure_usd": 4811185.01,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105253",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-04T15:33:00Z",
"trace_id": "35060932-1ba9-69ba-43cc-bf1b15408e22"
} | {
"account_age_days": 1076,
"account_id": "ACCT-23E913967671",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_1",
"session_entropy": 0.178
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1161,
"timestamp": "2026-01-04T15:33:00Z",
"transaction_amount_usd": 1458823.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1981021.17,
"financial_exposure_usd": 2567715.64,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109006",
"label": "benign",
"label_confidence": 0.692,
"severity": "low",
"timestamp": "2026-01-07T06:06:00Z",
"trace_id": "1964c72a-d057-aa77-bf0c-fd88ed513bee"
} | {
"account_age_days": 552,
"account_id": "ACCT-EBC9B8C46D88",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 831,
"timestamp": "2026-01-07T06:06:00Z",
"transaction_amount_usd": 3291.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.505,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100022",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-01T00:22:00Z",
"trace_id": "ada58417-5e2a-d32d-31ab-0b56d5c9fdc7"
} | {
"account_age_days": 527,
"account_id": "ACCT-E7E646C70158",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 937,
"timestamp": "2026-01-01T00:22:00Z",
"transaction_amount_usd": 55670.76
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.679,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 631088.33,
"financial_exposure_usd": 1352200.45,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101652",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-02T03:32:00Z",
"trace_id": "e03946cd-f3fc-cd1d-183f-a358d3c436c5"
} | {
"account_age_days": 170,
"account_id": "ACCT-DE7D07C3FB74",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_1",
"session_entropy": 0.124
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 986,
"timestamp": "2026-01-02T03:32:00Z",
"transaction_amount_usd": 19153.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.399,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 438200.06,
"financial_exposure_usd": 450498.63,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109917",
"label": "benign",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-07T21:17:00Z",
"trace_id": "b9a71793-3de4-9d89-c2ba-db8649fe99f0"
} | {
"account_age_days": 1191,
"account_id": "ACCT-8F2A91070A18",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.553
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 328,
"timestamp": "2026-01-07T12:14:00Z",
"transaction_amount_usd": 13.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 662.97,
"financial_exposure_usd": 1010.01,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104951",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "critical",
"timestamp": "2026-01-04T10:31:00Z",
"trace_id": "90e6ad1b-f755-a482-4db7-fc89222dd5e4"
} | {
"account_age_days": 897,
"account_id": "ACCT-43C279F268CF",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_2",
"session_entropy": 0.182
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 120,
"timestamp": "2026-01-04T10:31:00Z",
"transaction_amount_usd": 1956528.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.786,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3405524.96,
"financial_exposure_usd": 6061488.24,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100944",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-01T15:44:00Z",
"trace_id": "72deef9f-5e6e-422d-6460-c7d2749f6ea9"
} | {
"account_age_days": 875,
"account_id": "ACCT-8ABC5819974E",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_2",
"session_entropy": 0.775
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 251,
"timestamp": "2026-01-01T06:18:00Z",
"transaction_amount_usd": 10.52
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.767,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 419975.44,
"financial_exposure_usd": 912153.56,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105859",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "medium",
"timestamp": "2026-01-05T01:39:00Z",
"trace_id": "74f7ec22-986e-8aff-1eb4-5cf47ce2b0b1"
} | {
"account_age_days": 385,
"account_id": "ACCT-FD15FCF0CA19",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_2",
"session_entropy": 0.294
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 185,
"timestamp": "2026-01-04T19:59:00Z",
"transaction_amount_usd": 9.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2630185.49,
"financial_exposure_usd": 5231182.25,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105274",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "high",
"timestamp": "2026-01-04T15:54:00Z",
"trace_id": "3d6d3199-6186-5ef7-61f5-d1c16cb206e8"
} | {
"account_age_days": 1282,
"account_id": "ACCT-D650348193B3",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_1",
"session_entropy": 0.505
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1004,
"timestamp": "2026-01-04T15:54:00Z",
"transaction_amount_usd": 2298651.25
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1812608.09,
"financial_exposure_usd": 3798900.8,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108581",
"label": "benign",
"label_confidence": 0.579,
"severity": "low",
"timestamp": "2026-01-06T23:01:00Z",
"trace_id": "d1e9c9e9-ae56-97a5-ea77-ab8381e61215"
} | {
"account_age_days": 199,
"account_id": "ACCT-A086F2077424",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.616
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 430,
"timestamp": "2026-01-06T23:01:00Z",
"transaction_amount_usd": 11182.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2094.54,
"financial_exposure_usd": 4761.62,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107003",
"label": "benign",
"label_confidence": 0.704,
"severity": "low",
"timestamp": "2026-01-05T20:43:00Z",
"trace_id": "2a07b077-bd7b-a1f9-676c-ef84425a3e88"
} | {
"account_age_days": 43,
"account_id": "ACCT-E1B05E9C3B6C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.118
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 145,
"timestamp": "2026-01-05T20:43:00Z",
"transaction_amount_usd": 2439.01
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1598.49,
"financial_exposure_usd": 1988.52,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105423",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-04T18:23:00Z",
"trace_id": "9820e26d-4628-6ba2-ead7-16558e6c23f3"
} | {
"account_age_days": 1388,
"account_id": "ACCT-2B0A51E54B9E",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.285
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 877,
"timestamp": "2026-01-04T18:23:00Z",
"transaction_amount_usd": 2824686.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.824,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2719728.48,
"financial_exposure_usd": 3999606.89,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107588",
"label": "benign",
