schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109407",
"label": "benign",
"label_confidence": 0.489,
"severity": "low",
"timestamp": "2026-01-07T12:47:00Z",
"trace_id": "32fe1b98-ab53-5201-1b62-87295ea4a8a6"
} | {
"account_age_days": 1285,
"account_id": "ACCT-D70D26758068",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.748
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1187,
"timestamp": "2026-01-07T12:47:00Z",
"transaction_amount_usd": 6369.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1998.53,
"financial_exposure_usd": 3839.82,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109520",
"label": "benign",
"label_confidence": 0.484,
"severity": "high",
"timestamp": "2026-01-07T14:40:00Z",
"trace_id": "fe9322b9-3472-00d7-482f-ad25903c52ca"
} | {
"account_age_days": 1335,
"account_id": "ACCT-2E86AFDD1BA3",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.577
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 235,
"timestamp": "2026-01-07T13:22:00Z",
"transaction_amount_usd": 5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1778.61,
"financial_exposure_usd": 1817.36,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104784",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-04T07:44:00Z",
"trace_id": "7664667a-2437-3914-b624-6a69f97a05af"
} | {
"account_age_days": 63,
"account_id": "ACCT-65A0D8562837",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_1",
"session_entropy": 0.873
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 910,
"timestamp": "2026-01-04T07:44:00Z",
"transaction_amount_usd": 949710.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2344836.14,
"financial_exposure_usd": 2350242.55,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105737",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "medium",
"timestamp": "2026-01-04T23:37:00Z",
"trace_id": "b60f19bd-137a-1687-1887-94db425f1e6c"
} | {
"account_age_days": 553,
"account_id": "ACCT-471985F5514C",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_1",
"session_entropy": 0.876
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1132,
"timestamp": "2026-01-04T23:37:00Z",
"transaction_amount_usd": 1955781.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.823,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1974423.62,
"financial_exposure_usd": 4165322.16,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100162",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "critical",
"timestamp": "2026-01-01T02:42:00Z",
"trace_id": "81c974a0-ed6a-e39f-b560-4484937749f6"
} | {
"account_age_days": 1661,
"account_id": "ACCT-18A0F6C0AB2D",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_1",
"session_entropy": 0.273
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 906,
"timestamp": "2026-01-01T02:42:00Z",
"transaction_amount_usd": 15965.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.566,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 773233.57,
"financial_exposure_usd": 1043532.46,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102056",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "critical",
"timestamp": "2026-01-02T10:16:00Z",
"trace_id": "2e848f12-756f-0082-d592-996bca0cb810"
} | {
"account_age_days": 1426,
"account_id": "ACCT-9AB4D54DC5CF",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_3",
"session_entropy": 0.6
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 219,
"timestamp": "2026-01-02T10:16:00Z",
"transaction_amount_usd": 21081.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 426793.27,
"financial_exposure_usd": 843452.53,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104154",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-03T21:14:00Z",
"trace_id": "acf05615-b040-adec-7796-e50c18c707c9"
} | {
"account_age_days": 1037,
"account_id": "ACCT-92546656CA19",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_3",
"session_entropy": 0.438
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 496,
"timestamp": "2026-01-03T21:14:00Z",
"transaction_amount_usd": 1020220.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3958245.99,
"financial_exposure_usd": 6130441.06,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104929",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "low",
"timestamp": "2026-01-04T10:09:00Z",
"trace_id": "cd1fdeb6-a83d-4469-85c1-3d7a35ba3fec"
} | {
"account_age_days": 1823,
"account_id": "ACCT-439C8EBB4CFD",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_2",
"session_entropy": 0.463
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 769,
"timestamp": "2026-01-04T10:09:00Z",
"transaction_amount_usd": 364909.46
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.94,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4925367.47,
"financial_exposure_usd": 5858191,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106541",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-05T13:01:00Z",
"trace_id": "7a3aefd4-3f86-3283-568f-3e729aaacf57"
} | {
"account_age_days": 1586,
"account_id": "ACCT-9071B27C2F14",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_1",
"session_entropy": 0.504
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 643,
"timestamp": "2026-01-05T13:01:00Z",
"transaction_amount_usd": 2522518.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4412879.53,
"financial_exposure_usd": 6122690.23,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103022",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-03T02:22:00Z",
"trace_id": "242c5016-bf90-4efb-5ee0-2b4de2fc8077"
} | {
"account_age_days": 1143,
"account_id": "ACCT-C6E96B9CFC78",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_2",
"session_entropy": 0.667
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 930,
"timestamp": "2026-01-03T02:22:00Z",
"transaction_amount_usd": 26145.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 361666.69,
"financial_exposure_usd": 642554.61,
"recoverable_pct": 0.086
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101997",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-02T09:17:00Z",
"trace_id": "55ee1dd6-f367-4ccd-8162-432d69f6f223"
} | {
"account_age_days": 1980,
"account_id": "ACCT-359C1E11D2A8",
"baseline_risk_score": 0.62,
"kyc_tier": "tier_3",
"session_entropy": 0.853
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 826,
"timestamp": "2026-01-02T09:17:00Z",
"transaction_amount_usd": 51453.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.595,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 401864.03,
"financial_exposure_usd": 535636.75,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100109",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-01T01:49:00Z",
"trace_id": "cd14eacb-7da8-0631-4c6d-8ddd1edfc59e"
} | {
"account_age_days": 1613,
"account_id": "ACCT-A95D3271BD92",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_1",
"session_entropy": 0.493
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 276,
"timestamp": "2026-01-01T01:49:00Z",
"transaction_amount_usd": 110643.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 730556.73,
"financial_exposure_usd": 788892.82,
"recoverable_pct": 0.253
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107099",
"label": "benign",
"label_confidence": 0.685,
