schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107791",
"label": "benign",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-06T09:51:00Z",
"trace_id": "1a777273-bdb7-345c-a401-e63eb89cd828"
} | {
"account_age_days": 579,
"account_id": "ACCT-EF54A954547C",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 260,
"timestamp": "2026-01-06T02:50:00Z",
"transaction_amount_usd": 14.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.691,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 986.27,
"financial_exposure_usd": 2215.02,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102745",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "low",
"timestamp": "2026-01-02T21:45:00Z",
"trace_id": "1aebdfd3-5c07-9224-f7d1-e17f5303e566"
} | {
"account_age_days": 1337,
"account_id": "ACCT-0D2938AF6650",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_2",
"session_entropy": 0.738
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 117,
"timestamp": "2026-01-02T15:45:00Z",
"transaction_amount_usd": 9.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.826,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 771179.45,
"financial_exposure_usd": 1135102.95,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106459",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "medium",
"timestamp": "2026-01-05T11:39:00Z",
"trace_id": "818badf7-16e7-6267-b0ed-2937709147ae"
} | {
"account_age_days": 1009,
"account_id": "ACCT-7769D3E075BC",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_2",
"session_entropy": 0.495
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 988,
"timestamp": "2026-01-05T11:39:00Z",
"transaction_amount_usd": 290916.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.838,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5629169.27,
"financial_exposure_usd": 6649133.82,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104821",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "medium",
"timestamp": "2026-01-04T08:21:00Z",
"trace_id": "eea9074c-8cf6-3ebf-cc35-445e0b9303f6"
} | {
"account_age_days": 195,
"account_id": "ACCT-A3D0DF07F5B9",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.478
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 555,
"timestamp": "2026-01-04T08:21:00Z",
"transaction_amount_usd": 2934270.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.836,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 849586,
"financial_exposure_usd": 1578243.79,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100604",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "low",
"timestamp": "2026-01-01T10:04:00Z",
"trace_id": "e20662ad-5c8d-4d53-5e5c-aa8bb156240e"
} | {
"account_age_days": 1539,
"account_id": "ACCT-EF803C47D19E",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_1",
"session_entropy": 0.901
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 975,
"timestamp": "2026-01-01T10:04:00Z",
"transaction_amount_usd": 39118.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 328700.84,
"financial_exposure_usd": 555203.86,
"recoverable_pct": 0.009
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100649",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-01T10:49:00Z",
"trace_id": "7c928d60-51ed-b0fa-f466-0660c95955ea"
} | {
"account_age_days": 1752,
"account_id": "ACCT-E7284F5A50EB",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_2",
"session_entropy": 0.392
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 239,
"timestamp": "2026-01-01T10:49:00Z",
"transaction_amount_usd": 12262.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.508,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 407732,
"financial_exposure_usd": 635948.11,
"recoverable_pct": 0.148
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105801",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "medium",
"timestamp": "2026-01-05T00:41:00Z",
"trace_id": "8346ae53-5c79-ce30-9793-f3f5a4a7c07c"
} | {
"account_age_days": 462,
"account_id": "ACCT-D96A60EBEABA",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_1",
"session_entropy": 0.416
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 114,
"timestamp": "2026-01-05T00:41:00Z",
"transaction_amount_usd": 2463956.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.368,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4361354.06,
"financial_exposure_usd": 4543781.34,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107051",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-05T21:31:00Z",
"trace_id": "64ba7cf1-3fea-d461-410f-8b71a18973fa"
} | {
"account_age_days": 91,
"account_id": "ACCT-3D8FDD4E15BC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.932
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1077,
"timestamp": "2026-01-05T21:31:00Z",
"transaction_amount_usd": 13849.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3857.18,
"financial_exposure_usd": 5768.43,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104837",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-04T08:37:00Z",
"trace_id": "1d5dbe8e-bc78-071f-9192-ac6b8e014e01"
} | {
"account_age_days": 1542,
"account_id": "ACCT-8B24311CFEA1",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_3",
"session_entropy": 0.649
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 378,
"timestamp": "2026-01-04T08:37:00Z",
"transaction_amount_usd": 462485.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.825,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3168930.08,
"financial_exposure_usd": 5628472.52,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101417",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-01T23:37:00Z",
"trace_id": "9aed8378-b726-c953-8e28-2263226c62ae"
} | {
"account_age_days": 124,
"account_id": "ACCT-8F667EE70557",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 966,
"timestamp": "2026-01-01T23:37:00Z",
"transaction_amount_usd": 105277.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.722,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 624218.64,
"financial_exposure_usd": 1006750.76,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102229",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-02T13:09:00Z",
"trace_id": "8b097bef-dc31-6f1f-b8a1-e4fbb3a415b1"
} | {
"account_age_days": 1225,
"account_id": "ACCT-5A503783953A",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_1",
"session_entropy": 0.16
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 162,
"timestamp": "2026-01-02T13:09:00Z",
"transaction_amount_usd": 12390.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 319303.24,
"financial_exposure_usd": 419944.05,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101659",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "critical",
"timestamp": "2026-01-02T03:39:00Z",
"trace_id": "05801111-8f04-416f-5ab3-5b0dde5411b8"
} | {
"account_age_days": 463,
"account_id": "ACCT-AAC2409F83DC",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 982,
"timestamp": "2026-01-02T03:39:00Z",
"transaction_amount_usd": 54705.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.786,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 473281.45,
"financial_exposure_usd": 886963.52,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107394",
"label": "benign",
"label_confidence": 0.605,
"severity": "medium",
"timestamp": "2026-01-06T03:14:00Z",