"label_confidence": 0.573,
"severity": "low",
"timestamp": "2026-01-06T06:28:00Z",
"trace_id": "2aa5c929-18fc-aa41-f741-80a148d03df1"
} | {
"account_age_days": 1064,
"account_id": "ACCT-7C9B84231172",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 542,
"timestamp": "2026-01-06T06:28:00Z",
"transaction_amount_usd": 11658.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1369.38,
"financial_exposure_usd": 1476.55,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102580",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-02T19:00:00Z",
"trace_id": "c166bf18-d2bc-a8c4-a4bb-6bdd1291df2e"
} | {
"account_age_days": 1285,
"account_id": "ACCT-5703F7464482",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_2",
"session_entropy": 0.348
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 130,
"timestamp": "2026-01-02T13:13:00Z",
"transaction_amount_usd": 18.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.467,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 448201.84,
"financial_exposure_usd": 530005.91,
"recoverable_pct": 0.249
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106470",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-05T11:50:00Z",
"trace_id": "523882bd-6a5c-b6f2-4ae0-3e3616014ee5"
} | {
"account_age_days": 1985,
"account_id": "ACCT-511714C41811",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_2",
"session_entropy": 0.702
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 667,
"timestamp": "2026-01-05T11:50:00Z",
"transaction_amount_usd": 2150758.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1790976.63,
"financial_exposure_usd": 4352799.2,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106500",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "medium",
"timestamp": "2026-01-05T12:20:00Z",
"trace_id": "4f56c515-b775-2417-5a06-d09e781b34e4"
} | {
"account_age_days": 1020,
"account_id": "ACCT-B842F65D48D6",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.108
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 301,
"timestamp": "2026-01-05T12:20:00Z",
"transaction_amount_usd": 1970377.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2395456.7,
"financial_exposure_usd": 4168629.87,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103089",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "critical",
"timestamp": "2026-01-03T03:29:00Z",
"trace_id": "331db0e9-4764-e241-9f6e-3c52a67ee7d3"
} | {
"account_age_days": 1729,
"account_id": "ACCT-EED79EBD390F",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_3",
"session_entropy": 0.179
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 285,
"timestamp": "2026-01-02T16:58:00Z",
"transaction_amount_usd": 11.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 334992.49,
"financial_exposure_usd": 712209.7,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107014",
"label": "benign",
"label_confidence": 0.472,
"severity": "medium",
"timestamp": "2026-01-05T20:54:00Z",
"trace_id": "a2800ba0-6e8b-090e-cce9-202f3b4c5353"
} | {
"account_age_days": 1393,
"account_id": "ACCT-68E449D2E1CA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1020,
"timestamp": "2026-01-05T20:54:00Z",
"transaction_amount_usd": 6044.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.519,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4413.16,
"financial_exposure_usd": 5487.73,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107268",
"label": "benign",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-06T01:08:00Z",
"trace_id": "6cae99fd-fc8e-2b4c-7998-6a6f9e907662"
} | {
"account_age_days": 796,
"account_id": "ACCT-736F0D778075",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.226
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 202,
"timestamp": "2026-01-05T23:47:00Z",
"transaction_amount_usd": 9.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 295.83,
"financial_exposure_usd": 385.43,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102037",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "low",
"timestamp": "2026-01-02T09:57:00Z",
"trace_id": "772ddcb1-53b8-5aa9-a478-764ebac5f70f"
} | {
"account_age_days": 1537,
"account_id": "ACCT-B2AF333382CF",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_2",
"session_entropy": 0.279
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 106,
"timestamp": "2026-01-02T09:57:00Z",
"transaction_amount_usd": 88660.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 755563.6,
"financial_exposure_usd": 1227158.07,
"recoverable_pct": 0.155
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108076",
"label": "benign",
"label_confidence": 0.62,
"severity": "high",
"timestamp": "2026-01-06T14:36:00Z",
"trace_id": "308dd1f6-cfec-7543-ac52-cc22a802c063"
} | {
"account_age_days": 1091,
"account_id": "ACCT-80415468143A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.333
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 265,
"timestamp": "2026-01-06T11:48:00Z",
"transaction_amount_usd": 9.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1072.13,
"financial_exposure_usd": 1150.5,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109068",
"label": "benign",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-07T07:08:00Z",
"trace_id": "50c53890-7366-85bb-6721-1db141739c7e"
} | {
"account_age_days": 1345,
"account_id": "ACCT-A921893798F4",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_3",
"session_entropy": 0.117
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 451,
"timestamp": "2026-01-07T07:08:00Z",
"transaction_amount_usd": 6491
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5044.08,
"financial_exposure_usd": 8234.79,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109571",
"label": "benign",
"label_confidence": 0.638,
"severity": "high",
"timestamp": "2026-01-07T15:31:00Z",
"trace_id": "f7ebabf0-a8e5-94e4-b642-ebbbe0f41f0d"
} | {
"account_age_days": 777,
"account_id": "ACCT-AC781DD7B8CA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.926
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 953,
"timestamp": "2026-01-07T15:31:00Z",
"transaction_amount_usd": 2959.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3821.95,
"financial_exposure_usd": 3898.69,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104113",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-03T20:33:00Z",
"trace_id": "b013f529-07b0-ebfc-5bf1-24b2486b6cbd"
} | {
"account_age_days": 666,
"account_id": "ACCT-A3C2790DA9C3",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 684,
"timestamp": "2026-01-03T20:33:00Z",
"transaction_amount_usd": 997587.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4938301.35,
"financial_exposure_usd": 5732518.43,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104776",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "low",
"timestamp": "2026-01-04T07:36:00Z",
"trace_id": "bf073ca0-f30d-0149-c84f-6ce55f584a07"
} | {
"account_age_days": 1091,
"account_id": "ACCT-57A9440C8995",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 375,
