schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103737",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "low",
"timestamp": "2026-01-03T14:17:00Z",
"trace_id": "8297b6d9-5f7c-56ab-ac80-c6411a56659e"
} | {
"account_age_days": 1376,
"account_id": "ACCT-7FDBF2D8177D",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_3",
"session_entropy": 0.291
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1107,
"timestamp": "2026-01-03T14:17:00Z",
"transaction_amount_usd": 2652025.48
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3187300.42,
"financial_exposure_usd": 4522253.05,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100999",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "critical",
"timestamp": "2026-01-01T16:39:00Z",
"trace_id": "57b919a4-fbbc-198b-210f-214cb9f8d477"
} | {
"account_age_days": 94,
"account_id": "ACCT-923F3C9CC9F1",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 226,
"timestamp": "2026-01-01T16:39:00Z",
"transaction_amount_usd": 82689.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.887,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1131758.22,
"financial_exposure_usd": 1283025.28,
"recoverable_pct": 0.033
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101840",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-02T06:40:00Z",
"trace_id": "5aa45ce4-b7ed-9a19-a80c-c4db9841d8fd"
} | {
"account_age_days": 410,
"account_id": "ACCT-B04C80DD6187",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 515,
"timestamp": "2026-01-02T06:40:00Z",
"transaction_amount_usd": 23747.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.779,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 826185.38,
"financial_exposure_usd": 833692.39,
"recoverable_pct": 0.279
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101843",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-02T06:43:00Z",
"trace_id": "2c408179-90d6-bc70-1a2b-7c904702f4f0"
} | {
"account_age_days": 1242,
"account_id": "ACCT-F9AACAE28EDC",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.532
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 97,
"timestamp": "2026-01-02T02:03:00Z",
"transaction_amount_usd": 6.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 713709.99,
"financial_exposure_usd": 1022250.16,
"recoverable_pct": 0.301
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104424",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-04T01:44:00Z",
"trace_id": "3f578d95-2c3d-359c-11d2-2fb13740f095"
} | {
"account_age_days": 1975,
"account_id": "ACCT-90B95BAB0DED",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.493
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 214,
"timestamp": "2026-01-03T12:54:00Z",
"transaction_amount_usd": 2.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4521914.75,
"financial_exposure_usd": 4575265.28,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109142",
"label": "benign",
"label_confidence": 0.709,
"severity": "low",
"timestamp": "2026-01-07T08:22:00Z",
"trace_id": "cc7e239d-c044-0116-5cbb-da0459ff7f39"
} | {
"account_age_days": 77,
"account_id": "ACCT-DB04F64021CB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.182
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 324,
"timestamp": "2026-01-07T08:22:00Z",
"transaction_amount_usd": 11026.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2005.81,
"financial_exposure_usd": 2248.74,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101635",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "critical",
"timestamp": "2026-01-02T03:15:00Z",
"trace_id": "20f762b6-1bb5-510b-3ab4-4ff9b8bc90d4"
} | {
"account_age_days": 470,
"account_id": "ACCT-C63E73594ADF",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1031,
"timestamp": "2026-01-02T03:15:00Z",
"transaction_amount_usd": 75493.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 381319.71,
"financial_exposure_usd": 449871.09,
"recoverable_pct": 0.387
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109786",
"label": "benign",
"label_confidence": 0.587,
"severity": "high",
"timestamp": "2026-01-07T19:06:00Z",
"trace_id": "bd0176ad-38d5-835f-a874-aca896b89b70"
} | {
"account_age_days": 611,
"account_id": "ACCT-C9D9F4A8C465",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.586
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 89,
"timestamp": "2026-01-07T16:22:00Z",
"transaction_amount_usd": 19.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1973.01,
"financial_exposure_usd": 2901.48,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101897",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "critical",
"timestamp": "2026-01-02T07:37:00Z",
"trace_id": "ae6aaee8-8440-ab74-cd35-3c516e601387"
} | {
"account_age_days": 815,
"account_id": "ACCT-0A47F05CA8FB",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 918,
"timestamp": "2026-01-02T07:37:00Z",
"transaction_amount_usd": 53422.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 588709.5,
"financial_exposure_usd": 975079.27,
"recoverable_pct": 0.094
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103834",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-03T15:54:00Z",
"trace_id": "cbfbca4d-1899-69ab-a9cd-358ae514230d"
} | {
"account_age_days": 227,
"account_id": "ACCT-1B3931E45726",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1150,
"timestamp": "2026-01-03T15:54:00Z",
"transaction_amount_usd": 1185880.17
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.593,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4613957.33,