"severity": "critical",
"timestamp": "2026-01-05T22:19:00Z",
"trace_id": "6717a88d-8f33-c150-90f7-08d26742e5a5"
} | {
"account_age_days": 1429,
"account_id": "ACCT-D82529912FBC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 789,
"timestamp": "2026-01-05T22:19:00Z",
"transaction_amount_usd": 7245.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.523,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2128.46,
"financial_exposure_usd": 3060.3,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103624",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-03T12:24:00Z",
"trace_id": "2bcd9201-7ef0-cc67-aa45-a76328f5c7e6"
} | {
"account_age_days": 1236,
"account_id": "ACCT-D6ADDFFB986C",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 169,
"timestamp": "2026-01-03T07:53:00Z",
"transaction_amount_usd": 18.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.645,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3185923.54,
"financial_exposure_usd": 4300920.89,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105456",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "high",
"timestamp": "2026-01-04T18:56:00Z",
"trace_id": "04c07a86-1899-a24f-7860-ade794c82884"
} | {
"account_age_days": 1662,
"account_id": "ACCT-39ABD2188C04",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.936
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 160,
"timestamp": "2026-01-04T15:00:00Z",
"transaction_amount_usd": 18.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.391,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1430559.33,
"financial_exposure_usd": 2602315.66,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107402",
"label": "benign",
"label_confidence": 0.723,
"severity": "medium",
"timestamp": "2026-01-06T03:22:00Z",
"trace_id": "93194189-7f6c-a8c0-3adb-50eab5ee1b22"
} | {
"account_age_days": 967,
"account_id": "ACCT-E387EED5965D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 217,
"timestamp": "2026-01-06T03:22:00Z",
"transaction_amount_usd": 4674.02
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4079.29,
"financial_exposure_usd": 4428.09,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108710",
"label": "benign",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-07T01:10:00Z",
"trace_id": "ae045cf5-76dd-16b9-c34f-0e9162abaef5"
} | {
"account_age_days": 1236,
"account_id": "ACCT-9F602A7ACD95",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.553
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 773,
"timestamp": "2026-01-07T01:10:00Z",
"transaction_amount_usd": 9764.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 588.24,
"financial_exposure_usd": 689.52,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107892",
"label": "benign",
"label_confidence": 0.586,
"severity": "medium",
"timestamp": "2026-01-06T11:32:00Z",
"trace_id": "cb8464e3-806a-88c9-8bdd-1461025ea494"
} | {
"account_age_days": 820,
"account_id": "ACCT-4061AF14A234",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.271
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 174,
"timestamp": "2026-01-06T11:32:00Z",
"transaction_amount_usd": 13354.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1404.92,
"financial_exposure_usd": 2927.49,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105582",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-04T21:02:00Z",
"trace_id": "e010fdea-94a5-78b1-aed8-afa3165e59de"
} | {
"account_age_days": 679,
"account_id": "ACCT-6306CC0C760D",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_3",
"session_entropy": 0.879
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 147,
"timestamp": "2026-01-04T10:41:00Z",
"transaction_amount_usd": 17.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.64,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5985109.85,
"financial_exposure_usd": 7791695.53,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109711",
"label": "benign",
"label_confidence": 0.661,
"severity": "low",
"timestamp": "2026-01-07T17:51:00Z",
"trace_id": "a074e54b-f7d4-f0b7-98db-4e78a63edf24"
} | {
"account_age_days": 315,
"account_id": "ACCT-6D3D301E247D",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_3",
"session_entropy": 0.634
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 931,
"timestamp": "2026-01-07T17:51:00Z",
"transaction_amount_usd": 6691.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 3079.14,
"financial_exposure_usd": 4673.53,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100224",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "medium",
"timestamp": "2026-01-01T03:44:00Z",
"trace_id": "b504cdaf-1708-7003-3a84-3b35c2bde805"
} | {
"account_age_days": 1178,
"account_id": "ACCT-9BE5662ADC97",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_2",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 156,
"timestamp": "2026-01-01T00:08:00Z",
"transaction_amount_usd": 23.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 619888.51,
"financial_exposure_usd": 750356.34,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105700",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-04T23:00:00Z",
"trace_id": "01802346-d476-45b4-660b-adf36fee9f93"
} | {
"account_age_days": 712,
"account_id": "ACCT-75E5544D6A7D",
"baseline_risk_score": 0.207,
"kyc_tier": "tier_3",
"session_entropy": 0.604
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 782,
"timestamp": "2026-01-04T23:00:00Z",
"transaction_amount_usd": 852505.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1769680.05,
"financial_exposure_usd": 2941743.62,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101085",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-01T18:05:00Z",
"trace_id": "905cd29b-e61a-d835-18e2-556c05e25e04"
} | {
"account_age_days": 1137,
"account_id": "ACCT-A498667A2F4A",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_3",
"session_entropy": 0.577
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 427,
"timestamp": "2026-01-01T18:05:00Z",
"transaction_amount_usd": 6054.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 442859.74,
"financial_exposure_usd": 602672.24,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102121",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-02T11:21:00Z",
"trace_id": "eda5dd04-bd65-491a-89b9-042f1980fd77"
} | {
"account_age_days": 1557,
"account_id": "ACCT-7D930D5E2175",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 358,
"timestamp": "2026-01-02T09:15:00Z",
"transaction_amount_usd": 17.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.673,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 601837.15,
"financial_exposure_usd": 753058.94,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102404",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "low",
"timestamp": "2026-01-02T16:04:00Z",
"trace_id": "c2d275ed-0d8c-c1a6-bd3e-0e8fc70ec6ab"
} | {
"account_age_days": 81,
"account_id": "ACCT-5A036B68C87D",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 206,
"timestamp": "2026-01-02T09:13:00Z",
"transaction_amount_usd": 21.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.689,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 440371.46,
"financial_exposure_usd": 938199.45,
"recoverable_pct": 0.07
