schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108370",
"label": "benign",
"label_confidence": 0.514,
"severity": "low",
"timestamp": "2026-01-06T19:30:00Z",
"trace_id": "d022a390-6ec5-6c37-0503-0eee6fe47767"
} | {
"account_age_days": 742,
"account_id": "ACCT-8E310E98F6F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.825
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 270,
"timestamp": "2026-01-06T14:39:00Z",
"transaction_amount_usd": 13.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 535.96,
"financial_exposure_usd": 904.5,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101451",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "medium",
"timestamp": "2026-01-02T00:11:00Z",
"trace_id": "4f50bc08-c22a-343a-2c1e-7ceee49a1ea1"
} | {
"account_age_days": 1640,
"account_id": "ACCT-5951C789358D",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.335
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 493,
"timestamp": "2026-01-02T00:11:00Z",
"transaction_amount_usd": 50152.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 112133.06,
"financial_exposure_usd": 135224.22,
"recoverable_pct": 0.013
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103245",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "medium",
"timestamp": "2026-01-03T06:05:00Z",
"trace_id": "cd325a84-f7f0-edd4-9a38-feddfb123a7c"
} | {
"account_age_days": 104,
"account_id": "ACCT-4C1D8EA1DDE8",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_1",
"session_entropy": 0.948
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 231,
"timestamp": "2026-01-02T23:27:00Z",
"transaction_amount_usd": 21.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 908085.26,
"financial_exposure_usd": 1021436.39,
"recoverable_pct": 0.263
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105694",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-04T22:54:00Z",
"trace_id": "b0816a99-ce8c-a87e-259e-5845b4fa88d8"
} | {
"account_age_days": 1885,
"account_id": "ACCT-9C9F9A8161E0",
"baseline_risk_score": 0.22,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 960,
"timestamp": "2026-01-04T22:54:00Z",
"transaction_amount_usd": 2897253.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.643,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3169639.89,
"financial_exposure_usd": 5163365.43,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103385",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-03T08:25:00Z",
"trace_id": "b32c69db-aa81-f695-9774-b5cab8e97c6b"
} | {
"account_age_days": 36,
"account_id": "ACCT-9AC0BA30103B",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.57
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 368,
"timestamp": "2026-01-03T05:03:00Z",
"transaction_amount_usd": 3.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.547,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3672400.3,
"financial_exposure_usd": 4509220.16,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104240",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-03T22:40:00Z",
"trace_id": "22bf57f4-c29f-e2ed-56aa-d6fe7d21964c"
} | {
"account_age_days": 1393,
"account_id": "ACCT-F1AA7E68C033",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 378,
"timestamp": "2026-01-03T12:49:00Z",
"transaction_amount_usd": 24.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.37,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1765659.02,
"financial_exposure_usd": 3262287.65,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109216",
"label": "benign",
"label_confidence": 0.67,
"severity": "high",
"timestamp": "2026-01-07T09:36:00Z",
"trace_id": "a00f9b7f-b78d-f9fa-61e6-b1a8f9d5a3e6"
} | {
"account_age_days": 1126,
"account_id": "ACCT-FA17737388F6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.414
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 713,
"timestamp": "2026-01-07T09:36:00Z",
"transaction_amount_usd": 14704.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.768,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 981.59,
"financial_exposure_usd": 1338.37,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105747",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "medium",
"timestamp": "2026-01-04T23:47:00Z",
"trace_id": "6e183946-b831-ca8c-1dc5-0855cc8e7ca1"
} | {
"account_age_days": 1983,
"account_id": "ACCT-851980F71A77",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.932
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1094,
"timestamp": "2026-01-04T23:47:00Z",
"transaction_amount_usd": 1175773
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.624,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3406430.02,
"financial_exposure_usd": 6295531.89,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106846",
"label": "benign",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-05T18:06:00Z",
"trace_id": "86780f9f-5957-7ceb-6c3f-243f52944fec"
} | {
"account_age_days": 1862,
"account_id": "ACCT-3B0CE51A42BA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 656,
"timestamp": "2026-01-05T18:06:00Z",
"transaction_amount_usd": 3231.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4700.38,
"financial_exposure_usd": 4795.84,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107590",
"label": "benign",
"label_confidence": 0.49,
"severity": "medium",
"timestamp": "2026-01-06T06:30:00Z",
"trace_id": "a169b971-98b1-c286-fd8c-ba9d0187eb20"
} | {
"account_age_days": 480,
"account_id": "ACCT-DA1EC39176B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.784
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 917,
"timestamp": "2026-01-06T06:30:00Z",
"transaction_amount_usd": 413.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.59,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 903.48,
"financial_exposure_usd": 1011.3,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103155",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-03T04:35:00Z",
"trace_id": "d12e0803-2296-8ca6-3e96-b48e4a3db743"
} | {
"account_age_days": 418,
"account_id": "ACCT-A9D6CBA89257",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 259,
"timestamp": "2026-01-03T04:35:00Z",
"transaction_amount_usd": 4421.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 739268.44,
"financial_exposure_usd": 1252901.83,
"recoverable_pct": 0.21
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101202",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-01T20:02:00Z",
"trace_id": "ab524260-74c0-3700-d268-fc61943b9c40"
} | {
"account_age_days": 357,
"account_id": "ACCT-19BE57A85EF5",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 206,
"timestamp": "2026-01-01T09:38:00Z",
"transaction_amount_usd": 13.12
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.667,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 259508.26,
"financial_exposure_usd": 402419.84,
"recoverable_pct": 0.12
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101436",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-01T23:56:00Z",
"trace_id": "a40fa883-fe23-ec28-b1ea-56f0aa8206ef"
} | {
"account_age_days": 1484,
"account_id": "ACCT-B3180448A9EE",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_2",
