schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102447",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-02T16:47:00Z",
"trace_id": "713ff9e2-1874-82fd-02a5-924367370c6f"
} | {
"account_age_days": 676,
"account_id": "ACCT-1D587174CE1F",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1061,
"timestamp": "2026-01-02T16:47:00Z",
"transaction_amount_usd": 34063.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 274169.67,
"financial_exposure_usd": 550014.18,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108418",
"label": "benign",
"label_confidence": 0.534,
"severity": "medium",
"timestamp": "2026-01-06T20:18:00Z",
"trace_id": "93fb649d-246b-4806-2f92-184fda079d52"
} | {
"account_age_days": 714,
"account_id": "ACCT-04429B30350E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.113
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 381,
"timestamp": "2026-01-06T17:42:00Z",
"transaction_amount_usd": 15.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3170.34,
"financial_exposure_usd": 4917.76,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104553",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "high",
"timestamp": "2026-01-04T03:53:00Z",
"trace_id": "14468b11-3e81-27d3-59f7-8f264947ce1d"
} | {
"account_age_days": 1629,
"account_id": "ACCT-249A21AC086A",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.689
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 238,
"timestamp": "2026-01-04T01:07:00Z",
"transaction_amount_usd": 15.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.861,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7397307.22,
"financial_exposure_usd": 7596108.51,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108317",
"label": "benign",
"label_confidence": 0.598,
"severity": "medium",
"timestamp": "2026-01-06T18:37:00Z",
"trace_id": "70ebc220-cb00-49eb-25b3-32f409a328ad"
} | {
"account_age_days": 1490,
"account_id": "ACCT-CE9E851BC5AC",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.537
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 246,
"timestamp": "2026-01-06T18:37:00Z",
"transaction_amount_usd": 12896.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1682.36,
"financial_exposure_usd": 1839.55,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108779",
"label": "benign",
"label_confidence": 0.522,
"severity": "low",
"timestamp": "2026-01-07T02:19:00Z",
"trace_id": "1bf4d91d-7fa8-37d8-6a07-7bddcfed2b12"
} | {
"account_age_days": 204,
"account_id": "ACCT-205A029F10B6",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_3",
"session_entropy": 0.754
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 317,
"timestamp": "2026-01-07T02:19:00Z",
"transaction_amount_usd": 12438.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2063.64,
"financial_exposure_usd": 2439.98,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104356",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "high",
"timestamp": "2026-01-04T00:36:00Z",
"trace_id": "c33efda4-cb7e-4d63-0d78-c6561ccca5d1"
} | {
"account_age_days": 1614,
"account_id": "ACCT-36725C8E4A12",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.28
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 922,
"timestamp": "2026-01-04T00:36:00Z",
"transaction_amount_usd": 2239820.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.648,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3350673.1,
"financial_exposure_usd": 5377883.16,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100175",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "high",
"timestamp": "2026-01-01T02:55:00Z",
"trace_id": "6b0bb457-8c0d-c409-dfcc-8eb4bfbe0892"
} | {
"account_age_days": 1216,
"account_id": "ACCT-A8CC5023A43F",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_1",
"session_entropy": 0.272
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 347,
"timestamp": "2025-12-31T19:24:00Z",
"transaction_amount_usd": 18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 303680.14,
"financial_exposure_usd": 598980.35,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100758",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-01T12:38:00Z",
"trace_id": "0753dd5b-9918-90e4-4077-c324e4228150"
} | {
"account_age_days": 429,
"account_id": "ACCT-AB22EB19E09E",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_1",
"session_entropy": 0.896
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 119,
"timestamp": "2026-01-01T12:38:00Z",
"transaction_amount_usd": 102184.97
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.51,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 718721.47,
"financial_exposure_usd": 1271418.2,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107264",
"label": "benign",
"label_confidence": 0.671,
"severity": "critical",
"timestamp": "2026-01-06T01:04:00Z",
"trace_id": "8953d564-32e9-5650-4e58-d411e207ee09"
} | {
"account_age_days": 1359,
"account_id": "ACCT-2DD585D4F3A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.146
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 864,
"timestamp": "2026-01-06T01:04:00Z",
"transaction_amount_usd": 946.54
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2369.12,
"financial_exposure_usd": 5489.52,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102562",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "critical",
"timestamp": "2026-01-02T18:42:00Z",
"trace_id": "5c5c039e-782a-32bf-9513-d2f3be297814"
} | {
"account_age_days": 482,
"account_id": "ACCT-F631E469AB71",
"baseline_risk_score": 0.598,
"kyc_tier": "tier_1",
"session_entropy": 0.89
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 171,
"timestamp": "2026-01-02T07:15:00Z",
"transaction_amount_usd": 14.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 360394.98,
"financial_exposure_usd": 794018.45,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108459",
"label": "benign",
"label_confidence": 0.483,
"severity": "medium",
"timestamp": "2026-01-06T20:59:00Z",
"trace_id": "b4e694e8-e433-0e3b-3be4-cada7395ba8f"
} | {
"account_age_days": 941,
"account_id": "ACCT-0E1FF2675084",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_2",
"session_entropy": 0.642
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 291,
"timestamp": "2026-01-06T09:25:00Z",
"transaction_amount_usd": 9.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1142.75,
"financial_exposure_usd": 2385.15,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105284",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "high",
"timestamp": "2026-01-04T16:04:00Z",
"trace_id": "6df2e5ba-0a04-d1ae-0718-57cfb92a7e79"
} | {
"account_age_days": 215,
"account_id": "ACCT-4EBCF047BE8C",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 693,
"timestamp": "2026-01-04T16:04:00Z",
"transaction_amount_usd": 2290435.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.867,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2649076.99,
"financial_exposure_usd": 4688045.02,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101328",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-01T22:08:00Z",
"trace_id": "a096101d-da00-c8e8-5edb-9936e4e176ab"
} | {
"account_age_days": 1860,
"account_id": "ACCT-9D49EFC7BE0C",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_3",