"trace_id": "454fd67d-1e15-bcba-6741-e98d87b65de3"
} | {
"account_age_days": 728,
"account_id": "ACCT-A4575431E118",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.931
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 288,
"timestamp": "2026-01-05T20:12:00Z",
"transaction_amount_usd": 15.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1401.59,
"financial_exposure_usd": 1975.52,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100128",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "low",
"timestamp": "2026-01-01T02:08:00Z",
"trace_id": "aa97435d-d9ff-74eb-fa5f-9e725166488b"
} | {
"account_age_days": 1216,
"account_id": "ACCT-2024C4073447",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.178
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 199,
"timestamp": "2025-12-31T17:23:00Z",
"transaction_amount_usd": 11.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.492,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 278521.03,
"financial_exposure_usd": 424740.56,
"recoverable_pct": 0.397
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108949",
"label": "benign",
"label_confidence": 0.569,
"severity": "medium",
"timestamp": "2026-01-07T05:09:00Z",
"trace_id": "55afbc8a-fad0-c594-f8b4-3014636a0508"
} | {
"account_age_days": 1234,
"account_id": "ACCT-669721AB7BBB",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_2",
"session_entropy": 0.148
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 771,
"timestamp": "2026-01-07T05:09:00Z",
"transaction_amount_usd": 9252.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3641.36,
"financial_exposure_usd": 7623.13,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103680",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "high",
"timestamp": "2026-01-03T13:20:00Z",
"trace_id": "a599f0fb-f380-a2e3-a6a7-204f94bb1a66"
} | {
"account_age_days": 1320,
"account_id": "ACCT-5132902E3291",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 341,
"timestamp": "2026-01-03T06:33:00Z",
"transaction_amount_usd": 5.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.543,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2561075.33,
"financial_exposure_usd": 5081289.04,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100787",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "low",
"timestamp": "2026-01-01T13:07:00Z",
"trace_id": "b8c13be7-35a3-1f3a-01f9-35062dacae8e"
} | {
"account_age_days": 146,
"account_id": "ACCT-0F3415A88097",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_1",
"session_entropy": 0.509
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 93,
"timestamp": "2026-01-01T02:37:00Z",
"transaction_amount_usd": 10.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.437,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 323765.59,
"financial_exposure_usd": 452584.33,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108094",
"label": "benign",
"label_confidence": 0.662,
"severity": "medium",
"timestamp": "2026-01-06T14:54:00Z",
"trace_id": "85275ba0-9102-9e68-e2a7-4bad6616fd17"
} | {
"account_age_days": 82,
"account_id": "ACCT-B4E02DA13B5F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 305,
"timestamp": "2026-01-06T05:18:00Z",
"transaction_amount_usd": 2.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2381.69,
"financial_exposure_usd": 5398.16,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108872",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-07T03:52:00Z",
"trace_id": "20ddac72-d9fc-0a12-bbbf-e024d795a917"
} | {
"account_age_days": 1081,
"account_id": "ACCT-383653DBD853",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.298
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 167,
"timestamp": "2026-01-06T21:28:00Z",
"transaction_amount_usd": 14.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2757.92,
"financial_exposure_usd": 3155.64,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101443",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "low",
"timestamp": "2026-01-02T00:03:00Z",
"trace_id": "dc3c91f4-2740-9805-ae1b-a3f182244e67"
} | {
"account_age_days": 1452,
"account_id": "ACCT-345685FEB536",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.244
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 967,
"timestamp": "2026-01-02T00:03:00Z",
"transaction_amount_usd": 48459.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.865,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 976109.71,
"financial_exposure_usd": 991736.88,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109355",
"label": "benign",
"label_confidence": 0.514,
"severity": "high",
"timestamp": "2026-01-07T11:55:00Z",
"trace_id": "1970a93c-8bbc-91c0-8506-f6d04d1c1003"
} | {
"account_age_days": 1247,
"account_id": "ACCT-88C60D31DEDE",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_3",
"session_entropy": 0.629
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 955,
"timestamp": "2026-01-07T11:55:00Z",
"transaction_amount_usd": 7609.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1507.06,
"financial_exposure_usd": 3151.61,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106987",
"label": "benign",
"label_confidence": 0.64,
"severity": "critical",
"timestamp": "2026-01-05T20:27:00Z",
"trace_id": "27bd6f05-1912-cf18-8b72-d9e5a5859b58"
} | {
"account_age_days": 32,
"account_id": "ACCT-2AAE9F3360D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.929
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 97,
"timestamp": "2026-01-05T19:17:00Z",
"transaction_amount_usd": 1.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3545.38,
"financial_exposure_usd": 4332.03,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108575",
"label": "benign",
"label_confidence": 0.692,
"severity": "low",
"timestamp": "2026-01-06T22:55:00Z",
"trace_id": "4ac648f3-2c68-99e8-9a8f-4e0e5fd5658c"
} | {
"account_age_days": 322,
"account_id": "ACCT-AB0E433641FF",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_2",
"session_entropy": 0.381
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 695,
"timestamp": "2026-01-06T22:55:00Z",
"transaction_amount_usd": 10513.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2751.93,
"financial_exposure_usd": 3762.13,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106270",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-05T08:30:00Z",
"trace_id": "9fb55d7a-ff29-7bbb-1cfd-800744a668a2"
} | {
"account_age_days": 1885,
"account_id": "ACCT-8344E47D6760",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.908
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 452,
"timestamp": "2026-01-05T08:30:00Z",
"transaction_amount_usd": 248826.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.501,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3391351.78,
"financial_exposure_usd": 6614431.96,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105459",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-04T18:59:00Z",
"trace_id": "6e2ff57f-0130-42d2-9a94-950c2dfc468a"
} | {
"account_age_days": 1713,
"account_id": "ACCT-A5AA847121C6",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_1",
"session_entropy": 0.949
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 732,
"timestamp": "2026-01-04T18:59:00Z",
"transaction_amount_usd": 2258077.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.443,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1614927.66,