"session_entropy": 0.249
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 461,
"timestamp": "2026-01-01T23:56:00Z",
"transaction_amount_usd": 73342.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 830952.1,
"financial_exposure_usd": 1414473.43,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107340",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-06T02:20:00Z",
"trace_id": "65731276-ee98-448d-3d52-4e50f44af32b"
} | {
"account_age_days": 1715,
"account_id": "ACCT-313D87327C4B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.685
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 233,
"timestamp": "2026-01-05T15:31:00Z",
"transaction_amount_usd": 21.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2780.25,
"financial_exposure_usd": 3928.9,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104286",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "critical",
"timestamp": "2026-01-03T23:26:00Z",
"trace_id": "232c5f64-7a06-4771-73aa-389c497f5abf"
} | {
"account_age_days": 1722,
"account_id": "ACCT-51057A641C16",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 106,
"timestamp": "2026-01-03T19:46:00Z",
"transaction_amount_usd": 23.7
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3605015.26,
"financial_exposure_usd": 5221762.23,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105178",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-04T14:18:00Z",
"trace_id": "ec9494a8-36f8-f0c8-1018-d0216620ac73"
} | {
"account_age_days": 1510,
"account_id": "ACCT-331B834878F0",
"baseline_risk_score": 0.242,
"kyc_tier": "tier_1",
"session_entropy": 0.152
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 110,
"timestamp": "2026-01-04T02:54:00Z",
"transaction_amount_usd": 12.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.515,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2584331.1,
"financial_exposure_usd": 3529019.67,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105480",
"label": "fraudulent",
"label_confidence": 0.73,
"severity": "high",
"timestamp": "2026-01-04T19:20:00Z",
"trace_id": "90fd7b75-4f7e-b9e5-2ce7-d71e69e9cd6f"
} | {
"account_age_days": 1564,
"account_id": "ACCT-2B0630CB0C01",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_2",
"session_entropy": 0.746
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 865,
"timestamp": "2026-01-04T19:20:00Z",
"transaction_amount_usd": 1729915.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.612,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3688127.56,
"financial_exposure_usd": 4705453.97,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107913",
"label": "benign",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-06T11:53:00Z",
"trace_id": "f52ee075-a27e-9036-4284-cd067f51d1da"
} | {
"account_age_days": 798,
"account_id": "ACCT-E93DFE2ACFC4",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 972,
"timestamp": "2026-01-06T11:53:00Z",
"transaction_amount_usd": 1430.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1942.66,
"financial_exposure_usd": 2655.82,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102838",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-02T23:18:00Z",
"trace_id": "db5ae2b7-4c7a-4bba-b16f-32fad114a767"
} | {
"account_age_days": 111,
"account_id": "ACCT-DD3DAD983842",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_1",
"session_entropy": 0.882
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1098,
"timestamp": "2026-01-02T23:18:00Z",
"transaction_amount_usd": 36691.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.537,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 267737.27,
"financial_exposure_usd": 485011.42,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103616",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-03T12:16:00Z",
"trace_id": "53d73efe-f26d-53ad-fa41-84a5e576db87"
} | {
"account_age_days": 972,
"account_id": "ACCT-E795C5C1143E",
"baseline_risk_score": 0.242,
"kyc_tier": "tier_1",
"session_entropy": 0.212
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 362,
"timestamp": "2026-01-03T02:30:00Z",
"transaction_amount_usd": 20.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4329029.93,
"financial_exposure_usd": 8258887.38,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107272",
"label": "benign",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-06T01:12:00Z",
"trace_id": "23f949bb-8b9f-7864-732e-6aa076e41d78"
} | {
"account_age_days": 719,
"account_id": "ACCT-6D49AD18E02D",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_3",
"session_entropy": 0.232
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 763,
"timestamp": "2026-01-06T01:12:00Z",
"transaction_amount_usd": 9479.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1133.26,
"financial_exposure_usd": 1794.84,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109065",
"label": "benign",
"label_confidence": 0.693,
"severity": "low",
"timestamp": "2026-01-07T07:05:00Z",
"trace_id": "3d402ce1-984e-7509-bc1d-ceb9f61920b0"
} | {
"account_age_days": 1284,
"account_id": "ACCT-A066AF1638BC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.344
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 109,
"timestamp": "2026-01-07T07:05:00Z",
"transaction_amount_usd": 4496.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 982.46,
"financial_exposure_usd": 2284.18,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106963",
"label": "benign",
"label_confidence": 0.598,
"severity": "low",
"timestamp": "2026-01-05T20:03:00Z",
"trace_id": "ba8259b2-e1cc-9087-e13e-202915b476d3"
} | {
"account_age_days": 1747,
"account_id": "ACCT-309F9B3B07B0",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_1",
"session_entropy": 0.136
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 139,
"timestamp": "2026-01-05T08:31:00Z",
"transaction_amount_usd": 6.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 923.04,
"financial_exposure_usd": 1462.01,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104816",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "medium",
"timestamp": "2026-01-04T08:16:00Z",
"trace_id": "2aa2ee30-98de-3d28-75a8-b6da14a763a3"
} | {
"account_age_days": 698,
"account_id": "ACCT-97871A581DA2",
"baseline_risk_score": 0.246,
"kyc_tier": "tier_2",
"session_entropy": 0.117
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 431,
"timestamp": "2026-01-04T08:16:00Z",
"transaction_amount_usd": 2688390.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2379593.92,
"financial_exposure_usd": 4888466.17,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103857",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-03T16:17:00Z",
"trace_id": "c8131bc6-3257-5ab7-435d-47231b94257b"
} | {
"account_age_days": 1099,
"account_id": "ACCT-22B8763D78D5",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_1",
"session_entropy": 0.445
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 711,
"timestamp": "2026-01-03T16:17:00Z",
"transaction_amount_usd": 1403695.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.46,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 4147547.22,