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109680",
"label": "benign",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-07T17:20:00Z",
"trace_id": "0323b3e4-8fb4-1a38-4161-70913d959d9f"
} | {
"account_age_days": 87,
"account_id": "ACCT-EA4343C34466",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.647
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 930,
"timestamp": "2026-01-07T17:20:00Z",
"transaction_amount_usd": 13440.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.559,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1608.06,
"financial_exposure_usd": 1788.01,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102630",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "low",
"timestamp": "2026-01-02T19:50:00Z",
"trace_id": "e63e1d81-dde8-58cf-089f-c5b6f72883f8"
} | {
"account_age_days": 772,
"account_id": "ACCT-E46EF997C053",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_3",
"session_entropy": 0.92
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 195,
"timestamp": "2026-01-02T19:50:00Z",
"transaction_amount_usd": 42420.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.519,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 422007.94,
"financial_exposure_usd": 501143.08,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104059",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "medium",
"timestamp": "2026-01-03T19:39:00Z",
"trace_id": "9a694bab-fb90-fd86-ada0-3cb586e915aa"
} | {
"account_age_days": 1640,
"account_id": "ACCT-FBF9F5C5BA36",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_1",
"session_entropy": 0.627
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 116,
"timestamp": "2026-01-03T11:49:00Z",
"transaction_amount_usd": 10.01
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3905688.3,
"financial_exposure_usd": 8526271.48,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107303",
"label": "benign",
"label_confidence": 0.495,
"severity": "low",
"timestamp": "2026-01-06T01:43:00Z",
"trace_id": "ee950ead-0652-697e-67d6-fb592d85ffb4"
} | {
"account_age_days": 728,
"account_id": "ACCT-4B1E1D0FB742",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_2",
"session_entropy": 0.285
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 339,
"timestamp": "2026-01-05T23:19:00Z",
"transaction_amount_usd": 3.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1109.46,
"financial_exposure_usd": 1594.59,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107288",
"label": "benign",
"label_confidence": 0.548,
"severity": "low",
"timestamp": "2026-01-06T01:28:00Z",
"trace_id": "7323aecc-158d-dd14-0f3a-d63f4a07b132"
} | {
"account_age_days": 332,
"account_id": "ACCT-BED65162F709",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 555,
"timestamp": "2026-01-06T01:28:00Z",
"transaction_amount_usd": 10713.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5352.73,
"financial_exposure_usd": 6434.9,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109124",
"label": "benign",
"label_confidence": 0.606,
"severity": "medium",
"timestamp": "2026-01-07T08:04:00Z",
"trace_id": "08480c89-6b3c-7f8a-fc52-91b5c26733f1"
} | {
"account_age_days": 1258,
"account_id": "ACCT-1A2E74FBFC36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.276
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 155,
"timestamp": "2026-01-07T05:44:00Z",
"transaction_amount_usd": 4.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3935.74,
"financial_exposure_usd": 6720.27,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105862",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "critical",
"timestamp": "2026-01-05T01:42:00Z",
"trace_id": "216c6069-8ef9-8994-982e-faa41ca0854c"
} | {
"account_age_days": 489,
"account_id": "ACCT-CABB02F4CC27",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.641
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 206,
"timestamp": "2026-01-04T19:59:00Z",
"transaction_amount_usd": 14.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2082017.17,
"financial_exposure_usd": 3444137.43,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105749",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "medium",
"timestamp": "2026-01-04T23:49:00Z",
"trace_id": "960cd477-1c2b-a82e-e62a-5272666ac8e0"
} | {
"account_age_days": 808,
"account_id": "ACCT-C745C0D3DB44",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.543
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 687,
"timestamp": "2026-01-04T23:49:00Z",
"transaction_amount_usd": 463117.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.712,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1598358.25,
"financial_exposure_usd": 3293250.33,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109459",
"label": "benign",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-07T13:39:00Z",
"trace_id": "b8d463af-4d9f-a931-b51d-1f029d08058c"
} | {
"account_age_days": 1558,
"account_id": "ACCT-B6F86A0E0E75",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.297
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 727,
"timestamp": "2026-01-07T13:39:00Z",
"transaction_amount_usd": 1637.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4005.02,
"financial_exposure_usd": 5833.85,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100677",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "critical",
"timestamp": "2026-01-01T11:17:00Z",
"trace_id": "9c0d9f90-71b9-0705-3e4b-fb1fab50b0cd"
} | {
"account_age_days": 1674,
"account_id": "ACCT-6716FB3F5468",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.258
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 364,
"timestamp": "2025-12-31T23:59:00Z",
"transaction_amount_usd": 23.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 989322.41,
"financial_exposure_usd": 1204168.54,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107088",
"label": "benign",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-05T22:08:00Z",
"trace_id": "eee363ee-6cf0-2de0-ab22-c8f03f9c0faf"
} | {
"account_age_days": 679,
"account_id": "ACCT-CD2913361D66",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.876
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 120,
"timestamp": "2026-01-05T17:10:00Z",
"transaction_amount_usd": 0.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1049.84,
"financial_exposure_usd": 1166.3,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108464",
"label": "benign",
"label_confidence": 0.458,
"severity": "low",
"timestamp": "2026-01-06T21:04:00Z",
"trace_id": "5c2a4033-a552-6e3d-f91c-bb0cdfcdeceb"
} | {
"account_age_days": 69,
"account_id": "ACCT-009209BAFD6E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.224
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1058,
"timestamp": "2026-01-06T21:04:00Z",
"transaction_amount_usd": 11416.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2597.94,
"financial_exposure_usd": 2664.67,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108476",
"label": "benign",
"label_confidence": 0.585,
"severity": "medium",
"timestamp": "2026-01-06T21:16:00Z",
"trace_id": "ce4da96d-a0da-05ba-5f7b-83c3d20c92ba"
} | {
"account_age_days": 359,
"account_id": "ACCT-5AF110F29AB5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.135