"financial_exposure_usd": 2643915.14,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104419",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "medium",
"timestamp": "2026-01-04T01:39:00Z",
"trace_id": "2edd4279-cc74-2bc7-ba74-e1bc1b12f386"
} | {
"account_age_days": 960,
"account_id": "ACCT-339510DA173D",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.731
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 112,
"timestamp": "2026-01-03T21:42:00Z",
"transaction_amount_usd": 18.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.899,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4396536.5,
"financial_exposure_usd": 5506923.88,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107499",
"label": "benign",
"label_confidence": 0.467,
"severity": "low",
"timestamp": "2026-01-06T04:59:00Z",
"trace_id": "1a583e28-930c-e7c8-f524-bb590b86b4fa"
} | {
"account_age_days": 1435,
"account_id": "ACCT-9B6FA917E1E5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.543
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1170,
"timestamp": "2026-01-06T04:59:00Z",
"transaction_amount_usd": 3892.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 533.15,
"financial_exposure_usd": 729.39,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102698",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "low",
"timestamp": "2026-01-02T20:58:00Z",
"trace_id": "e4531001-3073-705f-6481-6e8223be3b3c"
} | {
"account_age_days": 1525,
"account_id": "ACCT-2909C7FB4544",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.689
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 93,
"timestamp": "2026-01-02T17:47:00Z",
"transaction_amount_usd": 16.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 597589.66,
"financial_exposure_usd": 837867.38,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104167",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-03T21:27:00Z",
"trace_id": "533bbfd2-278c-4beb-490c-610db8280d92"
} | {
"account_age_days": 1769,
"account_id": "ACCT-3D0DD271B9BE",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.594
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 252,
"timestamp": "2026-01-03T18:16:00Z",
"transaction_amount_usd": 21.54
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.769,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2707527.15,
"financial_exposure_usd": 6100445.72,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107334",
"label": "benign",
"label_confidence": 0.593,
"severity": "medium",
"timestamp": "2026-01-06T02:14:00Z",
"trace_id": "80e49da3-8c4a-6c68-eccb-a855501f8054"
} | {
"account_age_days": 339,
"account_id": "ACCT-485A8A9EDA7F",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.543
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 133,
"timestamp": "2026-01-05T18:51:00Z",
"transaction_amount_usd": 7.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2357.63,
"financial_exposure_usd": 2719.4,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101433",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-01T23:53:00Z",
"trace_id": "f5b376c8-f1ca-21d6-5122-d55005eb1114"
} | {
"account_age_days": 239,
"account_id": "ACCT-9305EFA53D59",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 185,
"timestamp": "2026-01-01T16:33:00Z",
"transaction_amount_usd": 14.23
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 278160.81,
"financial_exposure_usd": 504166.4,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101375",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "high",
"timestamp": "2026-01-01T22:55:00Z",
"trace_id": "5db33021-5cff-29f5-489d-93e21d830e2a"
} | {
"account_age_days": 54,
"account_id": "ACCT-CBE1C681521F",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_2",
"session_entropy": 0.631
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 407,
"timestamp": "2026-01-01T22:55:00Z",
"transaction_amount_usd": 77110.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.612,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 618186.09,
"financial_exposure_usd": 989727.42,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109537",
"label": "benign",
"label_confidence": 0.657,
"severity": "low",
"timestamp": "2026-01-07T14:57:00Z",
"trace_id": "d0a7c59b-4f69-774a-e5a0-7451aec374ee"
} | {
"account_age_days": 1940,
"account_id": "ACCT-2A1BBB574537",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.846
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 100,
"timestamp": "2026-01-07T14:57:00Z",
"transaction_amount_usd": 961.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4128.21,
"financial_exposure_usd": 6601.41,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104197",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-03T21:57:00Z",
"trace_id": "13e563f3-f3f3-fc37-fc26-f2b6db4c494a"
} | {
"account_age_days": 1647,
"account_id": "ACCT-ABA29AA3E4ED",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.854
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 323,
"timestamp": "2026-01-03T15:48:00Z",
"transaction_amount_usd": 10.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.863,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7287329.38,
"financial_exposure_usd": 7811788.03,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102690",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-02T20:50:00Z",
"trace_id": "56059f1a-cd46-8d88-0fdc-88611dfec63d"
} | {
"account_age_days": 190,
"account_id": "ACCT-1C0F009AA49A",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_2",
"session_entropy": 0.617
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 193,
"timestamp": "2026-01-02T20:50:00Z",
"transaction_amount_usd": 44285.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.864,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 67396.98,
"financial_exposure_usd": 148605.05,
"recoverable_pct": 0.019
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100441",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "medium",
"timestamp": "2026-01-01T07:21:00Z",
"trace_id": "eebea50d-5a6c-b33e-af5f-8913d13a962d"
} | {
"account_age_days": 165,
"account_id": "ACCT-69624B673454",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_2",
"session_entropy": 0.492
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 861,
"timestamp": "2026-01-01T07:21:00Z",
"transaction_amount_usd": 5966.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.638,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 891543.49,
"financial_exposure_usd": 922644.36,
"recoverable_pct": 0.322
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102179",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-02T12:19:00Z",
"trace_id": "d996d49a-73f0-bb40-0246-5a1c377eb73c"
} | {
"account_age_days": 125,
"account_id": "ACCT-D3D3AA6DAC67",
"baseline_risk_score": 0.465,
"kyc_tier": "tier_2",
"session_entropy": 0.42
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 392,
"timestamp": "2026-01-02T12:19:00Z",
"transaction_amount_usd": 116648.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 278249.35,
"financial_exposure_usd": 450819.9,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100971",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "critical",
"timestamp": "2026-01-01T16:11:00Z",
"trace_id": "1b9ebf85-3a2e-f0d4-e6a7-7db2a0ee052c"
} | {
"account_age_days": 1113,
"account_id": "ACCT-6BF1C26784F1",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 320,