"timestamp": "2026-01-03T21:06:00Z",
"transaction_amount_usd": 4.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2793456.85,
"financial_exposure_usd": 4702257.77,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104633",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-04T05:13:00Z",
"trace_id": "a8a7d163-fe3c-033e-c64b-b53adb29a0bb"
} | {
"account_age_days": 1349,
"account_id": "ACCT-86E0C008AD76",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 444,
"timestamp": "2026-01-04T05:13:00Z",
"transaction_amount_usd": 774126.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 8033827.09,
"financial_exposure_usd": 8363166.03,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106971",
"label": "benign",
"label_confidence": 0.597,
"severity": "low",
"timestamp": "2026-01-05T20:11:00Z",
"trace_id": "c2ce1495-96e3-92cb-afa3-f73b852243a6"
} | {
"account_age_days": 1346,
"account_id": "ACCT-E20B9435EDB1",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 378,
"timestamp": "2026-01-05T20:11:00Z",
"transaction_amount_usd": 14350.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2312.49,
"financial_exposure_usd": 2323.95,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106911",
"label": "benign",
"label_confidence": 0.484,
"severity": "high",
"timestamp": "2026-01-05T19:11:00Z",
"trace_id": "77a04e4c-6e62-d36d-08e3-68d306c047a2"
} | {
"account_age_days": 1961,
"account_id": "ACCT-7319DB53F204",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.896
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 426,
"timestamp": "2026-01-05T19:11:00Z",
"transaction_amount_usd": 12611.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2280.17,
"financial_exposure_usd": 4132.04,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108509",
"label": "benign",
"label_confidence": 0.581,
"severity": "medium",
"timestamp": "2026-01-06T21:49:00Z",
"trace_id": "77aac5f6-2094-be05-3f5d-f2ea9ea25034"
} | {
"account_age_days": 64,
"account_id": "ACCT-91C9C24A450A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.904
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 693,
"timestamp": "2026-01-06T21:49:00Z",
"transaction_amount_usd": 6007.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2837.49,
"financial_exposure_usd": 4983.48,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107283",
"label": "benign",
"label_confidence": 0.451,
"severity": "medium",
"timestamp": "2026-01-06T01:23:00Z",
"trace_id": "0b129ced-bfb0-c325-e98f-88252317f725"
} | {
"account_age_days": 1157,
"account_id": "ACCT-E026D05B36DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.887
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 191,
"timestamp": "2026-01-05T14:59:00Z",
"transaction_amount_usd": 3.15
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1933.44,
"financial_exposure_usd": 3906.14,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101949",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-02T08:29:00Z",
"trace_id": "8192ae93-cc7c-afc4-f639-38643d7c04f6"
} | {
"account_age_days": 1030,
"account_id": "ACCT-43ECFB52E96C",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 528,
"timestamp": "2026-01-02T08:29:00Z",
"transaction_amount_usd": 104195.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 298689.47,
"financial_exposure_usd": 649151.12,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102935",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-03T00:55:00Z",
"trace_id": "8609f4d1-d726-9602-f18f-d1c1cbeed30a"
} | {
"account_age_days": 772,
"account_id": "ACCT-BFC74263ABFA",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.153
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 157,
"timestamp": "2026-01-03T00:55:00Z",
"transaction_amount_usd": 45189.62
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 176942.83,
"financial_exposure_usd": 213449.39,
"recoverable_pct": 0.028
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102461",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "low",
"timestamp": "2026-01-02T17:01:00Z",
"trace_id": "e377bc0c-5df7-943c-e9d7-c94d9aad1a24"
} | {
"account_age_days": 592,
"account_id": "ACCT-EBD1EE2C0DDC",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_3",
"session_entropy": 0.923
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1049,
"timestamp": "2026-01-02T17:01:00Z",
"transaction_amount_usd": 14947.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 38308.03,
"financial_exposure_usd": 52625.32,
"recoverable_pct": 0.072
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107582",
"label": "benign",
"label_confidence": 0.588,
"severity": "low",
"timestamp": "2026-01-06T06:22:00Z",
"trace_id": "664e1322-d994-5de1-c3de-74aa266a68bb"
} | {
"account_age_days": 530,
"account_id": "ACCT-81C6D718EC9E",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_3",
"session_entropy": 0.711
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 802,
"timestamp": "2026-01-06T06:22:00Z",
"transaction_amount_usd": 6408.46
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 664.26,
"financial_exposure_usd": 782.27,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105876",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "critical",
"timestamp": "2026-01-05T01:56:00Z",
"trace_id": "f78459a6-135f-90e3-e792-e854c6602fcb"
} | {
"account_age_days": 832,
"account_id": "ACCT-EE806FE4CA79",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_3",
"session_entropy": 0.925
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 229,
"timestamp": "2026-01-04T21:41:00Z",
"transaction_amount_usd": 5.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.495,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3148090.39,
"financial_exposure_usd": 5086655.57,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103730",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-03T14:10:00Z",
"trace_id": "e59232b0-35ed-dfc3-18ba-f9398362ff5d"
} | {
"account_age_days": 95,
"account_id": "ACCT-8B447E10CE09",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_2",
"session_entropy": 0.714
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 303,
"timestamp": "2026-01-03T14:10:00Z",
"transaction_amount_usd": 2238685.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1523532.72,
"financial_exposure_usd": 3428071.9,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107486",
"label": "benign",
"label_confidence": 0.562,
"severity": "low",
"timestamp": "2026-01-06T04:46:00Z",
"trace_id": "7a0bc202-3719-8c36-a28e-56e9d36f587e"
} | {
"account_age_days": 1354,
"account_id": "ACCT-A934D82113AA",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.208
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1192,
"timestamp": "2026-01-06T04:46:00Z",
"transaction_amount_usd": 14371.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3428.2,
"financial_exposure_usd": 6859.43,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107614",
"label": "benign",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-06T06:54:00Z",