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 499,
"timestamp": "2026-01-06T21:16:00Z",
"transaction_amount_usd": 4045.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1280.35,
"financial_exposure_usd": 1464.97,
"recoverable_pct": 0.973
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100308",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "medium",
"timestamp": "2026-01-01T05:08:00Z",
"trace_id": "79a7e05a-8b16-0a4d-7adb-f90e2c910cd0"
} | {
"account_age_days": 351,
"account_id": "ACCT-4A5ED28785A6",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_3",
"session_entropy": 0.869
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 142,
"timestamp": "2026-01-01T00:48:00Z",
"transaction_amount_usd": 1.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.584,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 430996.16,
"financial_exposure_usd": 558609.42,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102770",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "low",
"timestamp": "2026-01-02T22:10:00Z",
"trace_id": "2ca1e3fd-4169-ce44-31aa-98539812e2b0"
} | {
"account_age_days": 1150,
"account_id": "ACCT-D5BBAD630826",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 702,
"timestamp": "2026-01-02T22:10:00Z",
"transaction_amount_usd": 70805.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.913,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 767173.37,
"financial_exposure_usd": 841702.71,
"recoverable_pct": 0.054
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100647",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-01T10:47:00Z",
"trace_id": "fedd5c98-f891-af00-3485-49f95b5f5348"
} | {
"account_age_days": 1592,
"account_id": "ACCT-05F2E2FCEDCC",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_1",
"session_entropy": 0.459
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 183,
"timestamp": "2026-01-01T02:13:00Z",
"transaction_amount_usd": 13.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.708,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 836323.6,
"financial_exposure_usd": 1073892.74,
"recoverable_pct": 0.086
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101286",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "high",
"timestamp": "2026-01-01T21:26:00Z",
"trace_id": "66fdf9a6-6f84-6fd7-7d04-114a33cb2265"
} | {
"account_age_days": 707,
"account_id": "ACCT-DA0DC16857B9",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 958,
"timestamp": "2026-01-01T21:26:00Z",
"transaction_amount_usd": 65316.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.434,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 548078.11,
"financial_exposure_usd": 1121607.05,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104341",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "low",
"timestamp": "2026-01-04T00:21:00Z",
"trace_id": "f16402c8-ed5c-e1b3-e263-ae4bff898c07"
} | {
"account_age_days": 1339,
"account_id": "ACCT-5277778E0F34",
"baseline_risk_score": 0.228,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 699,
"timestamp": "2026-01-04T00:21:00Z",
"transaction_amount_usd": 2993087.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3745697.66,
"financial_exposure_usd": 5588180.81,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101759",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "low",
"timestamp": "2026-01-02T05:19:00Z",
"trace_id": "2743d33d-61a1-a9b3-efe8-424b4ecafa55"
} | {
"account_age_days": 53,
"account_id": "ACCT-E8A6BE78AFD6",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 504,
"timestamp": "2026-01-02T05:19:00Z",
"transaction_amount_usd": 18947.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 671619.9,
"financial_exposure_usd": 922687.37,
"recoverable_pct": 0.212
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107387",
"label": "benign",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-06T03:07:00Z",
"trace_id": "17b6e8a2-0362-4971-955f-798753b2c770"
} | {
"account_age_days": 37,
"account_id": "ACCT-1851C2AE809F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.802
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1198,
"timestamp": "2026-01-06T03:07:00Z",
"transaction_amount_usd": 7995.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4688.42,
"financial_exposure_usd": 5985.81,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104968",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "low",
"timestamp": "2026-01-04T10:48:00Z",
"trace_id": "15f4b563-0d2f-0197-6f12-7e974f819250"
} | {
"account_age_days": 248,
"account_id": "ACCT-786E8BF721F2",
"baseline_risk_score": 0.228,
"kyc_tier": "tier_3",
"session_entropy": 0.488
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 399,
"timestamp": "2026-01-03T22:25:00Z",
"transaction_amount_usd": 11.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.585,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4416908.61,
"financial_exposure_usd": 5126355.59,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109638",
"label": "benign",
"label_confidence": 0.629,
"severity": "low",
"timestamp": "2026-01-07T16:38:00Z",
"trace_id": "9c8a61eb-c2ec-42d1-d6ff-d883eddb063d"
} | {
"account_age_days": 1071,
"account_id": "ACCT-3688D5BCAE91",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 790,
"timestamp": "2026-01-07T16:38:00Z",
"transaction_amount_usd": 7425.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 344.32,
"financial_exposure_usd": 545.42,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107382",
"label": "benign",
"label_confidence": 0.608,
"severity": "medium",
"timestamp": "2026-01-06T03:02:00Z",
"trace_id": "dad54d34-47e8-0bbd-76b3-5091d441462a"
} | {
"account_age_days": 1309,
"account_id": "ACCT-137A8152D3FB",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.24
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 399,
"timestamp": "2026-01-06T03:02:00Z",
"transaction_amount_usd": 4151.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 152.19,
"financial_exposure_usd": 364.53,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104625",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-04T05:05:00Z",
"trace_id": "8cd27577-38a2-34fa-1083-1b607c8fb2ec"
} | {
"account_age_days": 378,
"account_id": "ACCT-E816D0E32549",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.827
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 618,
"timestamp": "2026-01-04T05:05:00Z",
"transaction_amount_usd": 951200.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.85,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1571088.39,
"financial_exposure_usd": 3283210.61,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107714",
"label": "benign",
"label_confidence": 0.659,
"severity": "low",
"timestamp": "2026-01-06T08:34:00Z",
"trace_id": "7f67e72b-2794-d323-a4b8-b12c13a479b1"
} | {
"account_age_days": 617,
"account_id": "ACCT-DB09BCA3CB38",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.653
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 122,
"timestamp": "2026-01-06T03:27:00Z",
"transaction_amount_usd": 0.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2550.1,
"financial_exposure_usd": 4725.46,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101130",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "critical",