"financial_exposure_usd": 5607524.56,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109678",
"label": "benign",
"label_confidence": 0.569,
"severity": "high",
"timestamp": "2026-01-07T17:18:00Z",
"trace_id": "22bb6b2d-eac9-851c-302a-61815e9bd0f2"
} | {
"account_age_days": 1054,
"account_id": "ACCT-53C6C6AF580B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.843
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 584,
"timestamp": "2026-01-07T17:18:00Z",
"transaction_amount_usd": 13842.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3505.94,
"financial_exposure_usd": 3526.12,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107083",
"label": "benign",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-05T22:03:00Z",
"trace_id": "42a110b2-0ca0-973b-e6f3-11d68b79831f"
} | {
"account_age_days": 1918,
"account_id": "ACCT-E3DBEA650669",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.795
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 981,
"timestamp": "2026-01-05T22:03:00Z",
"transaction_amount_usd": 5150.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 882.78,
"financial_exposure_usd": 2155.51,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106487",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-05T12:07:00Z",
"trace_id": "b61bc458-4895-ec52-edfb-a39acc1fd1af"
} | {
"account_age_days": 1426,
"account_id": "ACCT-565DB7AD18EF",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1007,
"timestamp": "2026-01-05T12:07:00Z",
"transaction_amount_usd": 2646111.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.885,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1015561.82,
"financial_exposure_usd": 2189765.19,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102313",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "low",
"timestamp": "2026-01-02T14:33:00Z",
"trace_id": "7972fcb1-e2c7-66ac-d4c8-e623a166563a"
} | {
"account_age_days": 603,
"account_id": "ACCT-AF3213A96C20",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 326,
"timestamp": "2026-01-02T11:25:00Z",
"transaction_amount_usd": 4.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.351,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 205639.29,
"financial_exposure_usd": 390666.94,
"recoverable_pct": 0.067
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103974",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "medium",
"timestamp": "2026-01-03T18:14:00Z",
"trace_id": "3f99f5a7-8af4-b5da-33cd-1fed8084f1d1"
} | {
"account_age_days": 1625,
"account_id": "ACCT-4B27CA38A69B",
"baseline_risk_score": 0.242,
"kyc_tier": "tier_2",
"session_entropy": 0.334
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 147,
"timestamp": "2026-01-03T18:14:00Z",
"transaction_amount_usd": 951716.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.534,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3298069.06,
"financial_exposure_usd": 4549017.1,
"recoverable_pct": 0.703
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100353",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "medium",
"timestamp": "2026-01-01T05:53:00Z",
"trace_id": "3513ee53-00e2-08d1-7165-2926cd7acc6f"
} | {
"account_age_days": 1434,
"account_id": "ACCT-37B3EF4DECE1",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_3",
"session_entropy": 0.934
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 427,
"timestamp": "2026-01-01T05:53:00Z",
"transaction_amount_usd": 28945.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 946031.53,
"financial_exposure_usd": 1045029.09,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104939",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-04T10:19:00Z",
"trace_id": "b87465dc-f5b7-2c1c-7101-5915f385a3fa"
} | {
"account_age_days": 832,
"account_id": "ACCT-D07A2048ADAA",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.352
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 924,
"timestamp": "2026-01-04T10:19:00Z",
"transaction_amount_usd": 1828964.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.377,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1939117.32,
"financial_exposure_usd": 4671013.87,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102603",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "medium",
"timestamp": "2026-01-02T19:23:00Z",
"trace_id": "f460d1d4-2830-4942-3b58-de21e43a5736"
} | {
"account_age_days": 808,
"account_id": "ACCT-26B46C2A9DEC",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 553,
"timestamp": "2026-01-02T19:23:00Z",
"transaction_amount_usd": 113538.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 693834.62,
"financial_exposure_usd": 804910.81,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108811",
"label": "benign",
"label_confidence": 0.482,
"severity": "low",
"timestamp": "2026-01-07T02:51:00Z",
"trace_id": "14e94d3f-ba5e-5e5a-8a3e-3363fea129d7"
} | {
"account_age_days": 244,
"account_id": "ACCT-FE1638E613D5",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1172,
"timestamp": "2026-01-07T02:51:00Z",
"transaction_amount_usd": 11989.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1709.66,
"financial_exposure_usd": 1954.65,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100656",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "high",
"timestamp": "2026-01-01T10:56:00Z",
"trace_id": "dbffb2a9-1842-b7ee-bfdb-4ed86c4b1f95"
} | {
"account_age_days": 715,
"account_id": "ACCT-13A353CF16BE",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_1",