"financial_exposure_usd": 6794841.2,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103952",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-03T17:52:00Z",
"trace_id": "0594ec93-63e4-b02d-e3fb-e2c9837627aa"
} | {
"account_age_days": 950,
"account_id": "ACCT-EE96600E3D2C",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.813
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 566,
"timestamp": "2026-01-03T17:52:00Z",
"transaction_amount_usd": 2395842.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4671687.72,
"financial_exposure_usd": 5747162.84,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100985",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-01T16:25:00Z",
"trace_id": "292ac2ca-c24e-2a72-904e-30f1d6285ca5"
} | {
"account_age_days": 253,
"account_id": "ACCT-19F9445EB33A",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_2",
"session_entropy": 0.658
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 275,
"timestamp": "2026-01-01T09:26:00Z",
"transaction_amount_usd": 12.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 757957.37,
"financial_exposure_usd": 890926.47,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100432",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-01T07:12:00Z",
"trace_id": "66b0d207-c999-79a6-05c6-56cc610bbab9"
} | {
"account_age_days": 815,
"account_id": "ACCT-F5E8EA6EA335",
"baseline_risk_score": 0.594,
"kyc_tier": "tier_1",
"session_entropy": 0.48
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 84,
"timestamp": "2026-01-01T07:12:00Z",
"transaction_amount_usd": 114255.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.375,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 398084.9,
"financial_exposure_usd": 794152.21,
"recoverable_pct": 0.212
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102867",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-02T23:47:00Z",
"trace_id": "a9181085-2721-c2a7-4262-ca35ba950d83"
} | {
"account_age_days": 1161,
"account_id": "ACCT-01471C1FC49B",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_2",
"session_entropy": 0.189
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 341,
"timestamp": "2026-01-02T11:20:00Z",
"transaction_amount_usd": 22.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 828564.9,
"financial_exposure_usd": 1024195.46,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102981",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "high",
"timestamp": "2026-01-03T01:41:00Z",
"trace_id": "763f2016-3605-5cd9-7dbf-44316b5b7922"
} | {
"account_age_days": 1478,
"account_id": "ACCT-144E2A843AE6",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_3",
"session_entropy": 0.518
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 860,
"timestamp": "2026-01-03T01:41:00Z",
"transaction_amount_usd": 53788.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.709,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 871146.37,
"financial_exposure_usd": 1216656.02,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104849",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-04T08:49:00Z",
"trace_id": "134bf8fe-66ef-ee0f-40a9-b129e64f9666"
} | {
"account_age_days": 915,
"account_id": "ACCT-FFC07A199167",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_1",
"session_entropy": 0.548
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 223,
"timestamp": "2026-01-04T04:07:00Z",
"transaction_amount_usd": 8.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.84,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5809608.38,
"financial_exposure_usd": 7559935.83,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109440",
"label": "benign",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-07T13:20:00Z",
"trace_id": "ff98eb80-97f4-7368-d5a2-0075af1e85bb"
} | {
"account_age_days": 244,
"account_id": "ACCT-60E9AA3B62D1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 689,
"timestamp": "2026-01-07T13:20:00Z",
"transaction_amount_usd": 12421.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 290.4,
"financial_exposure_usd": 550.14,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108682",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-07T00:42:00Z",
"trace_id": "00f2faba-340f-2927-09c7-dbf2ca3e003a"
} | {
"account_age_days": 961,
"account_id": "ACCT-4BF5180894B4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.862
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 998,
"timestamp": "2026-01-07T00:42:00Z",
"transaction_amount_usd": 13201.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.463,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1888.62,
"financial_exposure_usd": 4686.44,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103104",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "medium",
"timestamp": "2026-01-03T03:44:00Z",
"trace_id": "083eb7ab-dca3-1544-6e22-1ff5066ccc88"
} | {
"account_age_days": 642,
"account_id": "ACCT-B7EE884191D4",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_3",
"session_entropy": 0.218
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 234,
"timestamp": "2026-01-03T03:44:00Z",
"transaction_amount_usd": 4012.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 185832.08,
"financial_exposure_usd": 438468.53,
"recoverable_pct": 0.353
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106993",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-05T20:33:00Z",
"trace_id": "6b7d02ad-38c1-c1ce-4f49-36fa4b6ecf5a"
} | {
"account_age_days": 757,
"account_id": "ACCT-F7B1C9EF7409",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.136
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 358,
"timestamp": "2026-01-05T20:33:00Z",
"transaction_amount_usd": 14855.31
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3756.93,
"financial_exposure_usd": 5632.42,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109686",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-07T17:26:00Z",
"trace_id": "3ab0100a-b468-1b9f-00bb-636a02105811"
} | {
"account_age_days": 138,
"account_id": "ACCT-E7AE980E0465",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.52
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 165,
"timestamp": "2026-01-07T17:26:00Z",
"transaction_amount_usd": 2720.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3865.56,
"financial_exposure_usd": 3893.8,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108233",
"label": "benign",
"label_confidence": 0.697,
"severity": "medium",
"timestamp": "2026-01-06T17:13:00Z",
"trace_id": "6e8e76ee-0a1a-3b70-c679-15053b0f83c9"
} | {
"account_age_days": 1150,
"account_id": "ACCT-E02C55F7794D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.292
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 273,
"timestamp": "2026-01-06T14:04:00Z",
"transaction_amount_usd": 13.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2188.88,
"financial_exposure_usd": 3062.6,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105498",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "high",
"timestamp": "2026-01-04T19:38:00Z",
"trace_id": "a928b415-1f3d-197a-5761-f4a8c60bf260"
} | {
"account_age_days": 841,