"timestamp": "2026-01-01T14:13:00Z",
"transaction_amount_usd": 5.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.653,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 353102.61,
"financial_exposure_usd": 571913.96,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104203",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-03T22:03:00Z",
"trace_id": "d8962e27-5231-ae51-b943-2dd1564b87fa"
} | {
"account_age_days": 15,
"account_id": "ACCT-1F09DC0E5459",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_3",
"session_entropy": 0.838
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 681,
"timestamp": "2026-01-03T22:03:00Z",
"transaction_amount_usd": 1802869.47
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.531,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 161337.18,
"financial_exposure_usd": 275548.13,
"recoverable_pct": 0.943
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109707",
"label": "benign",
"label_confidence": 0.628,
"severity": "low",
"timestamp": "2026-01-07T17:47:00Z",
"trace_id": "cb056757-c727-4fb8-d19d-b9365a8d35a4"
} | {
"account_age_days": 202,
"account_id": "ACCT-69703DF2F8CF",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.915
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 643,
"timestamp": "2026-01-07T17:47:00Z",
"transaction_amount_usd": 8440.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 145.3,
"financial_exposure_usd": 159.25,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102618",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-02T19:38:00Z",
"trace_id": "693d326f-bb53-796d-38e6-06fa566cc555"
} | {
"account_age_days": 438,
"account_id": "ACCT-C5720FE0CF7C",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_2",
"session_entropy": 0.921
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 743,
"timestamp": "2026-01-02T19:38:00Z",
"transaction_amount_usd": 30790.51
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 709880.01,
"financial_exposure_usd": 964332.67,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106555",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-05T13:15:00Z",
"trace_id": "97dcc9fc-1ec0-8149-0a2e-58f5f65127a3"
} | {
"account_age_days": 968,
"account_id": "ACCT-114E44B20110",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_2",
"session_entropy": 0.536
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 103,
"timestamp": "2026-01-05T12:17:00Z",
"transaction_amount_usd": 17.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.457,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5047128.03,
"financial_exposure_usd": 5064455.69,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103696",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "low",
"timestamp": "2026-01-03T13:36:00Z",
"trace_id": "75dcc980-cdb8-ce98-818d-90a8e66ba5e9"
} | {
"account_age_days": 1864,
"account_id": "ACCT-EC64BAF50E2B",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.922
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 624,
"timestamp": "2026-01-03T13:36:00Z",
"transaction_amount_usd": 2833998.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.636,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7277305.4,
"financial_exposure_usd": 7574772.09,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104073",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "critical",
"timestamp": "2026-01-03T19:53:00Z",
"trace_id": "7bda7b9a-06f3-aa2a-fb81-4f178d740687"
} | {
"account_age_days": 21,
"account_id": "ACCT-9A93C841298C",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_1",
"session_entropy": 0.789
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 890,
"timestamp": "2026-01-03T19:53:00Z",
"transaction_amount_usd": 1595033.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.505,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1091063.15,
"financial_exposure_usd": 2521253.38,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105588",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-04T21:08:00Z",
"trace_id": "f9be81f9-c2ac-f532-2088-8ef055ebb9cb"
} | {
"account_age_days": 1834,
"account_id": "ACCT-60DBE17DFDC1",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_3",
"session_entropy": 0.314
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 275,
"timestamp": "2026-01-04T08:19:00Z",
"transaction_amount_usd": 8.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.491,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2303861.31,
"financial_exposure_usd": 4223346.18,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104950",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-04T10:30:00Z",
"trace_id": "48e5a021-3cef-d2a8-7664-b29921257e81"
} | {
"account_age_days": 12,
"account_id": "ACCT-DF5E90D5D7DA",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_1",
"session_entropy": 0.234
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 864,
"timestamp": "2026-01-04T10:30:00Z",
"transaction_amount_usd": 2192506.95
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1301046.13,
"financial_exposure_usd": 2118627.3,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103821",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-03T15:41:00Z",
"trace_id": "f73cb82d-f963-5ecf-b32b-af3f821c355f"
} | {
"account_age_days": 1465,
"account_id": "ACCT-2B1079C42E54",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.77
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 361,
"timestamp": "2026-01-03T07:20:00Z",
"transaction_amount_usd": 13.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.87,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 7409024.34,
"financial_exposure_usd": 8346291.81,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106509",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "high",
"timestamp": "2026-01-05T12:29:00Z",
"trace_id": "04b03668-6c42-a8de-167a-04a622aad8ad"
} | {
"account_age_days": 357,
"account_id": "ACCT-6BE7AAA35423",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_3",
"session_entropy": 0.816
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 96,
"timestamp": "2026-01-05T09:27:00Z",
"transaction_amount_usd": 16.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.555,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5424745.12,
"financial_exposure_usd": 8200963.38,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102759",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "medium",
"timestamp": "2026-01-02T21:59:00Z",
"trace_id": "20420336-b790-498e-2e51-4e0b8106fc41"
} | {
"account_age_days": 1852,
"account_id": "ACCT-4CEB6FE7CA25",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_2",
"session_entropy": 0.67
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1009,
"timestamp": "2026-01-02T21:59:00Z",
"transaction_amount_usd": 10845.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 734813.56,
"financial_exposure_usd": 738215.69,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106109",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-05T05:49:00Z",
"trace_id": "aa500178-e00b-4b39-1210-796683b59476"
} | {
"account_age_days": 849,
"account_id": "ACCT-260514570E42",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_1",
"session_entropy": 0.404
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1099,
"timestamp": "2026-01-05T05:49:00Z",