"timestamp": "2026-01-01T18:50:00Z",
"trace_id": "8c7191d2-b58a-3cf4-02aa-d31241cb4743"
} | {
"account_age_days": 808,
"account_id": "ACCT-954D6CFE49D5",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_3",
"session_entropy": 0.925
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 790,
"timestamp": "2026-01-01T18:50:00Z",
"transaction_amount_usd": 87411.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.663,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 343681.38,
"financial_exposure_usd": 582427.83,
"recoverable_pct": 0.275
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103886",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-03T16:46:00Z",
"trace_id": "c6f8a485-48bc-8deb-0a8f-bd286b9edcd6"
} | {
"account_age_days": 290,
"account_id": "ACCT-6B2BA1D03C18",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_1",
"session_entropy": 0.69
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 358,
"timestamp": "2026-01-03T14:25:00Z",
"transaction_amount_usd": 16.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.65,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2072673.97,
"financial_exposure_usd": 2248357.91,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103817",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-03T15:37:00Z",
"trace_id": "e6e255de-71ff-6a49-f623-a4cb3e9a0b00"
} | {
"account_age_days": 2000,
"account_id": "ACCT-FB2672E1DDA8",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.95
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 229,
"timestamp": "2026-01-03T15:37:00Z",
"transaction_amount_usd": 2473870.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.943,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3984205.76,
"financial_exposure_usd": 5695572.2,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101808",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-02T06:08:00Z",
"trace_id": "4e45691b-8016-0bc2-5a78-97952775486b"
} | {
"account_age_days": 576,
"account_id": "ACCT-A21B71B0761A",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 715,
"timestamp": "2026-01-02T06:08:00Z",
"transaction_amount_usd": 94098.15
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.405,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 348273.48,
"financial_exposure_usd": 740795.95,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103888",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-03T16:48:00Z",
"trace_id": "74a679f8-2ede-9d73-929b-375d0a2db6b9"
} | {
"account_age_days": 1798,
"account_id": "ACCT-ADCEFF8A4024",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.336
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 318,
"timestamp": "2026-01-03T16:48:00Z",
"transaction_amount_usd": 283347.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.607,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4782332.03,
"financial_exposure_usd": 5929423.37,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109503",
"label": "benign",
"label_confidence": 0.568,
"severity": "critical",
"timestamp": "2026-01-07T14:23:00Z",
"trace_id": "54668a12-87c4-18f9-ca4b-dba6200689de"
} | {
"account_age_days": 1340,
"account_id": "ACCT-4A1F9587CE46",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.59
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 315,
"timestamp": "2026-01-07T08:51:00Z",
"transaction_amount_usd": 9.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1717.81,
"financial_exposure_usd": 2257.13,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109994",
"label": "benign",
"label_confidence": 0.701,
"severity": "critical",
"timestamp": "2026-01-07T22:34:00Z",
"trace_id": "824afab7-d065-680c-e8e1-ab80b38b0248"
} | {
"account_age_days": 350,
"account_id": "ACCT-26D9B7FBEC3A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.449
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 124,
"timestamp": "2026-01-07T20:46:00Z",
"transaction_amount_usd": 8.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1282.65,
"financial_exposure_usd": 2527.39,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109735",
"label": "benign",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-07T18:15:00Z",
"trace_id": "8d44873a-7b57-116c-9722-1af42ab4a51a"
} | {
"account_age_days": 1470,
"account_id": "ACCT-AB88DCE2F833",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.772
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 276,
"timestamp": "2026-01-07T18:15:00Z",
"transaction_amount_usd": 2999.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1016.61,
"financial_exposure_usd": 1108.21,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100052",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-01T00:52:00Z",
"trace_id": "67443fb8-81bd-55d5-b5a6-571c4fa5c35e"
} | {
"account_age_days": 1983,
"account_id": "ACCT-F168C605CE1A",
"baseline_risk_score": 0.49,
"kyc_tier": "tier_3",
"session_entropy": 0.36
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 491,
"timestamp": "2026-01-01T00:52:00Z",
"transaction_amount_usd": 63152.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.604,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1290013.68,
"financial_exposure_usd": 1416116.44,
"recoverable_pct": 0.39
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105900",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-05T02:20:00Z",
"trace_id": "0c48dc27-3843-2c5a-b699-f59dfcf95046"
} | {
"account_age_days": 834,
"account_id": "ACCT-182C60A94602",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.172
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 587,
"timestamp": "2026-01-05T02:20:00Z",
"transaction_amount_usd": 521023.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.707,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5164672.64,
"financial_exposure_usd": 6495272.03,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104925",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-04T10:05:00Z",
"trace_id": "13818206-e68e-1fce-ab05-7499ddb1849a"
} | {
"account_age_days": 112,
"account_id": "ACCT-F9EEF7E1C0A7",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_1",
"session_entropy": 0.869
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 401,
"timestamp": "2026-01-04T10:05:00Z",
"transaction_amount_usd": 1537291.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.852,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1040013.1,
"financial_exposure_usd": 2002025.58,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106729",
"label": "benign",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-05T16:09:00Z",
"trace_id": "9cd4bbea-0d3b-03a6-da22-8859bb15af4f"
} | {
"account_age_days": 914,
"account_id": "ACCT-635750A7229C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.411
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 290,
"timestamp": "2026-01-05T05:00:00Z",
"transaction_amount_usd": 24.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.684,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1249.81,
"financial_exposure_usd": 1965.71,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105117",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-04T13:17:00Z",
"trace_id": "e73ef9f1-c978-803b-1858-ac4f0e5b3088"
} | {