"trace_id": "ac9849c9-fd93-b46b-b4be-57bd46bfb9fa"
} | {
"account_age_days": 581,
"account_id": "ACCT-B1B58A0FA153",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.934
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 215,
"timestamp": "2026-01-05T19:28:00Z",
"transaction_amount_usd": 14.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2148.65,
"financial_exposure_usd": 4706.83,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108677",
"label": "benign",
"label_confidence": 0.495,
"severity": "high",
"timestamp": "2026-01-07T00:37:00Z",
"trace_id": "b9fb3183-6fc5-b4b0-68ec-27a5d05cd9db"
} | {
"account_age_days": 285,
"account_id": "ACCT-053CCE1E49D5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.518
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 328,
"timestamp": "2026-01-06T22:46:00Z",
"transaction_amount_usd": 10.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2090.01,
"financial_exposure_usd": 3009.95,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106230",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-05T07:50:00Z",
"trace_id": "d5712aa1-2ef3-24b8-239c-c166c0a82240"
} | {
"account_age_days": 1643,
"account_id": "ACCT-3C8BF0A8DE68",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.919
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 340,
"timestamp": "2026-01-05T07:50:00Z",
"transaction_amount_usd": 2045980.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3472618.96,
"financial_exposure_usd": 5610435.53,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103778",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-03T14:58:00Z",
"trace_id": "2141f397-a9ac-fe89-4b37-ab1162179bda"
} | {
"account_age_days": 1909,
"account_id": "ACCT-20A7B0A1E2B1",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_2",
"session_entropy": 0.478
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 109,
"timestamp": "2026-01-03T14:58:00Z",
"transaction_amount_usd": 774824.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.516,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 217124.14,
"financial_exposure_usd": 335891.39,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106245",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-05T08:05:00Z",
"trace_id": "83dabe3c-3b42-5926-6fde-4bb819106a94"
} | {
"account_age_days": 919,
"account_id": "ACCT-E5B714166157",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 276,
"timestamp": "2026-01-04T20:48:00Z",
"transaction_amount_usd": 7.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.921,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2976891.45,
"financial_exposure_usd": 5945002.75,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107284",
"label": "benign",
"label_confidence": 0.576,
"severity": "high",
"timestamp": "2026-01-06T01:24:00Z",
"trace_id": "27d1dcdb-304e-31c4-5f26-bf68c1105d50"
} | {
"account_age_days": 1146,
"account_id": "ACCT-5B1D4DDE3AEF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1053,
"timestamp": "2026-01-06T01:24:00Z",
"transaction_amount_usd": 4070.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6561.59,
"financial_exposure_usd": 8017.79,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102097",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-02T10:57:00Z",
"trace_id": "30d1b5a7-d39b-4369-f758-34b0c5d69586"
} | {
"account_age_days": 1858,
"account_id": "ACCT-F8A345ADFAB3",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.267
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 154,
"timestamp": "2026-01-02T00:34:00Z",
"transaction_amount_usd": 10
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1193972.79,
"financial_exposure_usd": 1236395.79,
"recoverable_pct": 0.379
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101508",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-02T01:08:00Z",
"trace_id": "dc5ea866-240c-818e-d4c3-98f307619596"
} | {
"account_age_days": 1140,
"account_id": "ACCT-47AA14C8840C",
"baseline_risk_score": 0.541,
"kyc_tier": "tier_2",
"session_entropy": 0.193
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 85,
"timestamp": "2026-01-01T23:14:00Z",
"transaction_amount_usd": 23.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 677099.82,
"financial_exposure_usd": 709135.44,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103557",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-03T11:17:00Z",
"trace_id": "efe60285-813a-0c84-b656-5a702e21e94c"
} | {
"account_age_days": 215,
"account_id": "ACCT-558FAB6F7D15",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_1",
"session_entropy": 0.778
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 301,
"timestamp": "2026-01-03T11:17:00Z",
"transaction_amount_usd": 1399466.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.593,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4073553.07,
"financial_exposure_usd": 4218808.06,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106481",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-05T12:01:00Z",
"trace_id": "9c6b8ee6-027c-3c6a-4a27-f9ef8a77b8c0"
} | {
"account_age_days": 1858,
"account_id": "ACCT-96C29F9D9DE8",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_3",
"session_entropy": 0.617
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 589,
"timestamp": "2026-01-05T12:01:00Z",
"transaction_amount_usd": 2839439.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.713,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1813261.98,
"financial_exposure_usd": 2199791.14,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107353",
"label": "benign",
"label_confidence": 0.536,
"severity": "low",
"timestamp": "2026-01-06T02:33:00Z",
"trace_id": "e05cf158-eb3d-fe43-5238-c14148edb118"
} | {
"account_age_days": 470,
"account_id": "ACCT-0F73A443A38C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 667,
"timestamp": "2026-01-06T02:33:00Z",
"transaction_amount_usd": 14746.53
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.773,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1583.25,
"financial_exposure_usd": 3445.09,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109200",
"label": "benign",
"label_confidence": 0.476,
"severity": "medium",
"timestamp": "2026-01-07T09:20:00Z",
"trace_id": "13b0b4db-7204-b29e-bfcb-030c69ad3de0"
} | {
"account_age_days": 952,
"account_id": "ACCT-61EC96D9BD4E",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 235,
"timestamp": "2026-01-07T09:20:00Z",
"transaction_amount_usd": 3150.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.703,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1120.27,
"financial_exposure_usd": 1895.81,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107923",
"label": "benign",
"label_confidence": 0.568,
"severity": "critical",
"timestamp": "2026-01-06T12:03:00Z",
"trace_id": "f28787bd-b2cb-8a7d-412e-14c087c1fefc"
} | {
"account_age_days": 595,
"account_id": "ACCT-3C0497A92ADB",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 222,
"timestamp": "2026-01-06T12:03:00Z",