"transaction_amount_usd": 96059.89
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.578,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2372924.45,
"financial_exposure_usd": 4073900.53,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101309",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-01T21:49:00Z",
"trace_id": "d80e2747-0249-2c6c-b1e6-5582aeff6791"
} | {
"account_age_days": 667,
"account_id": "ACCT-448CD9E2E409",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.285
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 396,
"timestamp": "2026-01-01T16:16:00Z",
"transaction_amount_usd": 8.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.826,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 173915.87,
"financial_exposure_usd": 187430.1,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103363",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "high",
"timestamp": "2026-01-03T08:03:00Z",
"trace_id": "582bdb50-16cf-8435-56c5-f9901f208da8"
} | {
"account_age_days": 1146,
"account_id": "ACCT-47F3DF75308F",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_2",
"session_entropy": 0.93
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 358,
"timestamp": "2026-01-03T08:03:00Z",
"transaction_amount_usd": 2959081.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4744814.87,
"financial_exposure_usd": 5340655.9,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109044",
"label": "benign",
"label_confidence": 0.491,
"severity": "critical",
"timestamp": "2026-01-07T06:44:00Z",
"trace_id": "4da6742f-6fc0-6e12-12ef-2092ba4923a2"
} | {
"account_age_days": 1535,
"account_id": "ACCT-0FFC6F338FF0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.838
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 350,
"timestamp": "2026-01-07T06:44:00Z",
"transaction_amount_usd": 6854.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1220.02,
"financial_exposure_usd": 1626.31,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107477",
"label": "benign",
"label_confidence": 0.482,
"severity": "low",
"timestamp": "2026-01-06T04:37:00Z",
"trace_id": "1ea61ff9-0e26-73c6-abd0-d1c4cd969fb4"
} | {
"account_age_days": 1497,
"account_id": "ACCT-943A83DCED4A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.802
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 872,
"timestamp": "2026-01-06T04:37:00Z",
"transaction_amount_usd": 9451.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 270.14,
"financial_exposure_usd": 271.41,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109760",
"label": "benign",
"label_confidence": 0.743,
"severity": "low",
"timestamp": "2026-01-07T18:40:00Z",
"trace_id": "11865aff-5765-fde6-a6e8-ce5de26c203f"
} | {
"account_age_days": 410,
"account_id": "ACCT-5CD9D5703701",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.897
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 102,
"timestamp": "2026-01-07T09:30:00Z",
"transaction_amount_usd": 5.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2813.98,
"financial_exposure_usd": 3372.28,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101695",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T04:15:00Z",
"trace_id": "4affcb45-a0c1-a4a0-cabc-20c9657a0383"
} | {
"account_age_days": 355,
"account_id": "ACCT-D7F39BC598E8",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 691,
"timestamp": "2026-01-02T04:15:00Z",
"transaction_amount_usd": 79002.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 793036.97,
"financial_exposure_usd": 1012470.31,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101122",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "critical",
"timestamp": "2026-01-01T18:42:00Z",
"trace_id": "64654738-9ef0-d068-9635-641ca1254879"
} | {
"account_age_days": 1585,
"account_id": "ACCT-7035392D036A",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_3",
"session_entropy": 0.329
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1100,
"timestamp": "2026-01-01T18:42:00Z",
"transaction_amount_usd": 22017.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.836,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 515489.43,
"financial_exposure_usd": 793881.59,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106685",
"label": "benign",
"label_confidence": 0.524,
"severity": "critical",
"timestamp": "2026-01-05T15:25:00Z",
"trace_id": "5f86363c-b16c-42e6-9e8b-37ae6a76b83f"
} | {
"account_age_days": 75,
"account_id": "ACCT-2EA19D1308AD",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_2",
"session_entropy": 0.455
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 190,
"timestamp": "2026-01-05T05:16:00Z",
"transaction_amount_usd": 2.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3647.25,
"financial_exposure_usd": 5159.35,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109726",
"label": "benign",
"label_confidence": 0.58,
"severity": "low",
"timestamp": "2026-01-07T18:06:00Z",
"trace_id": "d177bf71-4533-c7e5-561b-42f594bec508"
} | {
"account_age_days": 1379,
"account_id": "ACCT-28B51463024B",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_2",
"session_entropy": 0.564
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 347,
"timestamp": "2026-01-07T14:10:00Z",
"transaction_amount_usd": 13.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1221.55,
"financial_exposure_usd": 1302.43,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107004",
"label": "benign",
"label_confidence": 0.559,
"severity": "low",
"timestamp": "2026-01-05T20:44:00Z",
"trace_id": "a571c443-2436-c655-5cd8-3629e342225f"
} | {
"account_age_days": 1777,
"account_id": "ACCT-B72E76B101FE",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.283
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 211,
"timestamp": "2026-01-05T11:45:00Z",
"transaction_amount_usd": 4.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1368.2,
"financial_exposure_usd": 1433.72,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100329",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "low",
"timestamp": "2026-01-01T05:29:00Z",
"trace_id": "086c030f-f0fd-1ea9-02c2-7f97af6c9a31"
} | {
"account_age_days": 932,
"account_id": "ACCT-54C4C8BAA558",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_1",
"session_entropy": 0.8
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 652,
"timestamp": "2026-01-01T05:29:00Z",
"transaction_amount_usd": 25437.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1167573.6,
"financial_exposure_usd": 1183745.58,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106370",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-05T10:10:00Z",
"trace_id": "2be3e941-f0ce-d08e-9758-69e223e51b66"
} | {
"account_age_days": 1642,
"account_id": "ACCT-619E690CFA9E",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_1",
"session_entropy": 0.57
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 323,
"timestamp": "2026-01-04T22:33:00Z",
"transaction_amount_usd": 1.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.949,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1767339.35,
"financial_exposure_usd": 2516896.76,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101976",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-02T08:56:00Z",
"trace_id": "67e3e41d-d92a-d581-2d1d-c6c88273cbd5"
} | {
"account_age_days": 1118,
"account_id": "ACCT-3ECBFDB8B346",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_2",