"session_entropy": 0.492
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 314,
"timestamp": "2026-01-01T10:05:00Z",
"transaction_amount_usd": 20.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.657,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 408496.93,
"financial_exposure_usd": 831509.46,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106886",
"label": "benign",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-05T18:46:00Z",
"trace_id": "cb35d7e4-3cea-638a-a45f-24baeacb3cc8"
} | {
"account_age_days": 1630,
"account_id": "ACCT-ABB6AF217D44",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.701
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 672,
"timestamp": "2026-01-05T18:46:00Z",
"transaction_amount_usd": 4397.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1093.01,
"financial_exposure_usd": 2472.56,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108914",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-07T04:34:00Z",
"trace_id": "87fcca8a-4fdd-2855-3cec-63fc060b8aa0"
} | {
"account_age_days": 935,
"account_id": "ACCT-5AEC354F9678",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_3",
"session_entropy": 0.907
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 124,
"timestamp": "2026-01-06T21:16:00Z",
"transaction_amount_usd": 6.6
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3479.94,
"financial_exposure_usd": 3829.68,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100619",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "low",
"timestamp": "2026-01-01T10:19:00Z",
"trace_id": "045e92f9-a5f8-8f34-5d91-b97fa64a0cf0"
} | {
"account_age_days": 819,
"account_id": "ACCT-21655C1F46BD",
"baseline_risk_score": 0.477,
"kyc_tier": "tier_1",
"session_entropy": 0.746
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 107,
"timestamp": "2026-01-01T10:19:00Z",
"transaction_amount_usd": 40673.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.42,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 429463.84,
"financial_exposure_usd": 745984.2,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100266",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "high",
"timestamp": "2026-01-01T04:26:00Z",
"trace_id": "ca127556-f5cc-a86b-92e9-2aa7f7b8a5e4"
} | {
"account_age_days": 1584,
"account_id": "ACCT-EE6D7A27E95B",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.735
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 303,
"timestamp": "2026-01-01T00:03:00Z",
"transaction_amount_usd": 5.7
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.77,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 463479.92,
"financial_exposure_usd": 636628.46,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102118",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-02T11:18:00Z",
"trace_id": "3bbf9230-dd5c-13b6-1666-e4c9200998e1"
} | {
"account_age_days": 1092,
"account_id": "ACCT-5DA3F7B3C281",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 899,
"timestamp": "2026-01-02T11:18:00Z",
"transaction_amount_usd": 100203.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 411261.19,
"financial_exposure_usd": 580586.27,
"recoverable_pct": 0.057
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100857",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-01T14:17:00Z",
"trace_id": "3389d95a-87ce-b34f-deec-498667633495"
} | {
"account_age_days": 1331,
"account_id": "ACCT-EFE2D740F816",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_3",
"session_entropy": 0.726
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 89,
"timestamp": "2026-01-01T04:11:00Z",
"transaction_amount_usd": 11.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 647369.82,
"financial_exposure_usd": 1096630.1,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100401",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "critical",
"timestamp": "2026-01-01T06:41:00Z",
"trace_id": "8a91919e-473e-ed62-073f-1d9100c3f267"
} | {
"account_age_days": 279,
"account_id": "ACCT-29465D2950D3",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_1",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 241,
"timestamp": "2026-01-01T06:41:00Z",
"transaction_amount_usd": 72600.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.425,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 550361.58,
"financial_exposure_usd": 756228.9,
"recoverable_pct": 0.348
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109800",
"label": "benign",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-07T19:20:00Z",
"trace_id": "534fda22-7f46-4610-a53b-03e15f7ef113"
} | {
"account_age_days": 87,
"account_id": "ACCT-8397A3195AEB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.602
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 139,
"timestamp": "2026-01-07T13:13:00Z",
"transaction_amount_usd": 14.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2789.79,
"financial_exposure_usd": 3102.55,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105441",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "medium",
"timestamp": "2026-01-04T18:41:00Z",
"trace_id": "e29064e0-1859-86c6-a636-0b524e9314ec"
} | {
"account_age_days": 1911,
"account_id": "ACCT-17FDD7DFEBE3",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.802
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 622,
"timestamp": "2026-01-04T18:41:00Z",
"transaction_amount_usd": 1840192.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.666,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3361013.41,
"financial_exposure_usd": 4949940.93,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106783",
"label": "benign",
"label_confidence": 0.469,
"severity": "low",
"timestamp": "2026-01-05T17:03:00Z",
"trace_id": "c3f9f51d-b2c4-a795-f634-685211039189"
} | {
"account_age_days": 1461,
"account_id": "ACCT-F378D19A1254",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.575
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 371,
"timestamp": "2026-01-05T08:16:00Z",
"transaction_amount_usd": 4.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4414.18,
"financial_exposure_usd": 9542.77,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104386",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-04T01:06:00Z",
"trace_id": "4698eee5-b74a-18e0-6ab5-01f26015681d"
} | {
"account_age_days": 12,
"account_id": "ACCT-49A50CC48CA6",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_2",
"session_entropy": 0.52
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 835,
"timestamp": "2026-01-04T01:06:00Z",
"transaction_amount_usd": 2080606.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.791,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3220679.92,
"financial_exposure_usd": 5063875.35,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107815",
"label": "benign",
"label_confidence": 0.472,
"severity": "low",
"timestamp": "2026-01-06T10:15:00Z",
"trace_id": "c1041c51-0937-91f2-96b1-82f3a359276b"
} | {
"account_age_days": 788,
"account_id": "ACCT-367DAC2B7C71",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.945
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 147,
"timestamp": "2026-01-06T09:30:00Z",
"transaction_amount_usd": 7.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1662.52,