"transaction_amount_usd": 14641.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.691,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1428.23,
"financial_exposure_usd": 1911.04,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103923",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-03T17:23:00Z",
"trace_id": "d67f7c19-9f35-8ac2-65d6-252f07983031"
} | {
"account_age_days": 291,
"account_id": "ACCT-FE2B8566219F",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_3",
"session_entropy": 0.432
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 814,
"timestamp": "2026-01-03T17:23:00Z",
"transaction_amount_usd": 514512.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2941811.06,
"financial_exposure_usd": 6600171.61,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104804",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "low",
"timestamp": "2026-01-04T08:04:00Z",
"trace_id": "80dfbbfb-1167-55f6-b77a-6aa00d13e438"
} | {
"account_age_days": 1229,
"account_id": "ACCT-0656CE10F619",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.113
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1130,
"timestamp": "2026-01-04T08:04:00Z",
"transaction_amount_usd": 1531684.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.839,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4749620.35,
"financial_exposure_usd": 6278055.54,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108160",
"label": "benign",
"label_confidence": 0.55,
"severity": "low",
"timestamp": "2026-01-06T16:00:00Z",
"trace_id": "8360bb8e-81a9-d561-54d5-f693642a1384"
} | {
"account_age_days": 834,
"account_id": "ACCT-6554E63F1C3A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.464
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 528,
"timestamp": "2026-01-06T16:00:00Z",
"transaction_amount_usd": 9789.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3309.72,
"financial_exposure_usd": 3369.22,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109816",
"label": "benign",
"label_confidence": 0.642,
"severity": "medium",
"timestamp": "2026-01-07T19:36:00Z",
"trace_id": "0dccab01-612d-bfff-e29b-144532f116b1"
} | {
"account_age_days": 1897,
"account_id": "ACCT-02D57211A674",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.691
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1011,
"timestamp": "2026-01-07T19:36:00Z",
"transaction_amount_usd": 8985.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.488,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 241.26,
"financial_exposure_usd": 525.58,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107061",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-05T21:41:00Z",
"trace_id": "79cb7947-3688-ea9e-ecee-7b23c6cb9ecb"
} | {
"account_age_days": 693,
"account_id": "ACCT-6BE310DD7F54",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.191
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 853,
"timestamp": "2026-01-05T21:41:00Z",
"transaction_amount_usd": 1080.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 54.29,
"financial_exposure_usd": 80.13,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103416",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-03T08:56:00Z",
"trace_id": "a76986ba-194d-f7bb-e038-6056c30a1c2d"
} | {
"account_age_days": 762,
"account_id": "ACCT-EE8FF81A1DFF",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.8
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 437,
"timestamp": "2026-01-03T08:56:00Z",
"transaction_amount_usd": 212759.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.755,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4762286.26,
"financial_exposure_usd": 5215965.09,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100063",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-01T01:03:00Z",
"trace_id": "f3981e9e-7cb8-82a0-94a1-eab0b9c037aa"
} | {
"account_age_days": 752,
"account_id": "ACCT-A766861778DB",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 476,
"timestamp": "2026-01-01T01:03:00Z",
"transaction_amount_usd": 80719.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 373144.6,
"financial_exposure_usd": 776852.51,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104117",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "low",
"timestamp": "2026-01-03T20:37:00Z",
"trace_id": "6145d69f-8bb9-b031-e4d9-7bc83ff43850"
} | {
"account_age_days": 1701,
"account_id": "ACCT-617ED56407E2",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_3",
"session_entropy": 0.249
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 484,
"timestamp": "2026-01-03T20:37:00Z",
"transaction_amount_usd": 2332059.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7416059.72,
"financial_exposure_usd": 9893995,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103702",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-03T13:42:00Z",
"trace_id": "10280999-97d4-ba90-5ddf-4106417f502b"
} | {
"account_age_days": 566,
"account_id": "ACCT-BFE4A4660D5B",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_2",
"session_entropy": 0.464
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1047,
"timestamp": "2026-01-03T13:42:00Z",
"transaction_amount_usd": 630223.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3986040.93,
"financial_exposure_usd": 5134470.04,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108817",
"label": "benign",
"label_confidence": 0.739,
"severity": "low",
"timestamp": "2026-01-07T02:57:00Z",
"trace_id": "6ce081ad-fa2c-4dd1-0834-e092751f5ade"
} | {
"account_age_days": 352,
"account_id": "ACCT-418B3F03DFE7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.489
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 441,
"timestamp": "2026-01-07T02:57:00Z",
"transaction_amount_usd": 14457.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 819.65,
"financial_exposure_usd": 981.21,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105285",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-04T16:05:00Z",
"trace_id": "61f156d2-f16b-e765-b8c6-df971b553f2f"
} | {
"account_age_days": 1627,
"account_id": "ACCT-D9C80A0573F7",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.344
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 187,
"timestamp": "2026-01-04T16:05:00Z",
"transaction_amount_usd": 1608870.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.607,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2882722.26,
"financial_exposure_usd": 4028828.31,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109167",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-07T08:47:00Z",
"trace_id": "2a2f9c65-f72f-2924-c05b-4a29603b6c2e"
} | {
"account_age_days": 400,
"account_id": "ACCT-4B3CBC244659",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1057,
"timestamp": "2026-01-07T08:47:00Z",
"transaction_amount_usd": 3897.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 214.75,
"financial_exposure_usd": 521.7,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103536",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "medium",