"account_id": "ACCT-A3C669F3E818",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_1",
"session_entropy": 0.859
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 174,
"timestamp": "2026-01-04T19:38:00Z",
"transaction_amount_usd": 240517.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.428,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3859080.11,
"financial_exposure_usd": 4198653.61,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109796",
"label": "benign",
"label_confidence": 0.476,
"severity": "medium",
"timestamp": "2026-01-07T19:16:00Z",
"trace_id": "dffcacf1-1726-ace0-6578-0af2bd800790"
} | {
"account_age_days": 1149,
"account_id": "ACCT-065EF73A8C4A",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_2",
"session_entropy": 0.359
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 321,
"timestamp": "2026-01-07T19:16:00Z",
"transaction_amount_usd": 12466.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.533,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1721.35,
"financial_exposure_usd": 1779.27,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102532",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "critical",
"timestamp": "2026-01-02T18:12:00Z",
"trace_id": "63954520-88d6-53fb-ed27-dc9c32ee7e92"
} | {
"account_age_days": 682,
"account_id": "ACCT-A7135C65DCD0",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_2",
"session_entropy": 0.904
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 846,
"timestamp": "2026-01-02T18:12:00Z",
"transaction_amount_usd": 16497.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.582,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 577234.86,
"financial_exposure_usd": 890628.36,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103824",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "high",
"timestamp": "2026-01-03T15:44:00Z",
"trace_id": "bf60f6e7-23cc-2d29-0c3c-1212f44f7852"
} | {
"account_age_days": 1672,
"account_id": "ACCT-4E83F1EA00A1",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.207
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 316,
"timestamp": "2026-01-03T15:44:00Z",
"transaction_amount_usd": 552200.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.617,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2049047.52,
"financial_exposure_usd": 2682881.76,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100105",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "medium",
"timestamp": "2026-01-01T01:45:00Z",
"trace_id": "88efe82b-1f3e-ea66-af6c-6f61cfefa2a2"
} | {
"account_age_days": 1565,
"account_id": "ACCT-C481EA69F83B",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_1",
"session_entropy": 0.806
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 603,
"timestamp": "2026-01-01T01:45:00Z",
"transaction_amount_usd": 46922.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 371160.54,
"financial_exposure_usd": 553232.81,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101606",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-02T02:46:00Z",
"trace_id": "069938c0-7d74-8db9-991c-68c4e91ac331"
} | {
"account_age_days": 1090,
"account_id": "ACCT-B456B1F9EADD",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.274
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 683,
"timestamp": "2026-01-02T02:46:00Z",
"transaction_amount_usd": 20963.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.638,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 838630.86,
"financial_exposure_usd": 1030943.53,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107780",
"label": "benign",
"label_confidence": 0.572,
"severity": "low",
"timestamp": "2026-01-06T09:40:00Z",
"trace_id": "c1da4079-28b7-fc54-f914-809839be0a99"
} | {
"account_age_days": 1815,
"account_id": "ACCT-9F5C92F26CDC",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_3",
"session_entropy": 0.426
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 597,
"timestamp": "2026-01-06T09:40:00Z",
"transaction_amount_usd": 8220.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3088.49,
"financial_exposure_usd": 5822.34,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104680",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "critical",
"timestamp": "2026-01-04T06:00:00Z",
"trace_id": "ccf63bbe-3d1e-aeaf-674d-20d5477a8650"
} | {
"account_age_days": 1272,
"account_id": "ACCT-DFE8C7E929EF",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_2",
"session_entropy": 0.837
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 699,
"timestamp": "2026-01-04T06:00:00Z",
"transaction_amount_usd": 228595.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.778,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7652311.64,
"financial_exposure_usd": 8123282.3,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101231",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "critical",
"timestamp": "2026-01-01T20:31:00Z",
"trace_id": "a624fc7c-af2f-c90a-170f-d932dbadc5f6"
} | {
"account_age_days": 1503,
"account_id": "ACCT-8E41ECFACDA6",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_3",
"session_entropy": 0.464
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 476,
"timestamp": "2026-01-01T20:31:00Z",
"transaction_amount_usd": 112791.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.635,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1153261.02,
"financial_exposure_usd": 1263065.03,
"recoverable_pct": 0.22
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102241",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "critical",
"timestamp": "2026-01-02T13:21:00Z",
"trace_id": "5df49176-72d5-50fd-f6b1-bb79b9f8456d"
} | {
"account_age_days": 670,
"account_id": "ACCT-7DCA90EA5870",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 990,
"timestamp": "2026-01-02T13:21:00Z",
"transaction_amount_usd": 60309.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 364869.42,
"financial_exposure_usd": 621941.19,
"recoverable_pct": 0.31
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109274",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-07T10:34:00Z",
"trace_id": "33970b5e-5569-9491-4a77-a2601dbac54c"
} | {
"account_age_days": 253,
"account_id": "ACCT-4B8973DA102E",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.895
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1056,
"timestamp": "2026-01-07T10:34:00Z",
"transaction_amount_usd": 6102.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3183.66,
"financial_exposure_usd": 3404.25,
"recoverable_pct": 0.418
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104279",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-03T23:19:00Z",
"trace_id": "80741eae-96bb-9806-b417-6d33aca8d96b"
} | {
"account_age_days": 1089,
"account_id": "ACCT-5A6CB214B3FA",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_2",
"session_entropy": 0.631
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 698,
"timestamp": "2026-01-03T23:19:00Z",
"transaction_amount_usd": 207186.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1926591.14,
"financial_exposure_usd": 4116189.57,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100977",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "critical",