"financial_exposure_usd": 2586.52,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108552",
"label": "benign",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-06T22:32:00Z",
"trace_id": "c9d94f34-6ff9-c953-0350-638c8eda955a"
} | {
"account_age_days": 273,
"account_id": "ACCT-6ECE55EB4F22",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.41
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 748,
"timestamp": "2026-01-06T22:32:00Z",
"transaction_amount_usd": 2436.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 39.63,
"financial_exposure_usd": 89.24,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105964",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "critical",
"timestamp": "2026-01-05T03:24:00Z",
"trace_id": "5e5890d5-0286-e8c2-9d42-335bf8deea38"
} | {
"account_age_days": 1301,
"account_id": "ACCT-CAFCB4FDB760",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.242
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 385,
"timestamp": "2026-01-05T03:24:00Z",
"transaction_amount_usd": 2019880.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.775,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1677952.63,
"financial_exposure_usd": 3344587.19,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105944",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "low",
"timestamp": "2026-01-05T03:04:00Z",
"trace_id": "8781f1e7-f83d-fd3b-239c-6de486ac1afa"
} | {
"account_age_days": 421,
"account_id": "ACCT-959A5FBA7D78",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.704
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 470,
"timestamp": "2026-01-05T03:04:00Z",
"transaction_amount_usd": 88582.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5741466.37,
"financial_exposure_usd": 7137410.47,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104838",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-04T08:38:00Z",
"trace_id": "d64971d6-736e-bc2a-1c8e-b78e8cc6e9c0"
} | {
"account_age_days": 1155,
"account_id": "ACCT-0E87034BE1A9",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.492
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 392,
"timestamp": "2026-01-04T02:39:00Z",
"transaction_amount_usd": 10.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.679,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5531593.02,
"financial_exposure_usd": 6178413.94,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102055",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "low",
"timestamp": "2026-01-02T10:15:00Z",
"trace_id": "223b2672-7e18-050d-9989-4c5789a50c6d"
} | {
"account_age_days": 1067,
"account_id": "ACCT-08813719764B",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_2",
"session_entropy": 0.725
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 127,
"timestamp": "2026-01-02T06:23:00Z",
"transaction_amount_usd": 20.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.421,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 610472.44,
"financial_exposure_usd": 1345682.47,
"recoverable_pct": 0.062
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102710",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "high",
"timestamp": "2026-01-02T21:10:00Z",
"trace_id": "8507acc8-aae5-09a9-3cf3-b407ea3ae1e3"
} | {
"account_age_days": 442,
"account_id": "ACCT-E47415220AAE",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_3",
"session_entropy": 0.744
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 777,
"timestamp": "2026-01-02T21:10:00Z",
"transaction_amount_usd": 56081.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.567,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 599297.53,
"financial_exposure_usd": 900051.84,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107924",
"label": "benign",
"label_confidence": 0.513,
"severity": "low",
"timestamp": "2026-01-06T12:04:00Z",
"trace_id": "8bec14f1-bb89-93ef-9056-30ccab46564a"
} | {
"account_age_days": 1241,
"account_id": "ACCT-FAE63B079BC0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.596
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 254,
"timestamp": "2026-01-06T03:00:00Z",
"transaction_amount_usd": 0.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 430.92,
"financial_exposure_usd": 759.41,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109635",
"label": "benign",
"label_confidence": 0.506,
"severity": "medium",
"timestamp": "2026-01-07T16:35:00Z",
"trace_id": "0ef2cbdf-b48e-e845-9ddc-5d139c7761b3"
} | {
"account_age_days": 985,
"account_id": "ACCT-9ED350D0AA39",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.127
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 307,
"timestamp": "2026-01-07T16:35:00Z",
"transaction_amount_usd": 3667.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3584.56,
"financial_exposure_usd": 5989.77,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108497",
"label": "benign",
"label_confidence": 0.462,
"severity": "low",
"timestamp": "2026-01-06T21:37:00Z",
"trace_id": "e9afeed6-2a9b-5d20-d626-c36b227612db"
} | {
"account_age_days": 1901,
"account_id": "ACCT-E105777571D3",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_3",
"session_entropy": 0.233
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 189,
"timestamp": "2026-01-06T15:25:00Z",
"transaction_amount_usd": 17.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.767,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2375.81,
"financial_exposure_usd": 2546.33,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102482",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-02T17:22:00Z",
"trace_id": "9d4dd050-0ca0-fbcc-3680-f5723fbbc6ee"
} | {
"account_age_days": 1152,
"account_id": "ACCT-F74BCA2F6F73",
"baseline_risk_score": 0.61,
"kyc_tier": "tier_2",
"session_entropy": 0.319
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 963,
"timestamp": "2026-01-02T17:22:00Z",
"transaction_amount_usd": 14211.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.758,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 356580.85,
"financial_exposure_usd": 685056.44,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106131",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-05T06:11:00Z",
"trace_id": "7fcbffbe-f01d-a1ce-11f3-afd387674f0e"
} | {
"account_age_days": 943,
"account_id": "ACCT-CA1A10526F6B",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 503,
"timestamp": "2026-01-05T06:11:00Z",
"transaction_amount_usd": 1437159.93
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.387,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2282777.13,
"financial_exposure_usd": 2355838.42,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108819",
"label": "benign",
"label_confidence": 0.5,
"severity": "medium",
"timestamp": "2026-01-07T02:59:00Z",
"trace_id": "4d8cb5f3-ca17-ed45-b5d8-c03bc4b14e2e"
} | {
"account_age_days": 388,
"account_id": "ACCT-4D6200E76A06",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.175
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 233,
"timestamp": "2026-01-06T16:58:00Z",
"transaction_amount_usd": 14.61
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 495.72,