"session_entropy": 0.735
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 121,
"timestamp": "2026-01-01T10:56:00Z",
"transaction_amount_usd": 75838.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.806,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 464728.59,
"financial_exposure_usd": 642391.12,
"recoverable_pct": 0.114
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103227",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "high",
"timestamp": "2026-01-03T05:47:00Z",
"trace_id": "18049512-1d01-8060-94f4-f49b743c6408"
} | {
"account_age_days": 1788,
"account_id": "ACCT-3B024FB180AD",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_2",
"session_entropy": 0.533
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 193,
"timestamp": "2026-01-03T03:49:00Z",
"transaction_amount_usd": 12.09
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 329647.44,
"financial_exposure_usd": 804662.47,
"recoverable_pct": 0.203
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101534",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "low",
"timestamp": "2026-01-02T01:34:00Z",
"trace_id": "c55f673b-f068-5f14-4470-0eb4f18637f8"
} | {
"account_age_days": 985,
"account_id": "ACCT-70D1A9CAABEC",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 139,
"timestamp": "2026-01-02T01:34:00Z",
"transaction_amount_usd": 117811.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.547,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 372523.94,
"financial_exposure_usd": 883709.05,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105707",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "critical",
"timestamp": "2026-01-04T23:07:00Z",
"trace_id": "d02689ab-8f74-e19d-5148-22400592b9e0"
} | {
"account_age_days": 1493,
"account_id": "ACCT-0A7C86ACEF4A",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_1",
"session_entropy": 0.597
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 802,
"timestamp": "2026-01-04T23:07:00Z",
"transaction_amount_usd": 1567847.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.796,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1607989.26,
"financial_exposure_usd": 4015546.58,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100729",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "critical",
"timestamp": "2026-01-01T12:09:00Z",
"trace_id": "e6aab28f-066a-3f4b-65de-0d3ac942d852"
} | {
"account_age_days": 732,
"account_id": "ACCT-B373CA69E22B",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_1",
"session_entropy": 0.381
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 107,
"timestamp": "2026-01-01T12:09:00Z",
"transaction_amount_usd": 106837.49
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.692,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 532231.93,
"financial_exposure_usd": 1069189.57,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107044",
"label": "benign",
"label_confidence": 0.666,
"severity": "critical",
"timestamp": "2026-01-05T21:24:00Z",
"trace_id": "502b4315-449c-521e-2cd0-1aca7ea9ac1b"
} | {
"account_age_days": 342,
"account_id": "ACCT-10AF7449AF47",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_3",
"session_entropy": 0.856
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1089,
"timestamp": "2026-01-05T21:24:00Z",
"transaction_amount_usd": 621.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.668,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2251.63,
"financial_exposure_usd": 2392.27,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106587",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "medium",
"timestamp": "2026-01-05T13:47:00Z",
"trace_id": "3c804b46-83ea-c52f-446b-93cd24c12e25"
} | {
"account_age_days": 1196,
"account_id": "ACCT-C45462DF1577",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_3",
"session_entropy": 0.861
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 344,
"timestamp": "2026-01-05T03:19:00Z",
"transaction_amount_usd": 21.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.824,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5162480.26,
"financial_exposure_usd": 7683269.91,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100688",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-01T11:28:00Z",
"trace_id": "58a008b6-b4f4-bf33-5e20-fb19b580d71a"
} | {
"account_age_days": 775,
"account_id": "ACCT-51C30102AB58",
"baseline_risk_score": 0.551,
"kyc_tier": "tier_3",
"session_entropy": 0.677
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 786,
"timestamp": "2026-01-01T11:28:00Z",
"transaction_amount_usd": 106629.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 622117.49,
"financial_exposure_usd": 656712.88,
"recoverable_pct": 0.38
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108415",
"label": "benign",
"label_confidence": 0.517,
"severity": "medium",
"timestamp": "2026-01-06T20:15:00Z",
"trace_id": "4bcf06ae-e738-2653-feb2-a28ef5fd940e"
} | {
"account_age_days": 1789,
"account_id": "ACCT-94DAD7319A71",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.232
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 166,
"timestamp": "2026-01-06T20:15:00Z",
"transaction_amount_usd": 14840.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 625.18,
"financial_exposure_usd": 1219.12,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102780",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "critical",
"timestamp": "2026-01-02T22:20:00Z",
"trace_id": "ce9d2105-162d-486f-834c-a7102f3ea60f"
} | {
"account_age_days": 1627,