"timestamp": "2026-01-03T10:56:00Z",
"trace_id": "9357f1f8-3d88-93cf-bb4a-63922efc0084"
} | {
"account_age_days": 155,
"account_id": "ACCT-E9C337D8B0B7",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_3",
"session_entropy": 0.794
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 314,
"timestamp": "2026-01-03T10:56:00Z",
"transaction_amount_usd": 653518.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5468986.59,
"financial_exposure_usd": 5508588.62,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104778",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "low",
"timestamp": "2026-01-04T07:38:00Z",
"trace_id": "c5071d12-d499-8967-73b2-75193d67cba2"
} | {
"account_age_days": 118,
"account_id": "ACCT-9920F5C833F8",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_3",
"session_entropy": 0.894
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 208,
"timestamp": "2026-01-04T07:38:00Z",
"transaction_amount_usd": 2408065.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.443,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6034170.38,
"financial_exposure_usd": 6939825.04,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107337",
"label": "benign",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-06T02:17:00Z",
"trace_id": "8e0cbee3-34ab-4190-a14b-1c24a6d46cf9"
} | {
"account_age_days": 1864,
"account_id": "ACCT-99DA5A98AB7F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.865
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 288,
"timestamp": "2026-01-06T02:17:00Z",
"transaction_amount_usd": 11629.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5885.25,
"financial_exposure_usd": 6501.92,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105229",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "low",
"timestamp": "2026-01-04T15:09:00Z",
"trace_id": "f1090303-0b8b-a3e5-b38d-71c370da668b"
} | {
"account_age_days": 918,
"account_id": "ACCT-A2EA45F3CEFD",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 374,
"timestamp": "2026-01-04T06:38:00Z",
"transaction_amount_usd": 18.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.458,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3172727.24,
"financial_exposure_usd": 3268210.55,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102547",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-02T18:27:00Z",
"trace_id": "c5175ce3-cf18-22d5-6c5e-5a346946aa8c"
} | {
"account_age_days": 782,
"account_id": "ACCT-FEB1FEE03889",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.158
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 301,
"timestamp": "2026-01-02T09:22:00Z",
"transaction_amount_usd": 23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1053704.42,
"financial_exposure_usd": 1448539.58,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101229",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "low",
"timestamp": "2026-01-01T20:29:00Z",
"trace_id": "b1391102-4bdf-bff3-52da-f806c88b1e26"
} | {
"account_age_days": 1834,
"account_id": "ACCT-3197F10DFEEF",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_3",
"session_entropy": 0.361
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 624,
"timestamp": "2026-01-01T20:29:00Z",
"transaction_amount_usd": 39943.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 234859.2,
"financial_exposure_usd": 289798.62,
"recoverable_pct": 0.124
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103617",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "critical",
"timestamp": "2026-01-03T12:17:00Z",
"trace_id": "fb60d2ed-3715-e0e8-f94b-d1da07f1d0d1"
} | {
"account_age_days": 1828,
"account_id": "ACCT-F29E3E22BA0A",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_1",
"session_entropy": 0.134
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 80,
"timestamp": "2026-01-03T06:26:00Z",
"transaction_amount_usd": 0.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3772751.06,
"financial_exposure_usd": 5083719.11,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108254",
"label": "benign",
"label_confidence": 0.496,
"severity": "medium",
"timestamp": "2026-01-06T17:34:00Z",
"trace_id": "e91404f2-b431-162f-b61d-ae32cff499a1"
} | {
"account_age_days": 445,
"account_id": "ACCT-C1D250287A9B",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.301
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 715,
"timestamp": "2026-01-06T17:34:00Z",
"transaction_amount_usd": 13868.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2339.59,
"financial_exposure_usd": 2662.75,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106433",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "low",
"timestamp": "2026-01-05T11:13:00Z",
"trace_id": "3314d23a-608e-f636-8cfb-d442a51730ca"
} | {
"account_age_days": 1139,
"account_id": "ACCT-0EA7EA8DD762",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_3",
"session_entropy": 0.556
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 428,
"timestamp": "2026-01-05T11:13:00Z",
"transaction_amount_usd": 2074614.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.578,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2378734.78,
"financial_exposure_usd": 4926507.81,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101544",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T01:44:00Z",
"trace_id": "a5f1a0d0-a541-ddca-e5cb-58756c50d918"
} | {
"account_age_days": 612,
"account_id": "ACCT-916C376F3571",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.942
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 870,
"timestamp": "2026-01-02T01:44:00Z",
"transaction_amount_usd": 57711.73
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 649380.96,
"financial_exposure_usd": 787933.72,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101313",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "low",
"timestamp": "2026-01-01T21:53:00Z",
"trace_id": "7032f15f-ec8b-1fc5-b32a-fff42dcd12bd"
} | {
"account_age_days": 972,
"account_id": "ACCT-A16CA675FA3F",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.177
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 183,
"timestamp": "2026-01-01T21:53:00Z",
"transaction_amount_usd": 112917.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.476,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 569676.95,
"financial_exposure_usd": 738903.4,
"recoverable_pct": 0.276
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104502",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-04T03:02:00Z",
"trace_id": "5f7235b3-65b1-6ce3-12f8-0006c328cc88"
} | {
"account_age_days": 1720,
"account_id": "ACCT-383BEF855A57",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.85
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 324,
"timestamp": "2026-01-03T16:03:00Z",
"transaction_amount_usd": 1.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7186946.99,
"financial_exposure_usd": 7228268.83,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107357",