"financial_exposure_usd": 679.03,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101419",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "medium",
"timestamp": "2026-01-01T23:39:00Z",
"trace_id": "6592a6e6-3e79-2a66-3cb8-a4b4702327b3"
} | {
"account_age_days": 1695,
"account_id": "ACCT-B4C760BA9344",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.185
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 242,
"timestamp": "2026-01-01T16:02:00Z",
"transaction_amount_usd": 14.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 715451.24,
"financial_exposure_usd": 1093687.59,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101146",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-01T19:06:00Z",
"trace_id": "6ef7d2aa-96da-b814-eb70-df5385f52eda"
} | {
"account_age_days": 1700,
"account_id": "ACCT-B63FCA9D1DFF",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_1",
"session_entropy": 0.254
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 291,
"timestamp": "2026-01-01T19:06:00Z",
"transaction_amount_usd": 74341.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 612985.1,
"financial_exposure_usd": 721387.15,
"recoverable_pct": 0.178
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106615",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-05T14:15:00Z",
"trace_id": "7cf33f34-b4af-89ba-720f-0faf9a867708"
} | {
"account_age_days": 421,
"account_id": "ACCT-DACA3C914059",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.453
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 450,
"timestamp": "2026-01-05T14:15:00Z",
"transaction_amount_usd": 1741470.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2790227.53,
"financial_exposure_usd": 4601016.77,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106776",
"label": "benign",
"label_confidence": 0.668,
"severity": "medium",
"timestamp": "2026-01-05T16:56:00Z",
"trace_id": "452ed320-9ea7-7844-f5a7-3cb6893bb975"
} | {
"account_age_days": 1085,
"account_id": "ACCT-AC394D26C43C",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_3",
"session_entropy": 0.16
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 121,
"timestamp": "2026-01-05T06:11:00Z",
"transaction_amount_usd": 13.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3036.65,
"financial_exposure_usd": 3241.05,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108465",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-06T21:05:00Z",
"trace_id": "0f7a394f-3e4b-ca90-3aae-fb55ce2c23e7"
} | {
"account_age_days": 449,
"account_id": "ACCT-99C89ADC4CC6",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.704
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 176,
"timestamp": "2026-01-06T13:09:00Z",
"transaction_amount_usd": 10.25
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1082.37,
"financial_exposure_usd": 1549.6,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105512",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-04T19:52:00Z",
"trace_id": "7b2f9d4a-f20c-d468-8991-a7a9bb299aba"
} | {
"account_age_days": 289,
"account_id": "ACCT-B3DD1C518B70",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.249
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 249,
"timestamp": "2026-01-04T19:52:00Z",
"transaction_amount_usd": 1828448.9
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3592064.28,
"financial_exposure_usd": 3785149.86,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109848",
"label": "benign",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-07T20:08:00Z",
"trace_id": "33b12b40-d8ef-56ad-d84e-b25c02e6d3b4"
} | {
"account_age_days": 50,
"account_id": "ACCT-18415719E83B",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_2",
"session_entropy": 0.9
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 160,
"timestamp": "2026-01-07T13:02:00Z",
"transaction_amount_usd": 4.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4102.45,
"financial_exposure_usd": 5528.41,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108706",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-07T01:06:00Z",
"trace_id": "1770d3c6-7b1c-8e3c-4681-929e6e6f48f9"
} | {
"account_age_days": 489,
"account_id": "ACCT-CAAF0CFE88D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 535,
"timestamp": "2026-01-07T01:06:00Z",
"transaction_amount_usd": 13643.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4137.06,
"financial_exposure_usd": 4285.54,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104363",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "medium",
"timestamp": "2026-01-04T00:43:00Z",
"trace_id": "2e8f44d2-1118-adb6-1d5f-cf72c40371b6"
} | {
"account_age_days": 424,
"account_id": "ACCT-1A7779249CF1",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_2",
"session_entropy": 0.825
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 905,
"timestamp": "2026-01-04T00:43:00Z",
"transaction_amount_usd": 1156484.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1833051.8,
"financial_exposure_usd": 3667289.79,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100203",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "medium",
"timestamp": "2026-01-01T03:23:00Z",
"trace_id": "66e6c48a-d679-3ab4-eae6-c3da5f2d38b8"
} | {
"account_age_days": 895,
"account_id": "ACCT-CE70D3F7B190",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.157
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 372,
"timestamp": "2026-01-01T02:07:00Z",
"transaction_amount_usd": 22.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.613,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 106632.73,
"financial_exposure_usd": 160298.31,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100310",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-01T05:10:00Z",
"trace_id": "eabb42d6-a81c-e995-9e00-801dcb8052e1"
} | {
"account_age_days": 616,
"account_id": "ACCT-0F9D781953E6",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 838,
"timestamp": "2026-01-01T05:10:00Z",
"transaction_amount_usd": 20447.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.474,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 294943.77,
"financial_exposure_usd": 312617.23,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107196",
"label": "benign",
"label_confidence": 0.512,
"severity": "critical",
"timestamp": "2026-01-05T23:56:00Z",
"trace_id": "0c4e76a5-2ca1-0720-110c-6a1faf17cd2c"
} | {
"account_age_days": 586,
"account_id": "ACCT-73CE4591D673",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.412
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 284,
"timestamp": "2026-01-05T22:16:00Z",
"transaction_amount_usd": 22.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1935.26,
"financial_exposure_usd": 2535.82,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107380",
"label": "benign",
"label_confidence": 0.721,
"severity": "low",
"timestamp": "2026-01-06T03:00:00Z",
"trace_id": "003167fd-ca5f-057b-a2da-e95c369d4dca"
} | {
"account_age_days": 1916,
"account_id": "ACCT-11A1C3D977C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.819
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 393,
"timestamp": "2026-01-05T21:21:00Z",
"transaction_amount_usd": 3.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3748.9,