"account_id": "ACCT-018CA7E2DEBE",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_1",
"session_entropy": 0.256
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 108,
"timestamp": "2026-01-02T19:15:00Z",
"transaction_amount_usd": 12.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 591785.92,
"financial_exposure_usd": 689875.83,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101815",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "medium",
"timestamp": "2026-01-02T06:15:00Z",
"trace_id": "2231892e-4043-620c-6ac2-866fe78a824c"
} | {
"account_age_days": 1170,
"account_id": "ACCT-A3BF18AE6602",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_2",
"session_entropy": 0.497
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 356,
"timestamp": "2026-01-02T06:15:00Z",
"transaction_amount_usd": 70482.36
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.386,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 653886.72,
"financial_exposure_usd": 1067182.02,
"recoverable_pct": 0.292
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103574",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "medium",
"timestamp": "2026-01-03T11:34:00Z",
"trace_id": "463aa689-4953-47df-efff-2ba7e9d70b76"
} | {
"account_age_days": 430,
"account_id": "ACCT-F0508E2F9B34",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_1",
"session_entropy": 0.31
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 273,
"timestamp": "2026-01-03T11:34:00Z",
"transaction_amount_usd": 2966879.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.552,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3836073.02,
"financial_exposure_usd": 4020056.16,
"recoverable_pct": 0.771
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107796",
"label": "benign",
"label_confidence": 0.477,
"severity": "medium",
"timestamp": "2026-01-06T09:56:00Z",
"trace_id": "664e5b60-f0f8-6ce2-4369-bb6cfd154ff3"
} | {
"account_age_days": 115,
"account_id": "ACCT-2CFC17CAADF6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.807
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 120,
"timestamp": "2026-01-06T02:19:00Z",
"transaction_amount_usd": 23.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1639.47,
"financial_exposure_usd": 1834.47,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107767",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-06T09:27:00Z",
"trace_id": "8f0cb9bf-5b39-87a7-b146-e0c1931d4077"
} | {
"account_age_days": 1310,
"account_id": "ACCT-206DC77C6111",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.859
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 375,
"timestamp": "2026-01-06T02:40:00Z",
"transaction_amount_usd": 17.6
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 196.36,
"financial_exposure_usd": 239.41,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104324",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-04T00:04:00Z",
"trace_id": "a653570e-8a03-1ecb-e8f5-537c91d59225"
} | {
"account_age_days": 706,
"account_id": "ACCT-D721B049CC0B",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 369,
"timestamp": "2026-01-03T22:13:00Z",
"transaction_amount_usd": 21.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2438173.6,
"financial_exposure_usd": 3017464.17,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109667",
"label": "benign",
"label_confidence": 0.597,
"severity": "low",
"timestamp": "2026-01-07T17:07:00Z",
"trace_id": "512177a3-395c-5414-f00e-e5a4b01aad3c"
} | {
"account_age_days": 1559,
"account_id": "ACCT-67F4CDFB9636",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_2",
"session_entropy": 0.642
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 293,
"timestamp": "2026-01-07T17:07:00Z",
"transaction_amount_usd": 13165.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1862.19,
"financial_exposure_usd": 3386.14,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102042",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-02T10:02:00Z",
"trace_id": "278ec9c4-92a0-eaf4-e0ef-37566a2dc7e7"
} | {
"account_age_days": 1909,
"account_id": "ACCT-29B0CD9F988B",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1098,
"timestamp": "2026-01-02T10:02:00Z",
"transaction_amount_usd": 114742.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.505,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 353085.91,
"financial_exposure_usd": 436025.13,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103945",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "low",
"timestamp": "2026-01-03T17:45:00Z",
"trace_id": "db312fa0-b589-9258-be5f-06743632f8df"
} | {
"account_age_days": 1888,
"account_id": "ACCT-AAC6F35E77CB",
"baseline_risk_score": 0.228,
"kyc_tier": "tier_3",
"session_entropy": 0.498
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 294,
"timestamp": "2026-01-03T08:57:00Z",
"transaction_amount_usd": 9.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4876074.11,
"financial_exposure_usd": 8804541.34,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102079",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "high",
"timestamp": "2026-01-02T10:39:00Z",
"trace_id": "ebe2712d-7d8e-32c2-af92-5ea875b6abc8"
} | {
"account_age_days": 939,
"account_id": "ACCT-55A109CEC5D5",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.409
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 325,
"timestamp": "2026-01-02T10:39:00Z",
"transaction_amount_usd": 1756.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.549,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 288175.11,