"session_entropy": 0.399
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 258,
"timestamp": "2026-01-02T08:56:00Z",
"transaction_amount_usd": 113283.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.659,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 459169.73,
"financial_exposure_usd": 463229.22,
"recoverable_pct": 0.111
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106597",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "medium",
"timestamp": "2026-01-05T13:57:00Z",
"trace_id": "aad60433-869a-cf61-9c32-3f6d3aad8974"
} | {
"account_age_days": 386,
"account_id": "ACCT-36D4A9664238",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 148,
"timestamp": "2026-01-05T13:57:00Z",
"transaction_amount_usd": 1367571.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.407,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2209721.37,
"financial_exposure_usd": 3000425.03,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101002",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "low",
"timestamp": "2026-01-01T16:42:00Z",
"trace_id": "c697e08a-d565-3971-46a4-f5c20023d461"
} | {
"account_age_days": 1138,
"account_id": "ACCT-DC9E1EACFD73",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.52
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 837,
"timestamp": "2026-01-01T16:42:00Z",
"transaction_amount_usd": 36806.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.85,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 549649.33,
"financial_exposure_usd": 836506.72,
"recoverable_pct": 0.189
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102364",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-02T15:24:00Z",
"trace_id": "23566178-e866-7e2a-ef7d-12838dd149dd"
} | {
"account_age_days": 1974,
"account_id": "ACCT-4666263E2429",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_2",
"session_entropy": 0.757
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 640,
"timestamp": "2026-01-02T15:24:00Z",
"transaction_amount_usd": 50372.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 385330.39,
"financial_exposure_usd": 443527.09,
"recoverable_pct": 0.215
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101777",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "medium",
"timestamp": "2026-01-02T05:37:00Z",
"trace_id": "3a4b4ef3-d4f8-49d8-def6-972ff9b3df8d"
} | {
"account_age_days": 664,
"account_id": "ACCT-603DB095C4A1",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_1",
"session_entropy": 0.193
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 563,
"timestamp": "2026-01-02T05:37:00Z",
"transaction_amount_usd": 80856.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 773058.15,
"financial_exposure_usd": 1145932.56,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109482",
"label": "benign",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-07T14:02:00Z",
"trace_id": "f744a2aa-122e-2c37-a9f7-c28286648958"
} | {
"account_age_days": 948,
"account_id": "ACCT-1BEEB02AB4E0",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_2",
"session_entropy": 0.578
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 764,
"timestamp": "2026-01-07T14:02:00Z",
"transaction_amount_usd": 10664.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5193.68,
"financial_exposure_usd": 8674.8,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109243",
"label": "benign",
"label_confidence": 0.641,
"severity": "low",
"timestamp": "2026-01-07T10:03:00Z",
"trace_id": "001758fe-a22b-c6a1-0b49-a13ba00bf894"
} | {
"account_age_days": 578,
"account_id": "ACCT-818645DE02E9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.625
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 315,
"timestamp": "2026-01-07T01:34:00Z",
"transaction_amount_usd": 17.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 959.21,
"financial_exposure_usd": 1664.34,
"recoverable_pct": 0.925
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103590",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-03T11:50:00Z",
"trace_id": "a3c19cdf-8f56-15b6-24d8-e166a4e298b1"
} | {
"account_age_days": 51,
"account_id": "ACCT-4A23D44CA119",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.466
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 462,
"timestamp": "2026-01-03T11:50:00Z",
"transaction_amount_usd": 1443753
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.367,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2195931,
"financial_exposure_usd": 2221865.23,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106913",
"label": "benign",
"label_confidence": 0.469,
"severity": "medium",
"timestamp": "2026-01-05T19:13:00Z",
"trace_id": "d3c43a54-a1cf-8470-cd2a-32003c7accc2"
} | {
"account_age_days": 1323,
"account_id": "ACCT-CC972A3EE4DB",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.683
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 381,
"timestamp": "2026-01-05T19:13:00Z",
"transaction_amount_usd": 968.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 876.55,
"financial_exposure_usd": 1529.75,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100234",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "critical",
"timestamp": "2026-01-01T03:54:00Z",
"trace_id": "1b59200c-0106-c378-969b-1badf1d799af"
} | {
"account_age_days": 150,
"account_id": "ACCT-BEB077223FFF",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_3",
"session_entropy": 0.14
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 367,
"timestamp": "2025-12-31T19:01:00Z",
"transaction_amount_usd": 6.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 625859.15,
"financial_exposure_usd": 1105896.07,
"recoverable_pct": 0.096
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101658",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-02T03:38:00Z",
"trace_id": "197a023a-3b90-bb7c-eb48-398c84d7255f"
} | {
"account_age_days": 1355,
"account_id": "ACCT-49602F22BB6A",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.746
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 360,
"timestamp": "2026-01-02T03:38:00Z",
"transaction_amount_usd": 60800.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 2",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 742284.64,
"financial_exposure_usd": 1066568.39,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102384",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-02T15:44:00Z",
"trace_id": "21c0fa6b-d345-93c6-0114-8800e601a9a0"
} | {
"account_age_days": 1787,
"account_id": "ACCT-257934B89130",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.525
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1177,
"timestamp": "2026-01-02T15:44:00Z",
"transaction_amount_usd": 112183.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 368780.73,
"financial_exposure_usd": 666119.41,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101522",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-02T01:22:00Z",
"trace_id": "1ec7277d-7ed8-dce0-d613-8fc24c459981"
} | {
"account_age_days": 178,
"account_id": "ACCT-F4B87B0CB498",
"baseline_risk_score": 0.551,
"kyc_tier": "tier_2",
"session_entropy": 0.333
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 331,
"timestamp": "2026-01-01T22:25:00Z",
"transaction_amount_usd": 8.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 696812.47,
"financial_exposure_usd": 877636.29,