"timestamp": "2026-01-01T16:17:00Z",
"trace_id": "e3c92605-20aa-25d8-3e08-4e456603035a"
} | {
"account_age_days": 1553,
"account_id": "ACCT-035F5E9DE136",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_1",
"session_entropy": 0.192
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1106,
"timestamp": "2026-01-01T16:17:00Z",
"transaction_amount_usd": 38818.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 229244.92,
"financial_exposure_usd": 568455.47,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103547",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "critical",
"timestamp": "2026-01-03T11:07:00Z",
"trace_id": "ee8ad662-ca76-d690-037c-33fee457f5b8"
} | {
"account_age_days": 1984,
"account_id": "ACCT-F46F20D1C0BD",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 617,
"timestamp": "2026-01-03T11:07:00Z",
"transaction_amount_usd": 2994886.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2540019.88,
"financial_exposure_usd": 4391438.21,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107706",
"label": "benign",
"label_confidence": 0.493,
"severity": "high",
"timestamp": "2026-01-06T08:26:00Z",
"trace_id": "5ee1d727-0d3d-53e7-e1a9-04ef883ed51e"
} | {
"account_age_days": 1884,
"account_id": "ACCT-6B46DA361D9C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1103,
"timestamp": "2026-01-06T08:26:00Z",
"transaction_amount_usd": 7880.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1910.59,
"financial_exposure_usd": 2550.67,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109793",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-07T19:13:00Z",
"trace_id": "25769f85-7288-ac1d-fde1-717a182ed255"
} | {
"account_age_days": 1736,
"account_id": "ACCT-2EAD86EE8AAB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.843
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 636,
"timestamp": "2026-01-07T19:13:00Z",
"transaction_amount_usd": 7995.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 740.36,
"financial_exposure_usd": 1289,
"recoverable_pct": 0.932
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103222",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-03T05:42:00Z",
"trace_id": "af03ad47-a2d9-7306-299a-2b949ffec052"
} | {
"account_age_days": 595,
"account_id": "ACCT-F4799CC5AF40",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 542,
"timestamp": "2026-01-03T05:42:00Z",
"transaction_amount_usd": 36801.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 491093.23,
"financial_exposure_usd": 761279.75,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105079",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-04T12:39:00Z",
"trace_id": "3a792770-6085-a92e-5775-15e2a5426350"
} | {
"account_age_days": 359,
"account_id": "ACCT-20756DC352A5",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.165
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1171,
"timestamp": "2026-01-04T12:39:00Z",
"transaction_amount_usd": 1518070.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.577,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3433354.25,
"financial_exposure_usd": 3531125.5,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105994",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-05T03:54:00Z",
"trace_id": "eb4d4f51-0a7b-56b7-c2f9-d554ba71d252"
} | {
"account_age_days": 341,
"account_id": "ACCT-6B0351840949",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 837,
"timestamp": "2026-01-05T03:54:00Z",
"transaction_amount_usd": 2284328.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3126218.25,
"financial_exposure_usd": 5984193.82,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105530",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-04T20:10:00Z",
"trace_id": "42f758e3-5747-7285-fb8e-198261383fe1"
} | {
"account_age_days": 171,
"account_id": "ACCT-E5D3820313D9",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 709,
"timestamp": "2026-01-04T20:10:00Z",
"transaction_amount_usd": 2517806.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.591,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2744281.85,
"financial_exposure_usd": 4279525.36,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108519",
"label": "benign",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-06T21:59:00Z",
"trace_id": "2efa9b81-ceca-37e8-1396-fe29305a3232"
} | {
"account_age_days": 1877,
"account_id": "ACCT-23B135F0660F",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 290,
"timestamp": "2026-01-06T12:29:00Z",
"transaction_amount_usd": 3.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2383.68,
"financial_exposure_usd": 2677.39,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101412",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-01T23:32:00Z",
"trace_id": "9bf8fe15-f383-b76a-06b5-e33b225b33cc"
} | {
"account_age_days": 1930,
"account_id": "ACCT-8548645E68A3",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.899
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 829,
"timestamp": "2026-01-01T23:32:00Z",
"transaction_amount_usd": 19208.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.766,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 794723.22,
"financial_exposure_usd": 814306.27,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103131",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-03T04:11:00Z",
"trace_id": "db700843-e24a-23ec-0341-d73186ef925b"
} | {
"account_age_days": 1681,
"account_id": "ACCT-9F9B71F92E26",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 207,
"timestamp": "2026-01-02T16:34:00Z",
"transaction_amount_usd": 7.17
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 898263.27,
"financial_exposure_usd": 989386.54,
"recoverable_pct": 0.377
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107291",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-06T01:31:00Z",
"trace_id": "8db00c6b-c752-20f2-e9b7-9e47e174b63f"
} | {
"account_age_days": 637,
"account_id": "ACCT-01F5CFFFEF36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.64
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 195,
"timestamp": "2026-01-06T01:31:00Z",
"transaction_amount_usd": 1861.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 704.1,
"financial_exposure_usd": 1540.74,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102273",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "low",
"timestamp": "2026-01-02T13:53:00Z",
"trace_id": "b1462f08-c044-9ed3-26fb-49c2a01df13b"
} | {
"account_age_days": 724,
"account_id": "ACCT-71551F377299",
"baseline_risk_score": 0.453,
"kyc_tier": "tier_2",
"session_entropy": 0.778
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 214,
"timestamp": "2026-01-02T12:09:00Z",
"transaction_amount_usd": 12.72
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.79,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 202460.84,
"financial_exposure_usd": 274863.22,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101016",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "low",
"timestamp": "2026-01-01T16:56:00Z",
"trace_id": "6c32e305-049a-d3ea-b3c1-e9690bb05c94"
} | {