"label": "benign",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-06T02:37:00Z",
"trace_id": "0c30b2af-bc40-ef70-3a03-14a88ee8153b"
} | {
"account_age_days": 1401,
"account_id": "ACCT-27F332B29636",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_2",
"session_entropy": 0.825
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 464,
"timestamp": "2026-01-06T02:37:00Z",
"transaction_amount_usd": 12771.27
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1367.67,
"financial_exposure_usd": 2889.36,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100554",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-01T09:14:00Z",
"trace_id": "997886b2-4c5a-e8f2-f4d7-8cb1eff595ef"
} | {
"account_age_days": 1908,
"account_id": "ACCT-E06CA4A0AC67",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_1",
"session_entropy": 0.234
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 361,
"timestamp": "2026-01-01T01:53:00Z",
"transaction_amount_usd": 9.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.581,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 644503.95,
"financial_exposure_usd": 919794.18,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104409",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "critical",
"timestamp": "2026-01-04T01:29:00Z",
"trace_id": "749531d3-ccea-6419-d2a8-e1a425c9cd63"
} | {
"account_age_days": 1346,
"account_id": "ACCT-D4C499247E19",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1050,
"timestamp": "2026-01-04T01:29:00Z",
"transaction_amount_usd": 1863639.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2837248.33,
"financial_exposure_usd": 5910544.82,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104390",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-04T01:10:00Z",
"trace_id": "92f7738c-a79a-0daf-e331-1ae7ba7bb422"
} | {
"account_age_days": 150,
"account_id": "ACCT-F743A71F1935",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_2",
"session_entropy": 0.78
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 589,
"timestamp": "2026-01-04T01:10:00Z",
"transaction_amount_usd": 2266329.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3073762.47,
"financial_exposure_usd": 3502091.12,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109125",
"label": "benign",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-07T08:05:00Z",
"trace_id": "4fbf50d7-25a9-20c4-2f6a-755b56f1641a"
} | {
"account_age_days": 1676,
"account_id": "ACCT-CE472372C54B",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_3",
"session_entropy": 0.855
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 639,
"timestamp": "2026-01-07T08:05:00Z",
"transaction_amount_usd": 14867.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1259.82,
"financial_exposure_usd": 2051.76,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101499",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-02T00:59:00Z",
"trace_id": "6cf498f2-6f9a-aaf6-c34d-d6bc93443385"
} | {
"account_age_days": 1534,
"account_id": "ACCT-AC9F218CD4A6",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_1",
"session_entropy": 0.442
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 379,
"timestamp": "2026-01-01T12:56:00Z",
"transaction_amount_usd": 18.83
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 503316.24,
"financial_exposure_usd": 564227.31,
"recoverable_pct": 0.119
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109317",
"label": "benign",
"label_confidence": 0.655,
"severity": "low",
"timestamp": "2026-01-07T11:17:00Z",
"trace_id": "4959e492-27ee-67e6-5727-9a8f46309a92"
} | {
"account_age_days": 962,
"account_id": "ACCT-3956A5DF8023",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 951,
"timestamp": "2026-01-07T11:17:00Z",
"transaction_amount_usd": 6273.33
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.46,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2377.02,
"financial_exposure_usd": 2694.76,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101906",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "critical",
"timestamp": "2026-01-02T07:46:00Z",
"trace_id": "60b089c6-9b37-bf2c-363c-7f07f1cbfb99"
} | {
"account_age_days": 1129,
"account_id": "ACCT-EB0407B77DCB",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 84,
"timestamp": "2026-01-02T01:54:00Z",
"transaction_amount_usd": 1.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 534434.65,
"financial_exposure_usd": 640167.94,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106288",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "critical",
"timestamp": "2026-01-05T08:48:00Z",
"trace_id": "90716d01-daf1-908f-e52b-580355a2cbd5"
} | {
"account_age_days": 1101,
"account_id": "ACCT-50654D880CEC",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 257,
"timestamp": "2026-01-05T05:13:00Z",
"transaction_amount_usd": 15.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.454,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4208517.35,
"financial_exposure_usd": 4396621.74,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108393",
"label": "benign",
"label_confidence": 0.454,
"severity": "high",
"timestamp": "2026-01-06T19:53:00Z",
"trace_id": "1c3a654b-40a2-2c72-d509-56822cdb011e"
} | {
"account_age_days": 1583,
"account_id": "ACCT-374B44EA6FC3",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.917
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 755,
"timestamp": "2026-01-06T19:53:00Z",
"transaction_amount_usd": 8540.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 6283.76,
"financial_exposure_usd": 8588.31,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100500",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "critical",
"timestamp": "2026-01-01T08:20:00Z",
"trace_id": "b5d79e8e-8f21-e8ec-4e92-f23704dbae9f"
} | {
"account_age_days": 29,
"account_id": "ACCT-3352EB6C3126",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_3",
"session_entropy": 0.617
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 921,
"timestamp": "2026-01-01T08:20:00Z",
"transaction_amount_usd": 30664.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 141287.84,
"financial_exposure_usd": 228624.18,
"recoverable_pct": 0.023
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100885",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "low",
"timestamp": "2026-01-01T14:45:00Z",
"trace_id": "3aa46a18-cfae-89a2-2f6f-b81a4502cff1"
} | {
"account_age_days": 387,
"account_id": "ACCT-EDE5DB18F72F",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.95
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 337,
"timestamp": "2026-01-01T14:45:00Z",
"transaction_amount_usd": 40844.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 811248.48,
"financial_exposure_usd": 1108548.15,
"recoverable_pct": 0.317
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105240",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "critical",
"timestamp": "2026-01-04T15:20:00Z",
"trace_id": "2112df8d-f8ce-bf9f-f31f-dc39ab604729"
} | {
"account_age_days": 856,