"account_age_days": 1884,
"account_id": "ACCT-691109484D2B",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_3",
"session_entropy": 0.469
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 291,
"timestamp": "2026-01-04T05:30:00Z",
"transaction_amount_usd": 18.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.369,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3421610.38,
"financial_exposure_usd": 3813193.52,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107879",
"label": "benign",
"label_confidence": 0.471,
"severity": "medium",
"timestamp": "2026-01-06T11:19:00Z",
"trace_id": "7936067e-751c-4a97-4d95-620abc3bd1ae"
} | {
"account_age_days": 1782,
"account_id": "ACCT-57CD5FE15188",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 80,
"timestamp": "2026-01-06T11:19:00Z",
"transaction_amount_usd": 9169.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3474.99,
"financial_exposure_usd": 3483.1,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100806",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "high",
"timestamp": "2026-01-01T13:26:00Z",
"trace_id": "b023f606-99f5-eb1d-f864-0254295b2f9b"
} | {
"account_age_days": 1002,
"account_id": "ACCT-0A0419498972",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_1",
"session_entropy": 0.615
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 923,
"timestamp": "2026-01-01T13:26:00Z",
"transaction_amount_usd": 94139.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.355,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1051660.67,
"financial_exposure_usd": 1398203.68,
"recoverable_pct": 0.013
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103581",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "high",
"timestamp": "2026-01-03T11:41:00Z",
"trace_id": "e45086fb-8cd5-b48d-b31d-1acd89916bc0"
} | {
"account_age_days": 822,
"account_id": "ACCT-806A7EC7204C",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 432,
"timestamp": "2026-01-03T11:41:00Z",
"transaction_amount_usd": 2510551.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.929,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 631510.37,
"financial_exposure_usd": 1105975.82,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104741",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "critical",
"timestamp": "2026-01-04T07:01:00Z",
"trace_id": "8ba3ff4c-93a9-a3ac-8b3a-7e8d994cb213"
} | {
"account_age_days": 1818,
"account_id": "ACCT-31D7C8074989",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_3",
"session_entropy": 0.594
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 303,
"timestamp": "2026-01-03T22:40:00Z",
"transaction_amount_usd": 5.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5264759.75,
"financial_exposure_usd": 5321975.41,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101365",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-01T22:45:00Z",
"trace_id": "632242c6-bf63-e5cd-5f3c-5bc87f487a64"
} | {
"account_age_days": 1639,
"account_id": "ACCT-754B97F675F1",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_1",
"session_entropy": 0.569
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 591,
"timestamp": "2026-01-01T22:45:00Z",
"transaction_amount_usd": 91781.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 19407.04,
"financial_exposure_usd": 23189.94,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104348",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "low",
"timestamp": "2026-01-04T00:28:00Z",
"trace_id": "c5aa0320-1da6-d125-f1f1-eb6aa0a24cad"
} | {
"account_age_days": 916,
"account_id": "ACCT-A9BC46BAA56F",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_3",
"session_entropy": 0.706
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 324,
"timestamp": "2026-01-03T21:11:00Z",
"transaction_amount_usd": 3.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.92,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2845628.32,
"financial_exposure_usd": 4354770.54,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108580",
"label": "benign",
"label_confidence": 0.661,
"severity": "critical",
"timestamp": "2026-01-06T23:00:00Z",
"trace_id": "3ef47ff4-6219-4d7a-1df8-b7e4105fb70a"
} | {
"account_age_days": 1526,
"account_id": "ACCT-02B2EA1153B1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.643
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 132,
"timestamp": "2026-01-06T23:00:00Z",
"transaction_amount_usd": 11553.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.624,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1021.11,
"financial_exposure_usd": 1712.67,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103534",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "high",
"timestamp": "2026-01-03T10:54:00Z",
"trace_id": "110ee7cf-bede-9f2f-c1cb-06fa90d71969"
} | {
"account_age_days": 564,
"account_id": "ACCT-10F6F2216314",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 272,
"timestamp": "2026-01-03T01:03:00Z",
"transaction_amount_usd": 14.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1398759.64,
"financial_exposure_usd": 2374185.51,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106606",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-05T14:06:00Z",
"trace_id": "9bcddc28-16b5-ceff-aa8d-f4670c27c348"
} | {
"account_age_days": 141,
"account_id": "ACCT-D50CAD6BCAC7",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_3",
"session_entropy": 0.627
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 617,
"timestamp": "2026-01-05T14:06:00Z",
"transaction_amount_usd": 87266.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2197694.21,
"financial_exposure_usd": 2733504.31,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103608",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-03T12:08:00Z",
"trace_id": "827f5ec7-1f9b-f9c4-9a45-7d069a6725a4"
} | {
"account_age_days": 1341,
"account_id": "ACCT-1AD3BF3E86F6",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_3",
"session_entropy": 0.688
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 580,
"timestamp": "2026-01-03T12:08:00Z",
"transaction_amount_usd": 2957224.74
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.923,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3767871.28,
"financial_exposure_usd": 6426788.46,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109728",
"label": "benign",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-07T18:08:00Z",
"trace_id": "29da39fc-35b9-863a-3d37-fde799ca3fec"
} | {
"account_age_days": 1342,
"account_id": "ACCT-5A1D1DE0C5AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.834
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 349,
"timestamp": "2026-01-07T18:08:00Z",
"transaction_amount_usd": 610.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 371.16,
"financial_exposure_usd": 868.97,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103807",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-03T15:27:00Z",
"trace_id": "b1092ba6-a2d3-5ff8-94fb-ea88f82ce926"
} | {
"account_age_days": 1740,
"account_id": "ACCT-EEE2A518926F",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.532
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 308,
"timestamp": "2026-01-03T10:25:00Z",