"financial_exposure_usd": 482515.92,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103904",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-03T17:04:00Z",
"trace_id": "7d46f308-1240-3109-2354-0c49db265125"
} | {
"account_age_days": 1923,
"account_id": "ACCT-B2D9626A02B2",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_1",
"session_entropy": 0.351
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1119,
"timestamp": "2026-01-03T17:04:00Z",
"transaction_amount_usd": 2670693.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.815,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4829238.68,
"financial_exposure_usd": 5963694.61,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103431",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "critical",
"timestamp": "2026-01-03T09:11:00Z",
"trace_id": "0ceaa97b-9830-dcd9-1388-ee7de5e55e65"
} | {
"account_age_days": 1235,
"account_id": "ACCT-FDE3006CF961",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_1",
"session_entropy": 0.537
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 445,
"timestamp": "2026-01-03T09:11:00Z",
"transaction_amount_usd": 1437035.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.891,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2576118.04,
"financial_exposure_usd": 3226299.39,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106873",
"label": "benign",
"label_confidence": 0.547,
"severity": "low",
"timestamp": "2026-01-05T18:33:00Z",
"trace_id": "ff87b00f-45cb-2551-4153-385eee3ee337"
} | {
"account_age_days": 1227,
"account_id": "ACCT-F336BD7B0925",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.607
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 160,
"timestamp": "2026-01-05T09:35:00Z",
"transaction_amount_usd": 9.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2277.73,
"financial_exposure_usd": 2802.4,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102140",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-02T11:40:00Z",
"trace_id": "b4bbda22-33c2-0dc2-72d1-867e141fbd4d"
} | {
"account_age_days": 1555,
"account_id": "ACCT-76A6E6DBD80C",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_1",
"session_entropy": 0.619
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1057,
"timestamp": "2026-01-02T11:40:00Z",
"transaction_amount_usd": 9241.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.682,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 465295.72,
"financial_exposure_usd": 718907.69,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106741",
"label": "benign",
"label_confidence": 0.573,
"severity": "critical",
"timestamp": "2026-01-05T16:21:00Z",
"trace_id": "810c4c9c-70d7-8268-c574-0ea1adb4d83d"
} | {
"account_age_days": 489,
"account_id": "ACCT-E464D9786676",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 303,
"timestamp": "2026-01-05T05:09:00Z",
"transaction_amount_usd": 8.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.768,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1555.79,
"financial_exposure_usd": 1615.33,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100848",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "low",
"timestamp": "2026-01-01T14:08:00Z",
"trace_id": "b96d3eb3-3713-67e3-5402-52e661ead2fa"
} | {
"account_age_days": 640,
"account_id": "ACCT-80BBC47BFF5B",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_1",
"session_entropy": 0.831
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 384,
"timestamp": "2026-01-01T04:50:00Z",
"transaction_amount_usd": 17.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.583,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 593767.58,
"financial_exposure_usd": 682559.03,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109287",
"label": "benign",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-07T10:47:00Z",
"trace_id": "7287a01c-c420-c4dc-7d90-c8e7823e823f"
} | {
"account_age_days": 8,
"account_id": "ACCT-27CD19A9D8C6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.824
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1065,
"timestamp": "2026-01-07T10:47:00Z",
"transaction_amount_usd": 7950.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 351.54,
"financial_exposure_usd": 425.8,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106677",
"label": "benign",
"label_confidence": 0.568,
"severity": "low",
"timestamp": "2026-01-05T15:17:00Z",
"trace_id": "261a1a8b-cd97-8988-2e89-83902ad4bbd1"
} | {
"account_age_days": 1416,
"account_id": "ACCT-82274C857CC6",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_3",
"session_entropy": 0.359
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 287,
"timestamp": "2026-01-05T15:17:00Z",
"transaction_amount_usd": 7914.27
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 990.56,
"financial_exposure_usd": 2211.09,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104669",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "high",
"timestamp": "2026-01-04T05:49:00Z",
"trace_id": "590f3931-96b7-0312-cd5f-976730040448"
} | {
"account_age_days": 3,
"account_id": "ACCT-BB265693DF3E",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_1",
"session_entropy": 0.246
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 964,
"timestamp": "2026-01-04T05:49:00Z",
"transaction_amount_usd": 636967.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.554,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1733886.82,