"account_id": "ACCT-E6D32D0346FD",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_2",
"session_entropy": 0.599
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 555,
"timestamp": "2026-01-04T15:20:00Z",
"transaction_amount_usd": 1399067.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.509,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1933447.98,
"financial_exposure_usd": 3177651.16,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101998",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-02T09:18:00Z",
"trace_id": "40de858e-c547-04d0-44dd-2a17832fc469"
} | {
"account_age_days": 1370,
"account_id": "ACCT-46E261D7FD38",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.78
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 769,
"timestamp": "2026-01-02T09:18:00Z",
"transaction_amount_usd": 23026.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 572810.6,
"financial_exposure_usd": 1222721.6,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109971",
"label": "benign",
"label_confidence": 0.644,
"severity": "medium",
"timestamp": "2026-01-07T22:11:00Z",
"trace_id": "38234c03-170b-7016-9814-ad94a64be3cf"
} | {
"account_age_days": 1937,
"account_id": "ACCT-80D9B54316FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.18
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 591,
"timestamp": "2026-01-07T22:11:00Z",
"transaction_amount_usd": 5982.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 915.77,
"financial_exposure_usd": 2053.3,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102718",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "medium",
"timestamp": "2026-01-02T21:18:00Z",
"trace_id": "00ff35d2-5a2d-5530-8257-6aac230e3b7b"
} | {
"account_age_days": 179,
"account_id": "ACCT-D351F17B2C8A",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_2",
"session_entropy": 0.421
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 106,
"timestamp": "2026-01-02T21:18:00Z",
"transaction_amount_usd": 3566.19
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.763,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 683853.66,
"financial_exposure_usd": 714462.06,
"recoverable_pct": 0.148
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100786",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "critical",
"timestamp": "2026-01-01T13:06:00Z",
"trace_id": "711345e3-36d4-7214-d8ff-a063ec4ef44a"
} | {
"account_age_days": 1707,
"account_id": "ACCT-A541BB078AF4",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_2",
"session_entropy": 0.723
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1028,
"timestamp": "2026-01-01T13:06:00Z",
"transaction_amount_usd": 90217.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.741,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 237003.72,
"financial_exposure_usd": 289674.41,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107422",
"label": "benign",
"label_confidence": 0.687,
"severity": "low",
"timestamp": "2026-01-06T03:42:00Z",
"trace_id": "69aa3213-e338-38cb-e534-225144b3eec9"
} | {
"account_age_days": 1677,
"account_id": "ACCT-4A08D88F5B98",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.582
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 849,
"timestamp": "2026-01-06T03:42:00Z",
"transaction_amount_usd": 14959.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2454.76,
"financial_exposure_usd": 3677.58,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100716",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-01T11:56:00Z",
"trace_id": "954d9337-d0f4-1b30-37f2-7fe634efbf2f"
} | {
"account_age_days": 638,
"account_id": "ACCT-BDF218F91C0C",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.864
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1090,
"timestamp": "2026-01-01T11:56:00Z",
"transaction_amount_usd": 41899.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.476,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 334155.19,
"financial_exposure_usd": 468577.98,
"recoverable_pct": 0.518
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101860",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T07:00:00Z",
"trace_id": "fa662bed-a885-d7a2-d0d6-fb0832a9d95d"
} | {
"account_age_days": 1066,
"account_id": "ACCT-AAA197A2B071",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_1",
"session_entropy": 0.669
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 242,
"timestamp": "2026-01-02T07:00:00Z",
"transaction_amount_usd": 84666.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.351,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 228900.22,
"financial_exposure_usd": 260599.29,
"recoverable_pct": 0.184
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108324",
"label": "benign",
"label_confidence": 0.575,
"severity": "critical",
"timestamp": "2026-01-06T18:44:00Z",
"trace_id": "a3d43971-4417-bba0-d08e-86c6a5a9af87"
} | {
"account_age_days": 517,
"account_id": "ACCT-6274F2AEDA6E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.918
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 383,
"timestamp": "2026-01-06T13:41:00Z",
"transaction_amount_usd": 1.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1178.16,
"financial_exposure_usd": 1541.34,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105260",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "low",
"timestamp": "2026-01-04T15:40:00Z",
"trace_id": "721c78ed-ab20-fa6a-20fd-01cf3d5e1b2d"
} | {
"account_age_days": 133,
"account_id": "ACCT-4F20C3947C5F",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_1",
"session_entropy": 0.183
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 371,
"timestamp": "2026-01-04T04:04:00Z",
"transaction_amount_usd": 22.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3138585.57,
"financial_exposure_usd": 3675336.32,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103976",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "medium",
"timestamp": "2026-01-03T18:16:00Z",
"trace_id": "2fc68dc8-bc49-6ddb-383c-ced895f91b38"
} | {
"account_age_days": 739,
"account_id": "ACCT-23FF100610B9",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.329
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 585,
"timestamp": "2026-01-03T18:16:00Z",
"transaction_amount_usd": 2131995.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.515,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3953830.56,
"financial_exposure_usd": 6595110.51,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109924",
"label": "benign",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-07T21:24:00Z",
"trace_id": "b6b63202-dbd4-7090-b7d6-0ea046a03a27"
} | {
"account_age_days": 1681,
"account_id": "ACCT-30C709B70A2A",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.702
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 772,
"timestamp": "2026-01-07T21:24:00Z",
"transaction_amount_usd": 10590.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 756.95,
"financial_exposure_usd": 1232.85,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.