"recoverable_pct": 0.366
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104558",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "low",
"timestamp": "2026-01-04T03:58:00Z",
"trace_id": "ed1f9cdb-6f5f-de05-e7ea-9830310f212c"
} | {
"account_age_days": 1245,
"account_id": "ACCT-B75016540A13",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_2",
"session_entropy": 0.423
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 911,
"timestamp": "2026-01-04T03:58:00Z",
"transaction_amount_usd": 2016305.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2588877.58,
"financial_exposure_usd": 4259229.53,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103585",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-03T11:45:00Z",
"trace_id": "0843f7a5-faf1-ed59-d230-4585b83e9e34"
} | {
"account_age_days": 720,
"account_id": "ACCT-8112A45861C1",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_2",
"session_entropy": 0.498
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 385,
"timestamp": "2026-01-03T00:29:00Z",
"transaction_amount_usd": 21.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2357226.78,
"financial_exposure_usd": 3090515.29,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107020",
"label": "benign",
"label_confidence": 0.501,
"severity": "high",
"timestamp": "2026-01-05T21:00:00Z",
"trace_id": "c9cf503e-8b8d-fd46-b7b9-36bcfb85bd3e"
} | {
"account_age_days": 1845,
"account_id": "ACCT-A39BD4FB5F9D",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.49
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1020,
"timestamp": "2026-01-05T21:00:00Z",
"transaction_amount_usd": 1843.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1828.56,
"financial_exposure_usd": 1950.62,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102069",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "low",
"timestamp": "2026-01-02T10:29:00Z",
"trace_id": "d6d917e6-a21d-411b-20f3-ee533a9e0458"
} | {
"account_age_days": 210,
"account_id": "ACCT-AE306AA3006E",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1025,
"timestamp": "2026-01-02T10:29:00Z",
"transaction_amount_usd": 85963.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.553,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 65276.14,
"financial_exposure_usd": 159119.58,
"recoverable_pct": 0.383
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103572",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "medium",
"timestamp": "2026-01-03T11:32:00Z",
"trace_id": "12be9088-5b87-f288-8a17-e59d94323e34"
} | {
"account_age_days": 895,
"account_id": "ACCT-F741823C1080",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.757
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 368,
"timestamp": "2026-01-03T11:32:00Z",
"transaction_amount_usd": 491554.48
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5924988.19,
"financial_exposure_usd": 6289298.83,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109083",
"label": "benign",
"label_confidence": 0.556,
"severity": "low",
"timestamp": "2026-01-07T07:23:00Z",
"trace_id": "afb56a02-b985-5399-8a1f-e85e26926820"
} | {
"account_age_days": 1272,
"account_id": "ACCT-6FBD677EED92",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.535
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 398,
"timestamp": "2026-01-06T22:35:00Z",
"transaction_amount_usd": 22.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1666.38,
"financial_exposure_usd": 2617.38,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101588",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "medium",
"timestamp": "2026-01-02T02:28:00Z",
"trace_id": "acd51833-fa24-ca05-4841-e85953c4cefd"
} | {
"account_age_days": 949,
"account_id": "ACCT-A3280F173D74",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.291
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 203,
"timestamp": "2026-01-02T02:28:00Z",
"transaction_amount_usd": 99102.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.687,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 355699.12,
"financial_exposure_usd": 639335.29,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104106",
"label": "fraudulent",
"label_confidence": 0.717,
"severity": "medium",
"timestamp": "2026-01-03T20:26:00Z",
"trace_id": "5fc79fa9-0a26-6d73-b777-212121125149"
} | {
"account_age_days": 21,
"account_id": "ACCT-B70C1130C2CE",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_2",
"session_entropy": 0.467
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 261,
"timestamp": "2026-01-03T16:04:00Z",
"transaction_amount_usd": 11.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.75,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 879885.75,
"financial_exposure_usd": 1961237.62,
"recoverable_pct": 0.518
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104994",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-04T11:14:00Z",
"trace_id": "5336b653-fc9d-4281-4ec4-2cf2f65e7ae4"
} | {
"account_age_days": 1463,
"account_id": "ACCT-F22F1D1AA733",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.534
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1172,
"timestamp": "2026-01-04T11:14:00Z",
"transaction_amount_usd": 2427038.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3249114.38,
"financial_exposure_usd": 7008712.18,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101020",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-01T17:00:00Z",
"trace_id": "984e0613-ec20-6c6b-3a75-27f8cd6a227b"
} | {
"account_age_days": 154,
"account_id": "ACCT-C3B64F94AEBE",
"baseline_risk_score": 0.515,
"kyc_tier": "tier_2",
"session_entropy": 0.194
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 426,
"timestamp": "2026-01-01T17:00:00Z",
"transaction_amount_usd": 54634.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.947,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 397005.01,
"financial_exposure_usd": 689176.14,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100321",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "critical",
"timestamp": "2026-01-01T05:21:00Z",
"trace_id": "8eeefe95-5987-6711-3c20-fe71426cd241"
} | {
"account_age_days": 1307,
"account_id": "ACCT-163DCF6F269B",
"baseline_risk_score": 0.552,
"kyc_tier": "tier_2",
"session_entropy": 0.386
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 144,
"timestamp": "2025-12-31T21:34:00Z",
"transaction_amount_usd": 23.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.713,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 82171.89,
"financial_exposure_usd": 164945.45,
"recoverable_pct": 0.218
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108134",
"label": "benign",
"label_confidence": 0.678,
"severity": "low",
"timestamp": "2026-01-06T15:34:00Z",
"trace_id": "321becc2-b677-2491-ebe5-a9a19c42b118"
} | {
"account_age_days": 1640,
"account_id": "ACCT-DFDB8A4F9324",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.109
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1017,
"timestamp": "2026-01-06T15:34:00Z",
"transaction_amount_usd": 10999.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1371.57,
"financial_exposure_usd": 2492.02,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106773",
"label": "benign",
"label_confidence": 0.575,
"severity": "high",
"timestamp": "2026-01-05T16:53:00Z",
"trace_id": "0a347895-7af2-8233-d04c-c42232729fe1"
} | {