"financial_exposure_usd": 4068306.41,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106146",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-05T06:26:00Z",
"trace_id": "bf4ae457-c967-4401-3d25-05210b44c369"
} | {
"account_age_days": 608,
"account_id": "ACCT-45CD21BDB7D3",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_2",
"session_entropy": 0.793
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 226,
"timestamp": "2026-01-05T06:26:00Z",
"transaction_amount_usd": 1164699.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 590362.85,
"financial_exposure_usd": 1230503.67,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103101",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-03T03:41:00Z",
"trace_id": "ca60c0dc-c333-bf5d-a597-fa575df9723f"
} | {
"account_age_days": 632,
"account_id": "ACCT-894F8627BF0F",
"baseline_risk_score": 0.59,
"kyc_tier": "tier_1",
"session_entropy": 0.752
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 338,
"timestamp": "2026-01-03T01:49:00Z",
"transaction_amount_usd": 10.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.541,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 498234.67,
"financial_exposure_usd": 799246.12,
"recoverable_pct": 0.068
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109311",
"label": "benign",
"label_confidence": 0.629,
"severity": "critical",
"timestamp": "2026-01-07T11:11:00Z",
"trace_id": "c4777142-db8f-ab9f-fa0c-4e603e403604"
} | {
"account_age_days": 274,
"account_id": "ACCT-AB8F6E417F5F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.499
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 94,
"timestamp": "2026-01-07T07:37:00Z",
"transaction_amount_usd": 13.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2279.98,
"financial_exposure_usd": 2936.85,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108215",
"label": "benign",
"label_confidence": 0.624,
"severity": "high",
"timestamp": "2026-01-06T16:55:00Z",
"trace_id": "087551ba-088b-7944-95ae-cab980212e68"
} | {
"account_age_days": 978,
"account_id": "ACCT-58686D503AE4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 258,
"timestamp": "2026-01-06T16:55:00Z",
"transaction_amount_usd": 3120.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1589.23,
"financial_exposure_usd": 3968.91,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106442",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-05T11:22:00Z",
"trace_id": "b0377429-9e53-bb0a-8584-d79ba5b35e78"
} | {
"account_age_days": 1681,
"account_id": "ACCT-02C1D0E0CAFB",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 366,
"timestamp": "2026-01-05T11:22:00Z",
"transaction_amount_usd": 878473.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.607,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4144117.07,
"financial_exposure_usd": 5717865.94,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102912",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-03T00:32:00Z",
"trace_id": "08095a1a-e3ce-b2fd-0bc4-951b029ac6fc"
} | {
"account_age_days": 357,
"account_id": "ACCT-7721025FEE26",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.812
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 391,
"timestamp": "2026-01-02T16:26:00Z",
"transaction_amount_usd": 3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.848,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 487776.98,
"financial_exposure_usd": 802287.6,
"recoverable_pct": 0.283
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109903",
"label": "benign",
"label_confidence": 0.589,
"severity": "low",
"timestamp": "2026-01-07T21:03:00Z",
"trace_id": "1bfeba22-8742-3c1a-0f0f-fdffa59d4224"
} | {
"account_age_days": 553,
"account_id": "ACCT-36FF437487F3",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.867
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 341,
"timestamp": "2026-01-07T12:31:00Z",
"transaction_amount_usd": 8.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1525.22,
"financial_exposure_usd": 2861.96,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104022",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-03T19:02:00Z",
"trace_id": "9a00cdf3-07c7-b7f6-0b2c-34b8af033179"
} | {
"account_age_days": 230,
"account_id": "ACCT-1C7E9C4A8065",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 613,
"timestamp": "2026-01-03T19:02:00Z",
"transaction_amount_usd": 2944831.23
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.71,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5900155.05,
"financial_exposure_usd": 7683756.51,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108674",
"label": "benign",
"label_confidence": 0.549,
"severity": "medium",
"timestamp": "2026-01-07T00:34:00Z",
"trace_id": "3a44ca67-2f5b-a1e6-4319-de5c8bbea237"
} | {
"account_age_days": 1528,
"account_id": "ACCT-08E64E6AEF12",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.12
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 679,
"timestamp": "2026-01-07T00:34:00Z",
"transaction_amount_usd": 13644.39
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 838.73,
"financial_exposure_usd": 1065.14,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106678",
"label": "benign",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-05T15:18:00Z",
"trace_id": "677ec862-29be-7397-9e69-844e35983ae0"
} | {
"account_age_days": 429,
"account_id": "ACCT-1CEF58D1689C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.587
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 183,
"timestamp": "2026-01-05T10:35:00Z",