"transaction_amount_usd": 1.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7064686.62,
"financial_exposure_usd": 7234869.82,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104347",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "high",
"timestamp": "2026-01-04T00:27:00Z",
"trace_id": "6cde75c4-73b0-3b14-a790-4f33010013f9"
} | {
"account_age_days": 437,
"account_id": "ACCT-92F3CB35C1AC",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.295
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 491,
"timestamp": "2026-01-04T00:27:00Z",
"transaction_amount_usd": 1876151.07
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5637295.87,
"financial_exposure_usd": 8935907.74,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108915",
"label": "benign",
"label_confidence": 0.537,
"severity": "low",
"timestamp": "2026-01-07T04:35:00Z",
"trace_id": "baf57575-f7de-c337-a931-92f06787cdac"
} | {
"account_age_days": 1053,
"account_id": "ACCT-F674B7025400",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 241,
"timestamp": "2026-01-06T23:03:00Z",
"transaction_amount_usd": 9.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2077.89,
"financial_exposure_usd": 5069.76,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102748",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-02T21:48:00Z",
"trace_id": "8c795778-7cdf-6f74-11bc-14e9a5372eff"
} | {
"account_age_days": 1045,
"account_id": "ACCT-A6BB5A96DA2C",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.306
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 501,
"timestamp": "2026-01-02T21:48:00Z",
"transaction_amount_usd": 76256.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.933,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 194621.85,
"financial_exposure_usd": 409897.48,
"recoverable_pct": 0.143
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108133",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-06T15:33:00Z",
"trace_id": "7dc24d59-7068-687c-81e7-f2dcd2f7058e"
} | {
"account_age_days": 1884,
"account_id": "ACCT-D2B75F4B78B0",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 213,
"timestamp": "2026-01-06T06:30:00Z",
"transaction_amount_usd": 4.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1686.36,
"financial_exposure_usd": 2544.21,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102011",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-02T09:31:00Z",
"trace_id": "e2640c60-c0ab-908f-835e-088394bb514c"
} | {
"account_age_days": 1026,
"account_id": "ACCT-50E195511185",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_1",
"session_entropy": 0.924
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 897,
"timestamp": "2026-01-02T09:31:00Z",
"transaction_amount_usd": 71384.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.892,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 477542.57,
"financial_exposure_usd": 526239.81,
"recoverable_pct": 0.261
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101672",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-02T03:52:00Z",
"trace_id": "8e678a3d-5d64-7b4b-7c4a-28d3653c2af5"
} | {
"account_age_days": 1729,
"account_id": "ACCT-785E4B797A18",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_1",
"session_entropy": 0.825
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 127,
"timestamp": "2026-01-02T03:52:00Z",
"transaction_amount_usd": 70038.32
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1076145.16,
"financial_exposure_usd": 1143484.48,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107170",
"label": "benign",
"label_confidence": 0.532,
"severity": "critical",
"timestamp": "2026-01-05T23:30:00Z",
"trace_id": "8dce9516-6edf-2c84-4c0a-0d6b04be2f92"
} | {
"account_age_days": 364,
"account_id": "ACCT-BDA9A50D9CDE",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 344,
"timestamp": "2026-01-05T23:30:00Z",
"transaction_amount_usd": 12909.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 916.58,
"financial_exposure_usd": 1901.7,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107085",
"label": "benign",
"label_confidence": 0.53,
"severity": "medium",
"timestamp": "2026-01-05T22:05:00Z",
"trace_id": "851f0966-c6b1-6a84-6635-11d6a2ff3561"
} | {
"account_age_days": 445,
"account_id": "ACCT-882797B56129",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 263,
"timestamp": "2026-01-05T20:27:00Z",
"transaction_amount_usd": 18.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1444.78,
"financial_exposure_usd": 2444.3,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108859",
"label": "benign",
"label_confidence": 0.534,
"severity": "low",
"timestamp": "2026-01-07T03:39:00Z",
"trace_id": "fada848b-56fd-7c69-4d24-634d6d005681"
} | {
"account_age_days": 93,
"account_id": "ACCT-9FC4D767686D",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_3",
"session_entropy": 0.259
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 732,
"timestamp": "2026-01-07T03:39:00Z",
"transaction_amount_usd": 13003.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1978.32,
"financial_exposure_usd": 3360.22,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101103",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "critical",
"timestamp": "2026-01-01T18:23:00Z",
"trace_id": "ed66c6b9-fcb7-8cd9-34c2-110256ec56d2"
} | {
"account_age_days": 1266,
"account_id": "ACCT-20DD4F6BECBD",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_3",
"session_entropy": 0.441
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 342,
"timestamp": "2026-01-01T14:37:00Z",
"transaction_amount_usd": 16.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.916,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 197782.62,
"financial_exposure_usd": 411211.04,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106598",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "medium",
"timestamp": "2026-01-05T13:58:00Z",
"trace_id": "b3a984c7-28ba-49f6-a1ff-ca1dd2451832"
} | {
"account_age_days": 1217,
"account_id": "ACCT-A98142D8BA64",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 936,
"timestamp": "2026-01-05T13:58:00Z",
"transaction_amount_usd": 1092114.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3827712.48,
"financial_exposure_usd": 7010807.24,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102954",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-03T01:14:00Z",
"trace_id": "1f671a05-02ad-973c-2cee-82a3d06ebe20"
} | {
"account_age_days": 562,
"account_id": "ACCT-82F0CAC9B987",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_2",
"session_entropy": 0.824
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 237,
"timestamp": "2026-01-02T19:43:00Z",
"transaction_amount_usd": 22.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 568982.56,
"financial_exposure_usd": 960435.26,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109661",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-07T17:01:00Z",
"trace_id": "6ea2ca6b-0aa3-6a29-64c9-21191b3762f8"
} | {
"account_age_days": 1384,
"account_id": "ACCT-01C5C11DB829",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.397
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 973,
"timestamp": "2026-01-07T17:01:00Z",