"account_age_days": 1900,
"account_id": "ACCT-85574E06E0DE",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1126,
"timestamp": "2026-01-01T16:56:00Z",
"transaction_amount_usd": 72433.41
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.493,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 406262.93,
"financial_exposure_usd": 537013.79,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101554",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-02T01:54:00Z",
"trace_id": "d1d798f1-96f0-2aa2-6b2e-6945b620c496"
} | {
"account_age_days": 361,
"account_id": "ACCT-3D98E117634E",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_2",
"session_entropy": 0.348
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 195,
"timestamp": "2026-01-01T18:22:00Z",
"transaction_amount_usd": 22.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.404,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 341542.88,
"financial_exposure_usd": 559123.48,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105477",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "medium",
"timestamp": "2026-01-04T19:17:00Z",
"trace_id": "e4d4a210-f483-88b4-490f-efbfb45eba06"
} | {
"account_age_days": 1707,
"account_id": "ACCT-53480CE380CB",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.774
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1143,
"timestamp": "2026-01-04T19:17:00Z",
"transaction_amount_usd": 2445357.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.56,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5307275.72,
"financial_exposure_usd": 8329734.51,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105029",
"label": "fraudulent",
"label_confidence": 0.71,
"severity": "medium",
"timestamp": "2026-01-04T11:49:00Z",
"trace_id": "f49d6b13-a085-bbd9-def8-5aadf4bea23e"
} | {
"account_age_days": 999,
"account_id": "ACCT-D8066A5A1772",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.617
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 928,
"timestamp": "2026-01-04T11:49:00Z",
"transaction_amount_usd": 1469651.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6689782.68,
"financial_exposure_usd": 9381433.79,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107366",
"label": "benign",
"label_confidence": 0.621,
"severity": "low",
"timestamp": "2026-01-06T02:46:00Z",
"trace_id": "fb1f76a8-97a5-f505-7fc1-bfdc0ee0c265"
} | {
"account_age_days": 1340,
"account_id": "ACCT-2F0D669969DC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.271
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1190,
"timestamp": "2026-01-06T02:46:00Z",
"transaction_amount_usd": 7023.35
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3969.04,
"financial_exposure_usd": 6128.64,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103744",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-03T14:24:00Z",
"trace_id": "8574e5ab-4b85-9139-e64d-c0d6709f4f43"
} | {
"account_age_days": 1997,
"account_id": "ACCT-DA2E3FF4E91B",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 235,
"timestamp": "2026-01-03T03:06:00Z",
"transaction_amount_usd": 24.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.753,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3531134.03,
"financial_exposure_usd": 6138050.66,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104883",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-04T09:23:00Z",
"trace_id": "703cc01b-4909-7f29-b1e4-6886a4ddfe62"
} | {
"account_age_days": 1017,
"account_id": "ACCT-13F4164B2544",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 996,
"timestamp": "2026-01-04T09:23:00Z",
"transaction_amount_usd": 766599.38
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3110088.34,
"financial_exposure_usd": 5106602.93,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101965",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-02T08:45:00Z",
"trace_id": "a844215a-3f10-a0ad-ee99-9ad24de48bf2"
} | {
"account_age_days": 1359,
"account_id": "ACCT-475ECA546E1B",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_1",
"session_entropy": 0.294
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 891,
"timestamp": "2026-01-02T08:45:00Z",
"transaction_amount_usd": 80815.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 619190.26,
"financial_exposure_usd": 761278.85,
"recoverable_pct": 0.204
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102090",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-02T10:50:00Z",
"trace_id": "97da3d52-36ff-3c67-6645-2877138b64f3"
} | {
"account_age_days": 1787,
"account_id": "ACCT-005DA6E3ABD2",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_3",
"session_entropy": 0.288
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1153,
"timestamp": "2026-01-02T10:50:00Z",
"transaction_amount_usd": 81408.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.578,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 661068.09,
"financial_exposure_usd": 768379.13,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104349",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "critical",
"timestamp": "2026-01-04T00:29:00Z",
"trace_id": "e0d13e49-6c0a-736a-566e-4890ce76cfb4"
} | {
"account_age_days": 179,
"account_id": "ACCT-A76B01DED98E",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.296
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 221,
"timestamp": "2026-01-03T17:52:00Z",
"transaction_amount_usd": 20.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.712,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1564660.11,
"financial_exposure_usd": 3907209.21,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104723",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-04T06:43:00Z",
"trace_id": "2d920f6a-a633-3cd4-d124-c5321887ffdd"
} | {
"account_age_days": 33,
"account_id": "ACCT-4A5158B3B62B",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.814
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 448,
"timestamp": "2026-01-04T06:43:00Z",
"transaction_amount_usd": 958712.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2937221.23,
"financial_exposure_usd": 6563821.55,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108878",
"label": "benign",
"label_confidence": 0.582,
"severity": "low",
"timestamp": "2026-01-07T03:58:00Z",
"trace_id": "0687aed0-77f1-3b48-b24d-48638bb147e4"
} | {
"account_age_days": 863,
"account_id": "ACCT-870FA21BF18A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.828
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 84,
"timestamp": "2026-01-06T22:44:00Z",
"transaction_amount_usd": 15.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 377.31,
"financial_exposure_usd": 540.9,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106443",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "low",
"timestamp": "2026-01-05T11:23:00Z",
"trace_id": "55159837-2299-9165-ccd1-eced133f62af"
} | {
"account_age_days": 951,
"account_id": "ACCT-1B355E50039B",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 252,
"timestamp": "2026-01-05T06:18:00Z",
"transaction_amount_usd": 14.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.636,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2879906.26,