"financial_exposure_usd": 7933.16,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102678",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "critical",
"timestamp": "2026-01-02T20:38:00Z",
"trace_id": "5bc5c347-3016-d04c-f6f9-5a9c62361603"
} | {
"account_age_days": 430,
"account_id": "ACCT-725C0FE19802",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_1",
"session_entropy": 0.666
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 306,
"timestamp": "2026-01-02T20:38:00Z",
"transaction_amount_usd": 28409.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 196371.82,
"financial_exposure_usd": 398776.71,
"recoverable_pct": 0.215
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100643",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-01T10:43:00Z",
"trace_id": "c7d20464-21fc-2591-0de9-ef88fca3d7d8"
} | {
"account_age_days": 581,
"account_id": "ACCT-CBFB3A8F9FB2",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_2",
"session_entropy": 0.105
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 396,
"timestamp": "2026-01-01T03:57:00Z",
"transaction_amount_usd": 23.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 742770.34,
"financial_exposure_usd": 875344.87,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109713",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-07T17:53:00Z",
"trace_id": "13c5a7cc-c3b3-e03e-153a-c74205307319"
} | {
"account_age_days": 1427,
"account_id": "ACCT-FF24FFA8B0E2",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.607
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 109,
"timestamp": "2026-01-07T17:53:00Z",
"transaction_amount_usd": 10981.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 875.87,
"financial_exposure_usd": 1808.14,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109695",
"label": "benign",
"label_confidence": 0.471,
"severity": "low",
"timestamp": "2026-01-07T17:35:00Z",
"trace_id": "25e35061-3e7a-de7e-21a3-e353655dab4b"
} | {
"account_age_days": 532,
"account_id": "ACCT-A298F55D6A5D",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.608
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 333,
"timestamp": "2026-01-07T06:32:00Z",
"transaction_amount_usd": 17.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2241.73,
"financial_exposure_usd": 2786.36,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103922",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "medium",
"timestamp": "2026-01-03T17:22:00Z",
"trace_id": "961203a2-72e5-8035-59c1-79e0667f44a2"
} | {
"account_age_days": 356,
"account_id": "ACCT-38156E01B09B",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 182,
"timestamp": "2026-01-03T06:48:00Z",
"transaction_amount_usd": 16.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2028188.77,
"financial_exposure_usd": 4103002.11,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105013",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "critical",
"timestamp": "2026-01-04T11:33:00Z",
"trace_id": "82b3d244-d302-718f-54b5-e50f60ad8350"
} | {
"account_age_days": 751,
"account_id": "ACCT-004A16490F68",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 701,
"timestamp": "2026-01-04T11:33:00Z",
"transaction_amount_usd": 1011705.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.668,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4030295.38,
"financial_exposure_usd": 6261733.18,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102445",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "medium",
"timestamp": "2026-01-02T16:45:00Z",
"trace_id": "5ac170e4-7e67-e7de-b231-1a53fe2cd3e6"
} | {
"account_age_days": 1023,
"account_id": "ACCT-34D57114D4B3",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_2",
"session_entropy": 0.286
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 85,
"timestamp": "2026-01-02T05:48:00Z",
"transaction_amount_usd": 14.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.699,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 550123.36,
"financial_exposure_usd": 930098.72,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107124",
"label": "benign",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-05T22:44:00Z",
"trace_id": "491f48b7-2592-c325-dc7b-9b3d2c2a2042"
} | {
"account_age_days": 1227,
"account_id": "ACCT-C3F6A9BF161F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.51
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 266,
"timestamp": "2026-01-05T11:38:00Z",
"transaction_amount_usd": 15.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 656.75,
"financial_exposure_usd": 1096.76,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104410",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "critical",
"timestamp": "2026-01-04T01:30:00Z",
"trace_id": "74bc07d4-3045-2925-81df-da8156a1d55a"
} | {
"account_age_days": 476,
"account_id": "ACCT-47E5F4D459EC",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.48
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 181,
"timestamp": "2026-01-03T20:14:00Z",
"transaction_amount_usd": 11.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2584540.17,
"financial_exposure_usd": 5110227.03,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107572",
"label": "benign",
"label_confidence": 0.599,
"severity": "high",
"timestamp": "2026-01-06T06:12:00Z",
"trace_id": "21bec14c-3d8c-4a3d-777e-193c6eed990f"
} | {
"account_age_days": 1083,
"account_id": "ACCT-90DFF92D65DC",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.913
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 250,
"timestamp": "2026-01-06T04:16:00Z",
"transaction_amount_usd": 16.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1575.05,
"financial_exposure_usd": 1782.47,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104984",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "low",
"timestamp": "2026-01-04T11:04:00Z",
"trace_id": "f2157da7-5097-6783-8004-28df53e94605"
} | {
"account_age_days": 1255,
"account_id": "ACCT-0AB5ABC4B16C",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_2",
"session_entropy": 0.123
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 279,
"timestamp": "2026-01-04T11:04:00Z",
"transaction_amount_usd": 513818.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1569026.01,
"financial_exposure_usd": 2223529.47,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107255",
"label": "benign",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-06T00:55:00Z",
"trace_id": "e92cfb89-d87a-3fb5-c11b-8d61a8dc5a81"
} | {
"account_age_days": 1432,
"account_id": "ACCT-7E9B8DA8C607",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.794
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1166,
"timestamp": "2026-01-06T00:55:00Z",
"transaction_amount_usd": 14691.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3036.58,
"financial_exposure_usd": 5251.96,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101334",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-01T22:14:00Z",
"trace_id": "5f1e4aa5-8ca9-50c4-dc82-1a3f12669dac"
} | {
"account_age_days": 1528,
"account_id": "ACCT-012028D13A04",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_3",
"session_entropy": 0.543
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 257,
"timestamp": "2026-01-01T22:14:00Z",