"transaction_amount_usd": 9.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 839.29,
"financial_exposure_usd": 1675.72,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101135",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "low",
"timestamp": "2026-01-01T18:55:00Z",
"trace_id": "c47bcecd-93a1-0485-420d-e6ddbe849e1a"
} | {
"account_age_days": 105,
"account_id": "ACCT-3965894FD716",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_2",
"session_entropy": 0.456
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 499,
"timestamp": "2026-01-01T18:55:00Z",
"transaction_amount_usd": 116353.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.509,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1067149.63,
"financial_exposure_usd": 1081453.74,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105487",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "low",
"timestamp": "2026-01-04T19:27:00Z",
"trace_id": "a0ff70d1-c3c3-1879-8fae-733d17231a01"
} | {
"account_age_days": 1218,
"account_id": "ACCT-7BEC6F95116D",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.289
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 914,
"timestamp": "2026-01-04T19:27:00Z",
"transaction_amount_usd": 1567083.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.561,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2504717.28,
"financial_exposure_usd": 5300455.6,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106780",
"label": "benign",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-05T17:00:00Z",
"trace_id": "db3db1a4-dcd7-dd21-2e95-07ac4fe2f682"
} | {
"account_age_days": 1148,
"account_id": "ACCT-F7B3813DE8A3",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_1",
"session_entropy": 0.679
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 975,
"timestamp": "2026-01-05T17:00:00Z",
"transaction_amount_usd": 5460.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1301.09,
"financial_exposure_usd": 2975.93,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103567",
"label": "fraudulent",
"label_confidence": 0.626,
"severity": "high",
"timestamp": "2026-01-03T11:27:00Z",
"trace_id": "4286ea84-4abd-c34c-4c55-386d6a495ff6"
} | {
"account_age_days": 623,
"account_id": "ACCT-36DCE2237143",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 995,
"timestamp": "2026-01-03T11:27:00Z",
"transaction_amount_usd": 2923603.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3185494.79,
"financial_exposure_usd": 3974215.46,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104681",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-04T06:01:00Z",
"trace_id": "dbb1a3ad-1348-e1d9-cca8-08636d8760b0"
} | {
"account_age_days": 204,
"account_id": "ACCT-C95B460E83DA",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 162,
"timestamp": "2026-01-04T06:01:00Z",
"transaction_amount_usd": 1566355.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1371486.02,
"financial_exposure_usd": 2390877.9,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107937",
"label": "benign",
"label_confidence": 0.49,
"severity": "medium",
"timestamp": "2026-01-06T12:17:00Z",
"trace_id": "bf07cd69-b298-6b35-28a5-52a0c416d53d"
} | {
"account_age_days": 638,
"account_id": "ACCT-7564674FAE6E",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 733,
"timestamp": "2026-01-06T12:17:00Z",
"transaction_amount_usd": 280.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6810.35,
"financial_exposure_usd": 10382.63,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102968",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "low",
"timestamp": "2026-01-03T01:28:00Z",
"trace_id": "cf804608-ae5c-e7b9-120c-b45945d8ede4"
} | {
"account_age_days": 1436,
"account_id": "ACCT-5BA151F22A8B",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_3",
"session_entropy": 0.676
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 562,
"timestamp": "2026-01-03T01:28:00Z",
"transaction_amount_usd": 13159.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.357,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 415294.98,
"financial_exposure_usd": 924505.89,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101676",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-02T03:56:00Z",
"trace_id": "90a68dc5-75cf-c21e-00e0-b9fcab20e97a"
} | {
"account_age_days": 18,
"account_id": "ACCT-6EAE3341985C",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_3",
"session_entropy": 0.183
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 144,
"timestamp": "2026-01-02T03:56:00Z",
"transaction_amount_usd": 53195.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 312856.08,
"financial_exposure_usd": 620780.5,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100954",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-01T15:54:00Z",
"trace_id": "c395c9a1-d52a-f54b-8b89-1485357fa016"
} | {
"account_age_days": 609,
"account_id": "ACCT-0FC8C060E853",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.124
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 893,
"timestamp": "2026-01-01T15:54:00Z",
"transaction_amount_usd": 103847.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 154476.89,
"financial_exposure_usd": 248481.87,
"recoverable_pct": 0.179
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102722",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-02T21:22:00Z",
"trace_id": "83b40951-0e2d-2fd4-c901-7334212db862"
} | {
"account_age_days": 60,
"account_id": "ACCT-0A9BE15D5703",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_3",