"financial_exposure_usd": 4094025.64,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101466",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "low",
"timestamp": "2026-01-02T00:26:00Z",
"trace_id": "efb8dcd5-886d-7a41-c638-28e21591df25"
} | {
"account_age_days": 959,
"account_id": "ACCT-85F33A2F9CD4",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_3",
"session_entropy": 0.639
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 270,
"timestamp": "2026-01-01T13:57:00Z",
"transaction_amount_usd": 9.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 471249.03,
"financial_exposure_usd": 688730.31,
"recoverable_pct": 0.241
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107302",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-06T01:42:00Z",
"trace_id": "d3166a56-60a8-54ce-7a34-ff6fae067ac5"
} | {
"account_age_days": 1412,
"account_id": "ACCT-AAA0D8DB591F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.318
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 750,
"timestamp": "2026-01-06T01:42:00Z",
"transaction_amount_usd": 6713.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4604.51,
"financial_exposure_usd": 7840.83,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102347",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-02T15:07:00Z",
"trace_id": "1e5b8116-f5ac-b6f3-120a-dd1ba55a3aa4"
} | {
"account_age_days": 249,
"account_id": "ACCT-6D214CB5EC16",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_1",
"session_entropy": 0.581
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 760,
"timestamp": "2026-01-02T15:07:00Z",
"transaction_amount_usd": 117615.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 219129.39,
"financial_exposure_usd": 529965.5,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103407",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-03T08:47:00Z",
"trace_id": "7f36c057-21e8-107a-8985-c51ac051b911"
} | {
"account_age_days": 175,
"account_id": "ACCT-A63C84FDAC9F",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_3",
"session_entropy": 0.545
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1153,
"timestamp": "2026-01-03T08:47:00Z",
"transaction_amount_usd": 1593688.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.866,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5272024.31,
"financial_exposure_usd": 7674837.27,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103383",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-03T08:23:00Z",
"trace_id": "bac1c81f-baf2-8b91-b0c0-40adb14bcbd0"
} | {
"account_age_days": 1637,
"account_id": "ACCT-616E6F1FB277",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.677
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 722,
"timestamp": "2026-01-03T08:23:00Z",
"transaction_amount_usd": 2506483.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3577579.62,
"financial_exposure_usd": 4418022.94,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103951",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-03T17:51:00Z",
"trace_id": "176602b1-016c-6372-5f1d-27bb07cd1001"
} | {
"account_age_days": 369,
"account_id": "ACCT-187F3955D623",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_3",
"session_entropy": 0.593
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 376,
"timestamp": "2026-01-03T12:05:00Z",
"transaction_amount_usd": 17.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.838,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1629986.62,
"financial_exposure_usd": 2551533.74,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100511",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-01T08:31:00Z",
"trace_id": "f0294048-c747-9b4f-0bd5-7513e31d5f0f"
} | {
"account_age_days": 930,
"account_id": "ACCT-C1840A08C0B0",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.45
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1152,
"timestamp": "2026-01-01T08:31:00Z",
"transaction_amount_usd": 29487.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 534252.79,
"financial_exposure_usd": 575451.16,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101847",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-02T06:47:00Z",
"trace_id": "59e6faa1-4eff-6b20-d94b-9f59a29001f9"
} | {
"account_age_days": 1893,
"account_id": "ACCT-E7E722C14E1B",
"baseline_risk_score": 0.462,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 704,
"timestamp": "2026-01-02T06:47:00Z",
"transaction_amount_usd": 71501.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 594926.37,
"financial_exposure_usd": 922953.11,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105392",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "critical",
"timestamp": "2026-01-04T17:52:00Z",
"trace_id": "71657128-2e4b-6141-6d98-b4d2d8fb34a6"
} | {
"account_age_days": 511,
"account_id": "ACCT-4C9D5D7933C1",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 122,
"timestamp": "2026-01-04T07:39:00Z",
"transaction_amount_usd": 19.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1809549.31,
"financial_exposure_usd": 4112652.52,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103237",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-03T05:57:00Z",
"trace_id": "dd3f9242-26df-923c-df15-a90eba544d52"
} | {
"account_age_days": 832,
"account_id": "ACCT-C0B3C0AF0147",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_2",
"session_entropy": 0.487
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 704,
"timestamp": "2026-01-03T05:57:00Z",
"transaction_amount_usd": 64835.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 79618.87,
"financial_exposure_usd": 173432.29,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109860",
"label": "benign",
"label_confidence": 0.574,
"severity": "low",
"timestamp": "2026-01-07T20:20:00Z",
"trace_id": "4911ba50-7d0b-ec7f-bd7b-e5a3d9451f6b"
} | {
"account_age_days": 1735,
"account_id": "ACCT-6207A4AE14B8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.888
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1058,
"timestamp": "2026-01-07T20:20:00Z",
"transaction_amount_usd": 8159.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.704,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4635.84,
"financial_exposure_usd": 5304.9,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103793",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-03T15:13:00Z",
"trace_id": "0ce5b38e-0e45-4e26-40f5-daef58db14e7"
} | {
"account_age_days": 1729,
"account_id": "ACCT-EA3F3D487FE1",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 964,
"timestamp": "2026-01-03T15:13:00Z",
"transaction_amount_usd": 1227706.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.385,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5052013.63,
"financial_exposure_usd": 6902248.64,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105763",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-05T00:03:00Z",
"trace_id": "3ac40632-018f-c370-0e33-11a1cea75345"
} | {
"account_age_days": 628,
"account_id": "ACCT-B14283B5DFB8",
"baseline_risk_score": 0.242,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 358,