"transaction_amount_usd": 83392.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 381876.41,
"financial_exposure_usd": 713377.71,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107577",
"label": "benign",
"label_confidence": 0.608,
"severity": "medium",
"timestamp": "2026-01-06T06:17:00Z",
"trace_id": "76372a47-21cf-12d2-6393-fa207b96275a"
} | {
"account_age_days": 1826,
"account_id": "ACCT-F6CA090162FB",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 387,
"timestamp": "2026-01-06T06:17:00Z",
"transaction_amount_usd": 9443.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1974.88,
"financial_exposure_usd": 3209.27,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101487",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "high",
"timestamp": "2026-01-02T00:47:00Z",
"trace_id": "3cc5b7b4-b250-c129-c9be-e57fb0b3954d"
} | {
"account_age_days": 1915,
"account_id": "ACCT-D017BA287E7C",
"baseline_risk_score": 0.603,
"kyc_tier": "tier_2",
"session_entropy": 0.327
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1047,
"timestamp": "2026-01-02T00:47:00Z",
"transaction_amount_usd": 18829.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 360831.08,
"financial_exposure_usd": 487811.88,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107524",
"label": "benign",
"label_confidence": 0.507,
"severity": "low",
"timestamp": "2026-01-06T05:24:00Z",
"trace_id": "98b87c95-c6fb-7ac9-bc8c-d61b4c99d7bf"
} | {
"account_age_days": 1825,
"account_id": "ACCT-416F5EBA8003",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_1",
"session_entropy": 0.893
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 264,
"timestamp": "2026-01-06T05:24:00Z",
"transaction_amount_usd": 9964.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1480.23,
"financial_exposure_usd": 1662.88,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103273",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-03T06:33:00Z",
"trace_id": "f2fed9fb-96d2-caf7-16e5-2bd67d4a3b1c"
} | {
"account_age_days": 1129,
"account_id": "ACCT-D766B6331D0F",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_1",
"session_entropy": 0.22
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 595,
"timestamp": "2026-01-03T06:33:00Z",
"transaction_amount_usd": 36256.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.531,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 697239.82,
"financial_exposure_usd": 778862.22,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105160",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "medium",
"timestamp": "2026-01-04T14:00:00Z",
"trace_id": "94073ca9-b7d2-ec00-8d8a-afbec2ef2c54"
} | {
"account_age_days": 1279,
"account_id": "ACCT-9A3ADD06362C",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.936
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 899,
"timestamp": "2026-01-04T14:00:00Z",
"transaction_amount_usd": 674962.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3876904.83,
"financial_exposure_usd": 4621172.03,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109149",
"label": "benign",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-07T08:29:00Z",
"trace_id": "6107ebca-219b-e572-06c0-b1c8a27bed43"
} | {
"account_age_days": 59,
"account_id": "ACCT-32BD8843DB48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.83
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 561,
"timestamp": "2026-01-07T08:29:00Z",
"transaction_amount_usd": 1349.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3609.06,
"financial_exposure_usd": 3821.78,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101605",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "critical",
"timestamp": "2026-01-02T02:45:00Z",
"trace_id": "682b1633-27f6-1bb3-ea68-78a82d64f45f"
} | {
"account_age_days": 563,
"account_id": "ACCT-D633F5F992B1",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.656
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 424,
"timestamp": "2026-01-02T02:45:00Z",
"transaction_amount_usd": 82367.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.395,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 493678.67,
"financial_exposure_usd": 922808.35,
"recoverable_pct": 0.054
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106376",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-05T10:16:00Z",
"trace_id": "3f123121-b18a-e8fd-cd7c-32cce272274b"
} | {
"account_age_days": 1045,
"account_id": "ACCT-29AFB3FADBF4",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_1",
"session_entropy": 0.491
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 213,
"timestamp": "2026-01-05T10:16:00Z",
"transaction_amount_usd": 1795240.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4917345.64,
"financial_exposure_usd": 5128287.96,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108876",
"label": "benign",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-07T03:56:00Z",
"trace_id": "32d0fe23-572a-6c13-159d-d722052ec16b"
} | {
"account_age_days": 331,
"account_id": "ACCT-6A88731F127D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.89
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 232,
"timestamp": "2026-01-07T03:56:00Z",
"transaction_amount_usd": 8750.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.559,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 375.63,
"financial_exposure_usd": 412.91,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100495",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "low",
"timestamp": "2026-01-01T08:15:00Z",
"trace_id": "3add0e25-9fa9-3fb9-d44e-6215f5ef1ebd"
} | {
"account_age_days": 1767,
"account_id": "ACCT-911DDF90AE5A",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_2",
"session_entropy": 0.425
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 93,
"timestamp": "2026-01-01T08:15:00Z",
"transaction_amount_usd": 29442.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.934,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 907635.5,
"financial_exposure_usd": 911255.28,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104461",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "low",
"timestamp": "2026-01-04T02:21:00Z",
"trace_id": "b766ed01-65d9-3b82-621d-1f55d8826125"
} | {
"account_age_days": 263,
"account_id": "ACCT-FD881007218B",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_3",
"session_entropy": 0.492
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1074,
"timestamp": "2026-01-04T02:21:00Z",
"transaction_amount_usd": 2047745.8
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.43,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3445897.5,
"financial_exposure_usd": 6569011.79,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107110",
"label": "benign",
"label_confidence": 0.721,
"severity": "high",
"timestamp": "2026-01-05T22:30:00Z",
"trace_id": "c920bb63-04c0-1029-5fcb-0788f38f1a68"
} | {
"account_age_days": 458,
"account_id": "ACCT-3BFAA52C07A3",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.404
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 334,
"timestamp": "2026-01-05T22:30:00Z",
"transaction_amount_usd": 357.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2247.61,
"financial_exposure_usd": 3511.53,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101687",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-02T04:07:00Z",