"transaction_amount_usd": 13484.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 979.19,
"financial_exposure_usd": 1188.7,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107098",
"label": "benign",
"label_confidence": 0.589,
"severity": "low",
"timestamp": "2026-01-05T22:18:00Z",
"trace_id": "8734d226-45fe-87e7-d17e-324d1f23fca9"
} | {
"account_age_days": 957,
"account_id": "ACCT-3C7B9F2F8028",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 221,
"timestamp": "2026-01-05T11:19:00Z",
"transaction_amount_usd": 2.23
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 813.34,
"financial_exposure_usd": 1688.57,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100092",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "low",
"timestamp": "2026-01-01T01:32:00Z",
"trace_id": "fa0f01a4-87bb-1f6d-fc92-0c731e14fe04"
} | {
"account_age_days": 940,
"account_id": "ACCT-6328143E2D95",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.417
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 506,
"timestamp": "2026-01-01T01:32:00Z",
"transaction_amount_usd": 103596.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 561524.98,
"financial_exposure_usd": 1077107.99,
"recoverable_pct": 0.108
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102363",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-02T15:23:00Z",
"trace_id": "6cce679e-59f4-89d0-2b5b-6d057e1989c6"
} | {
"account_age_days": 1712,
"account_id": "ACCT-EDDBCF512357",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_2",
"session_entropy": 0.932
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 355,
"timestamp": "2026-01-02T15:23:00Z",
"transaction_amount_usd": 91895.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.365,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 392011.05,
"financial_exposure_usd": 658979.35,
"recoverable_pct": 0.053
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106427",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-05T11:07:00Z",
"trace_id": "b267b8d9-6a14-4067-5279-99fddb3b2fd9"
} | {
"account_age_days": 1643,
"account_id": "ACCT-990C249D2C91",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.453
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 174,
"timestamp": "2026-01-04T23:13:00Z",
"transaction_amount_usd": 15.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.584,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5589421.12,
"financial_exposure_usd": 7279001.09,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101674",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "high",
"timestamp": "2026-01-02T03:54:00Z",
"trace_id": "42aa3978-2ed3-96b5-5b99-0c244104a400"
} | {
"account_age_days": 652,
"account_id": "ACCT-1E38F4249CF3",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_3",
"session_entropy": 0.639
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 87,
"timestamp": "2026-01-01T22:08:00Z",
"transaction_amount_usd": 21.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.649,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 500138.8,
"financial_exposure_usd": 519916.6,
"recoverable_pct": 0.215
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101921",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-02T08:01:00Z",
"trace_id": "95c0ff81-8044-78c9-f842-698576ece128"
} | {
"account_age_days": 1671,
"account_id": "ACCT-4C1135806952",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_1",
"session_entropy": 0.101
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 233,
"timestamp": "2026-01-02T08:01:00Z",
"transaction_amount_usd": 60535.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.644,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 426941.86,
"financial_exposure_usd": 640534.38,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108522",
"label": "benign",
"label_confidence": 0.709,
"severity": "low",
"timestamp": "2026-01-06T22:02:00Z",
"trace_id": "a5f6b0b2-aaed-877f-d1a9-3811e713ae75"
} | {
"account_age_days": 1954,
"account_id": "ACCT-9830FBD54D60",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_3",
"session_entropy": 0.463
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 213,
"timestamp": "2026-01-06T22:02:00Z",
"transaction_amount_usd": 792.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6371.62,
"financial_exposure_usd": 7584.11,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101092",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "low",
"timestamp": "2026-01-01T18:12:00Z",
"trace_id": "9abf0f6a-893c-166e-7b3d-bc37ad83982a"
} | {
"account_age_days": 248,
"account_id": "ACCT-D4610732EF96",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_3",
"session_entropy": 0.809
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 632,
"timestamp": "2026-01-01T18:12:00Z",
"transaction_amount_usd": 23123.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 393580.52,
"financial_exposure_usd": 710284.21,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103352",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "high",
"timestamp": "2026-01-03T07:52:00Z",
"trace_id": "53fa53f3-7eb4-b8d8-ecbe-867c11384902"
} | {
"account_age_days": 1260,
"account_id": "ACCT-DFA42D4D93E8",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_3",
"session_entropy": 0.13
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 272,
"timestamp": "2026-01-03T07:52:00Z",
"transaction_amount_usd": 1869832.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.617,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3563339.28,
"financial_exposure_usd": 4877254.97,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101340",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "critical",
"timestamp": "2026-01-01T22:20:00Z",
"trace_id": "ea1146e1-8ed8-4bb8-5c08-dcb7e37aa480"
} | {
"account_age_days": 177,
"account_id": "ACCT-301DA488E7B6",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_3",
"session_entropy": 0.904
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 242,
"timestamp": "2026-01-01T21:58:00Z",
"transaction_amount_usd": 23.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.596,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 351776.76,
"financial_exposure_usd": 675898.73,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103052",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-03T02:52:00Z",
"trace_id": "fb1cef14-98ec-dbf7-fa5a-c8a49e762823"
} | {
"account_age_days": 1113,
"account_id": "ACCT-860C13DBBAF1",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 118,
"timestamp": "2026-01-02T18:39:00Z",
"transaction_amount_usd": 15.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 277002.96,
"financial_exposure_usd": 565850.09,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108301",
"label": "benign",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-06T18:21:00Z",
"trace_id": "fe79ed72-4beb-1d96-8312-3e073f5be26b"
} | {
"account_age_days": 1989,
"account_id": "ACCT-9F17A924F4D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.947
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 305,
"timestamp": "2026-01-06T15:08:00Z",
"transaction_amount_usd": 1.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1335.03,
"financial_exposure_usd": 1565.93,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.