"timestamp": "2026-01-05T00:03:00Z",
"transaction_amount_usd": 2368028.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2059830.79,
"financial_exposure_usd": 4121036.38,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105231",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "low",
"timestamp": "2026-01-04T15:11:00Z",
"trace_id": "9cee3444-2420-dad4-a678-5f2304c35b6b"
} | {
"account_age_days": 65,
"account_id": "ACCT-DC94F8894D9F",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 153,
"timestamp": "2026-01-04T15:11:00Z",
"transaction_amount_usd": 419107.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2801164.23,
"financial_exposure_usd": 3312589.93,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102523",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-02T18:03:00Z",
"trace_id": "e979b992-729d-5361-70df-fe6c47674e52"
} | {
"account_age_days": 587,
"account_id": "ACCT-B6C622CF7809",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_3",
"session_entropy": 0.775
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 901,
"timestamp": "2026-01-02T18:03:00Z",
"transaction_amount_usd": 98736.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.487,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 997831.15,
"financial_exposure_usd": 1280383.88,
"recoverable_pct": 0.175
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108838",
"label": "benign",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-07T03:18:00Z",
"trace_id": "58521425-565a-d65a-ff76-179258e4aa07"
} | {
"account_age_days": 1525,
"account_id": "ACCT-9BE11E1E2C78",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.31
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 162,
"timestamp": "2026-01-07T03:18:00Z",
"transaction_amount_usd": 5332.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1747.39,
"financial_exposure_usd": 2377.15,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100446",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "low",
"timestamp": "2026-01-01T07:26:00Z",
"trace_id": "a91be945-4bc0-e6a0-199f-558274073b46"
} | {
"account_age_days": 57,
"account_id": "ACCT-D625E7CDAF79",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_3",
"session_entropy": 0.131
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 804,
"timestamp": "2026-01-01T07:26:00Z",
"transaction_amount_usd": 25915.28
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 461768.94,
"financial_exposure_usd": 800024.34,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107123",
"label": "benign",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-05T22:43:00Z",
"trace_id": "6f8ef9da-2afc-0a88-4553-b11148612bb9"
} | {
"account_age_days": 921,
"account_id": "ACCT-19D4D98AC052",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.551
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 82,
"timestamp": "2026-01-05T22:43:00Z",
"transaction_amount_usd": 7137.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 656.06,
"financial_exposure_usd": 1215.18,
"recoverable_pct": 0.973
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101049",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-01T17:29:00Z",
"trace_id": "9ebdf552-9ded-2282-dd8b-99ad30aff761"
} | {
"account_age_days": 1166,
"account_id": "ACCT-27BC843B2EDF",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.409
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1182,
"timestamp": "2026-01-01T17:29:00Z",
"transaction_amount_usd": 28296.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.65,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 289970.82,
"financial_exposure_usd": 294410.28,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100884",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "medium",
"timestamp": "2026-01-01T14:44:00Z",
"trace_id": "554204c2-e0af-e4e0-4bab-057a1690f9ea"
} | {
"account_age_days": 42,
"account_id": "ACCT-B9EA38A5D596",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_3",
"session_entropy": 0.516
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 126,
"timestamp": "2026-01-01T14:44:00Z",
"transaction_amount_usd": 34133.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.504,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 745109.94,
"financial_exposure_usd": 1117747.68,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103480",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "medium",
"timestamp": "2026-01-03T10:00:00Z",
"trace_id": "80fafb6a-feb7-57c5-92e8-5963b8f2f2ef"
} | {
"account_age_days": 189,
"account_id": "ACCT-AE219AA0AB77",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 114,
"timestamp": "2026-01-03T07:15:00Z",
"transaction_amount_usd": 13.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.658,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4217734.27,
"financial_exposure_usd": 5189449.36,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102030",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "high",
"timestamp": "2026-01-02T09:50:00Z",
"trace_id": "33a21759-4688-5e33-b10b-737d20695dd6"
} | {
"account_age_days": 1738,
"account_id": "ACCT-385814B5D2C3",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_2",
"session_entropy": 0.868
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 159,
"timestamp": "2026-01-02T09:50:00Z",
"transaction_amount_usd": 49222.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.679,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 251458.73,
"financial_exposure_usd": 396935.98,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105696",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-04T22:56:00Z",
"trace_id": "cfcbebe5-71d3-0b4c-5e7d-aa9b70e8194f"
} | {
"account_age_days": 1762,
"account_id": "ACCT-5E983C522555",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.661
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 372,
"timestamp": "2026-01-04T22:56:00Z",
"transaction_amount_usd": 1977826.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2362149.19,
"financial_exposure_usd": 3943288.53,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105277",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-04T15:57:00Z",
"trace_id": "e7512204-bd46-955b-7b0e-48f68dfad9ea"
} | {
"account_age_days": 1425,
"account_id": "ACCT-58EE1243BC7F",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.17
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 344,
"timestamp": "2026-01-04T15:57:00Z",
"transaction_amount_usd": 2822791.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1758394.56,
"financial_exposure_usd": 3369849.77,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100728",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-01T12:08:00Z",
"trace_id": "f0b31c9b-5970-bdad-9f26-553c5e17df4a"
} | {
"account_age_days": 1435,
"account_id": "ACCT-6A92774DA4B8",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 875,
"timestamp": "2026-01-01T12:08:00Z",
"transaction_amount_usd": 51384.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.361,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 693593.47,
"financial_exposure_usd": 702755.92,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.