"account_age_days": 1490,
"account_id": "ACCT-5BD6742B9D5D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1031,
"timestamp": "2026-01-05T16:53:00Z",
"transaction_amount_usd": 8921.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1599.42,
"financial_exposure_usd": 2998.22,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105986",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "low",
"timestamp": "2026-01-05T03:46:00Z",
"trace_id": "c957cadf-d04d-ba60-85dc-3f27f58d23b8"
} | {
"account_age_days": 1652,
"account_id": "ACCT-79906AA7E579",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_1",
"session_entropy": 0.793
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 512,
"timestamp": "2026-01-05T03:46:00Z",
"transaction_amount_usd": 865025.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2692046.65,
"financial_exposure_usd": 3976636.05,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103743",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "low",
"timestamp": "2026-01-03T14:23:00Z",
"trace_id": "fb5145ec-78c0-6a20-cb8c-6ce292c3274e"
} | {
"account_age_days": 1527,
"account_id": "ACCT-26D804E273C0",
"baseline_risk_score": 0.247,
"kyc_tier": "tier_1",
"session_entropy": 0.529
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 908,
"timestamp": "2026-01-03T14:23:00Z",
"transaction_amount_usd": 395867.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.545,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5204227.25,
"financial_exposure_usd": 6824268.57,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108643",
"label": "benign",
"label_confidence": 0.47,
"severity": "critical",
"timestamp": "2026-01-07T00:03:00Z",
"trace_id": "1ce16b67-31de-9eb4-6f16-7aa495eee92c"
} | {
"account_age_days": 1041,
"account_id": "ACCT-915DBC5CC3A6",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_2",
"session_entropy": 0.31
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 285,
"timestamp": "2026-01-06T21:21:00Z",
"transaction_amount_usd": 6.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3634.67,
"financial_exposure_usd": 6961.53,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101493",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "high",
"timestamp": "2026-01-02T00:53:00Z",
"trace_id": "afc49cc8-a738-3aa7-d12f-73d1c5fe8478"
} | {
"account_age_days": 350,
"account_id": "ACCT-280ADAFD05C3",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_1",
"session_entropy": 0.135
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 387,
"timestamp": "2026-01-01T18:25:00Z",
"transaction_amount_usd": 7.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 694429.96,
"financial_exposure_usd": 838045.32,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105275",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "critical",
"timestamp": "2026-01-04T15:55:00Z",
"trace_id": "4e14c68c-c26c-48f0-9898-efff0bfb8b75"
} | {
"account_age_days": 216,
"account_id": "ACCT-396E389F7F34",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_2",
"session_entropy": 0.88
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 125,
"timestamp": "2026-01-04T09:19:00Z",
"transaction_amount_usd": 18.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.854,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2599405.44,
"financial_exposure_usd": 4131323.72,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107809",
"label": "benign",
"label_confidence": 0.563,
"severity": "high",
"timestamp": "2026-01-06T10:09:00Z",
"trace_id": "6c02ec60-c0bc-762d-bfba-d9917d4c6469"
} | {
"account_age_days": 26,
"account_id": "ACCT-83D28E02FAB1",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_2",
"session_entropy": 0.817
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 438,
"timestamp": "2026-01-06T10:09:00Z",
"transaction_amount_usd": 9701.52
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 178.93,
"financial_exposure_usd": 416.72,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106089",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "high",
"timestamp": "2026-01-05T05:29:00Z",
"trace_id": "43d8c7a1-b018-cd00-fb9e-d3efe629d511"
} | {
"account_age_days": 256,
"account_id": "ACCT-0B2FEE36C69E",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 196,
"timestamp": "2026-01-04T20:31:00Z",
"transaction_amount_usd": 13.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.652,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3463705.98,
"financial_exposure_usd": 5691729.99,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108151",
"label": "benign",
"label_confidence": 0.545,
"severity": "low",
"timestamp": "2026-01-06T15:51:00Z",
"trace_id": "41f1445e-6341-3ed8-5a07-7b6a944cc4b0"
} | {
"account_age_days": 1416,
"account_id": "ACCT-A8D84A676BFB",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 361,
"timestamp": "2026-01-06T15:51:00Z",
"transaction_amount_usd": 1093.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.469,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3553.93,
"financial_exposure_usd": 4742.6,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101040",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "medium",
"timestamp": "2026-01-01T17:20:00Z",
"trace_id": "11538be1-50ea-a4be-1e19-fd8528a56ddc"
} | {
"account_age_days": 632,
"account_id": "ACCT-B6B67988874C",
"baseline_risk_score": 0.54,
"kyc_tier": "tier_3",
"session_entropy": 0.833
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 215,
"timestamp": "2026-01-01T17:20:00Z",
"transaction_amount_usd": 16468.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 417541.08,
"financial_exposure_usd": 662409.17,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107036",
"label": "benign",
"label_confidence": 0.641,
"severity": "low",
"timestamp": "2026-01-05T21:16:00Z",
"trace_id": "994c9c66-d6df-7323-d119-baaa2b534279"
} | {
"account_age_days": 1575,
"account_id": "ACCT-0ABF68150887",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 776,
"timestamp": "2026-01-05T21:16:00Z",
"transaction_amount_usd": 14878.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2174.43,
"financial_exposure_usd": 2720.5,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108271",
"label": "benign",
"label_confidence": 0.569,
"severity": "medium",
"timestamp": "2026-01-06T17:51:00Z",
"trace_id": "1019d5e8-1952-aa68-5fbf-d2ce8a3caa5c"
} | {
"account_age_days": 1989,
"account_id": "ACCT-77017BCBECE7",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_3",
"session_entropy": 0.142
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 239,
"timestamp": "2026-01-06T08:12:00Z",
"transaction_amount_usd": 12.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3192.31,
"financial_exposure_usd": 3931.33,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104927",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "medium",
"timestamp": "2026-01-04T10:07:00Z",
"trace_id": "aa3ec273-8885-9a6a-23f2-84b18fbfc358"
} | {
"account_age_days": 1276,
"account_id": "ACCT-70DF3BC54ED5",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_2",
"session_entropy": 0.865
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1186,
"timestamp": "2026-01-04T10:07:00Z",
"transaction_amount_usd": 2331166.44
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3176449.85,
"financial_exposure_usd": 4951859.78,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.