"trace_id": "37a57d9a-161a-d433-d658-f370598d5fa8"
} | {
"account_age_days": 336,
"account_id": "ACCT-10ABD5472703",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_1",
"session_entropy": 0.181
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 668,
"timestamp": "2026-01-02T04:07:00Z",
"transaction_amount_usd": 77009.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 274096.03,
"financial_exposure_usd": 469644.73,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105819",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "low",
"timestamp": "2026-01-05T00:59:00Z",
"trace_id": "5a27f42d-b516-2a94-35ba-313901f27eb2"
} | {
"account_age_days": 1068,
"account_id": "ACCT-205D946E44AD",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.671
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 944,
"timestamp": "2026-01-05T00:59:00Z",
"transaction_amount_usd": 263901.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.913,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6005541.96,
"financial_exposure_usd": 7472379.69,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105175",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-04T14:15:00Z",
"trace_id": "21be45c9-6cd8-2a7d-477e-0e7cab35a8fd"
} | {
"account_age_days": 1087,
"account_id": "ACCT-BF88213926A9",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.894
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 483,
"timestamp": "2026-01-04T14:15:00Z",
"transaction_amount_usd": 682098.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.475,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3045784.64,
"financial_exposure_usd": 5416794.89,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105540",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-04T20:20:00Z",
"trace_id": "96054055-08c2-9734-1ba9-96d6588d87a5"
} | {
"account_age_days": 1920,
"account_id": "ACCT-4FEB2030E483",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.633
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 879,
"timestamp": "2026-01-04T20:20:00Z",
"transaction_amount_usd": 1691018.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3003349.33,
"financial_exposure_usd": 4274938.08,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101642",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "critical",
"timestamp": "2026-01-02T03:22:00Z",
"trace_id": "2350f70f-6771-6c15-3cc3-6fd3f4b1cf61"
} | {
"account_age_days": 1371,
"account_id": "ACCT-CEFDD2501C76",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 332,
"timestamp": "2026-01-02T03:22:00Z",
"transaction_amount_usd": 53062
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.397,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 402245.92,
"financial_exposure_usd": 467889.04,
"recoverable_pct": 0.299
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109315",
"label": "benign",
"label_confidence": 0.561,
"severity": "high",
"timestamp": "2026-01-07T11:15:00Z",
"trace_id": "f4495325-47a9-6339-b4e3-dc08fea402bc"
} | {
"account_age_days": 155,
"account_id": "ACCT-2A98D152EC47",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.821
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 214,
"timestamp": "2026-01-07T08:58:00Z",
"transaction_amount_usd": 3.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 670.27,
"financial_exposure_usd": 1467.96,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103949",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-03T17:49:00Z",
"trace_id": "3a40d185-bc30-382d-0696-c261b1596210"
} | {
"account_age_days": 650,
"account_id": "ACCT-4B7A5C76E79A",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.118
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 854,
"timestamp": "2026-01-03T17:49:00Z",
"transaction_amount_usd": 1689501.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5133811.79,
"financial_exposure_usd": 5920806.82,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103940",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "critical",
"timestamp": "2026-01-03T17:40:00Z",
"trace_id": "5fe81cb0-8ff0-e75d-17e1-22ca44de7b5f"
} | {
"account_age_days": 1279,
"account_id": "ACCT-9E160F597268",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.625
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 755,
"timestamp": "2026-01-03T17:40:00Z",
"transaction_amount_usd": 496738.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2246601.48,
"financial_exposure_usd": 3355092.99,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106021",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-05T04:21:00Z",
"trace_id": "ba2add7e-dcdb-3b42-7724-d046f9321bb6"
} | {
"account_age_days": 1129,
"account_id": "ACCT-78825C99D7C4",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_1",
"session_entropy": 0.247
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 220,
"timestamp": "2026-01-05T04:21:00Z",
"transaction_amount_usd": 1936225.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3403367.36,
"financial_exposure_usd": 5556401.49,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100516",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-01T08:36:00Z",
"trace_id": "7424f902-4023-d444-2542-7d14c349263f"
} | {
"account_age_days": 300,
"account_id": "ACCT-94E91738713E",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_1",
"session_entropy": 0.352
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 575,
"timestamp": "2026-01-01T08:36:00Z",
"transaction_amount_usd": 18400.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.486,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 282741.69,
"financial_exposure_usd": 502343.1,
"recoverable_pct": 0.337
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108951",
"label": "benign",
"label_confidence": 0.567,
"severity": "low",
"timestamp": "2026-01-07T05:11:00Z",
"trace_id": "acabb2c0-c16e-b492-1840-4809b16e952d"
} | {
"account_age_days": 419,
"account_id": "ACCT-E5CD45CE93F2",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_3",
"session_entropy": 0.386
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1120,
"timestamp": "2026-01-07T05:11:00Z",
"transaction_amount_usd": 1304.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1731.32,
"financial_exposure_usd": 2104.27,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109280",
"label": "benign",
"label_confidence": 0.555,
"severity": "medium",
"timestamp": "2026-01-07T10:40:00Z",
"trace_id": "ee78260c-0d54-809b-8b88-c66307542fad"
} | {
"account_age_days": 520,
"account_id": "ACCT-8C51F77052C5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.412
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 400,
"timestamp": "2026-01-07T07:28:00Z",
"transaction_amount_usd": 14.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 881.94,
"financial_exposure_usd": 977.11,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107265",
"label": "benign",
"label_confidence": 0.503,
"severity": "high",
"timestamp": "2026-01-06T01:05:00Z",
"trace_id": "da302ad8-9497-db50-cb59-7c35c434919e"
} | {
"account_age_days": 563,
"account_id": "ACCT-D28935DD9495",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.94
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 874,
"timestamp": "2026-01-06T01:05:00Z",
"transaction_amount_usd": 5037.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2019.35,
"financial_exposure_usd": 2316.29,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103177",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-03T04:57:00Z",
"trace_id": "d8b7a8aa-4664-2bf3-3d00-a7a5d6489fc7"
} | {
"account_age_days": 1017,
"account_id": "ACCT-45768B9C88BB",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_2",
"session_entropy": 0.21
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 301,
"timestamp": "2026-01-03T04:57:00Z",
"transaction_amount_usd": 8479.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 511494.45,
"financial_exposure_usd": 937187.14,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105767",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-05T00:07:00Z",
"trace_id": "4992a88b-6d21-0bd8-b776-638cc88529a4"
} | {
"account_age_days": 1869,
"account_id": "ACCT-39E729423BE8",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.675
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 254,
"timestamp": "2026-01-05T00:07:00Z",
"transaction_amount_usd": 602223.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.8,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 3135507.16,
"financial_exposure_usd": 4271804.55,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100040",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-01T00:40:00Z",
"trace_id": "085eb489-4ac6-6780-3874-9f3cc2d49b56"
} | {
"account_age_days": 1562,
"account_id": "ACCT-5274EE11B61D",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.804
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 361,
"timestamp": "2025-12-31T18:59:00Z",
"transaction_amount_usd": 14.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.644,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 203595.07,
"financial_exposure_usd": 262132.48,
"recoverable_pct": 0.319
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100701",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "critical",
"timestamp": "2026-01-01T11:41:00Z",
"trace_id": "f5015e55-e5dd-259d-f3e0-97123e29310c"
} | {
"account_age_days": 1028,
"account_id": "ACCT-447293E1626F",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.938
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 140,
"timestamp": "2026-01-01T11:41:00Z",
"transaction_amount_usd": 64005.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 337167.3,
"financial_exposure_usd": 575441.61,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106038",
"label": "fraudulent",
"label_confidence": 0.605,
"severity": "high",
"timestamp": "2026-01-05T04:38:00Z",
"trace_id": "90ed778d-6782-b359-8bfe-890fcec62cf8"
} | {
"account_age_days": 1796,
"account_id": "ACCT-0D53352B0479",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 910,
"timestamp": "2026-01-05T04:38:00Z",
"transaction_amount_usd": 1057879.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1747517.28,
"financial_exposure_usd": 2205877.53,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107320",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-06T02:00:00Z",
"trace_id": "a1f8f1bb-4bc8-a148-294b-50f74881fe68"
} | {
"account_age_days": 828,
"account_id": "ACCT-5C7992B8A7C7",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_3",
"session_entropy": 0.179
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 395,
"timestamp": "2026-01-05T23:33:00Z",
"transaction_amount_usd": 12.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1358.81,
"financial_exposure_usd": 1809.55,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106341",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-05T09:41:00Z",
"trace_id": "1f7feba0-5bf4-1395-18a0-619787786f85"
} | {
"account_age_days": 1648,
"account_id": "ACCT-C190F89087B6",
"baseline_risk_score": 0.216,
"kyc_tier": "tier_3",
"session_entropy": 0.825
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 126,
"timestamp": "2026-01-05T05:32:00Z",
"transaction_amount_usd": 23.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1133033.46,
"financial_exposure_usd": 2372297.1,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106150",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "low",
"timestamp": "2026-01-05T06:30:00Z",
"trace_id": "c5168c92-9f74-cfbe-e1b1-f674a5b3ea12"
} | {
"account_age_days": 290,
"account_id": "ACCT-71FD31EBD3E0",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_1",
"session_entropy": 0.416
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 185,
"timestamp": "2026-01-05T03:36:00Z",
"transaction_amount_usd": 17.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.548,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 649217.67,
"financial_exposure_usd": 991347.28,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105970",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-05T03:30:00Z",
"trace_id": "3e452ef5-81e8-561c-2433-38443d1890ed"
} | {
"account_age_days": 1998,
"account_id": "ACCT-9186DC023547",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_1",
"session_entropy": 0.351
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 781,
"timestamp": "2026-01-05T03:30:00Z",
"transaction_amount_usd": 1260675.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.947,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1150384.72,
"financial_exposure_usd": 1763175.96,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102268",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-02T13:48:00Z",
"trace_id": "ee648fcb-f9cb-e017-16d5-b95a43aec823"
} | {
"account_age_days": 773,
"account_id": "ACCT-DF2D5502264A",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_1",
"session_entropy": 0.314
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 167,
"timestamp": "2026-01-02T12:56:00Z",
"transaction_amount_usd": 2.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 502011.16,
"financial_exposure_usd": 1031403.32,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104728",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "high",
"timestamp": "2026-01-04T06:48:00Z",
"trace_id": "1da9bcd9-4d58-0e61-2a5a-6798d65c8a8e"
} | {
"account_age_days": 1786,
"account_id": "ACCT-5B7933588EDD",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.174
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 332,
"timestamp": "2026-01-04T06:48:00Z",
"transaction_amount_usd": 288169.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.587,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3724197.51,
"financial_exposure_usd": 5688265.35,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108292",
"label": "benign",
"label_confidence": 0.709,
"severity": "critical",
"timestamp": "2026-01-06T18:12:00Z",
"trace_id": "2880a97a-f93d-4b5b-dabb-ff7516e1ccfd"
} | {
"account_age_days": 1975,
"account_id": "ACCT-129654063383",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.583
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 125,
"timestamp": "2026-01-06T18:12:00Z",
"transaction_amount_usd": 2126.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3686.53,
"financial_exposure_usd": 5192.46,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.