"session_entropy": 0.372
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 356,
"timestamp": "2026-01-02T21:22:00Z",
"transaction_amount_usd": 60127.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 489331.35,
"financial_exposure_usd": 868333.11,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102153",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "low",
"timestamp": "2026-01-02T11:53:00Z",
"trace_id": "c77bcb8c-ade7-dfba-8f1b-b665e42993ea"
} | {
"account_age_days": 784,
"account_id": "ACCT-8E456AD36354",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.768
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 297,
"timestamp": "2026-01-02T06:52:00Z",
"transaction_amount_usd": 21.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.369,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 530822.83,
"financial_exposure_usd": 693461.24,
"recoverable_pct": 0.342
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104196",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-03T21:56:00Z",
"trace_id": "5dc130fe-4aa9-3571-f943-a961bc9f1cba"
} | {
"account_age_days": 54,
"account_id": "ACCT-2931C94A7391",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_1",
"session_entropy": 0.711
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 322,
"timestamp": "2026-01-03T21:56:00Z",
"transaction_amount_usd": 1745004.89
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2022919.62,
"financial_exposure_usd": 4024383.35,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107730",
"label": "benign",
"label_confidence": 0.733,
"severity": "low",
"timestamp": "2026-01-06T08:50:00Z",
"trace_id": "96840546-359f-5479-3462-4f0dd667eebf"
} | {
"account_age_days": 775,
"account_id": "ACCT-01EB7F1D3513",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.475
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 278,
"timestamp": "2026-01-06T06:06:00Z",
"transaction_amount_usd": 14.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 432.84,
"financial_exposure_usd": 960.67,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103228",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-03T05:48:00Z",
"trace_id": "4b559502-cc91-f80b-a257-31cc1d0947d1"
} | {
"account_age_days": 1019,
"account_id": "ACCT-BAE813C00BAB",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_1",
"session_entropy": 0.216
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 955,
"timestamp": "2026-01-03T05:48:00Z",
"transaction_amount_usd": 72435.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 459075.7,
"financial_exposure_usd": 903448.65,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107431",
"label": "benign",
"label_confidence": 0.553,
"severity": "low",
"timestamp": "2026-01-06T03:51:00Z",
"trace_id": "f0b7351a-d3d3-4c80-2636-fe5550971c10"
} | {
"account_age_days": 1476,
"account_id": "ACCT-F8E80024FA98",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.388
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 321,
"timestamp": "2026-01-06T03:51:00Z",
"transaction_amount_usd": 14259.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.53,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1466.57,
"financial_exposure_usd": 3546.71,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104065",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-03T19:45:00Z",
"trace_id": "7a1cfc61-20ad-2fab-9436-8f5836c3d86a"
} | {
"account_age_days": 1938,
"account_id": "ACCT-6A1C9E7CB003",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.529
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 133,
"timestamp": "2026-01-03T11:57:00Z",
"transaction_amount_usd": 7.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.533,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2314393.98,
"financial_exposure_usd": 3023332.76,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108807",
"label": "benign",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-07T02:47:00Z",
"trace_id": "45402218-a94b-56fa-b8e6-6dacc4776025"
} | {
"account_age_days": 545,
"account_id": "ACCT-2739A7075592",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_1",
"session_entropy": 0.501
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 375,
"timestamp": "2026-01-06T16:46:00Z",
"transaction_amount_usd": 6.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2707.28,
"financial_exposure_usd": 3140.04,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100381",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-01T06:21:00Z",
"trace_id": "e8dab4dc-cecb-e1f1-f655-1ac63879b941"
} | {
"account_age_days": 1848,
"account_id": "ACCT-C8573376DE61",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.658
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 870,
"timestamp": "2026-01-01T06:21:00Z",
"transaction_amount_usd": 100213.52
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.438,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 589492.31,
"financial_exposure_usd": 1024091.86,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107250",
"label": "benign",
"label_confidence": 0.653,
"severity": "medium",
"timestamp": "2026-01-06T00:50:00Z",
"trace_id": "688da99e-3ca6-00a3-e940-77393313108e"
} | {
"account_age_days": 882,
"account_id": "ACCT-32F9C5184C6A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 991,
"timestamp": "2026-01-06T00:50:00Z",
"transaction_amount_usd": 1674.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2655.33,
"financial_exposure_usd": 4353.12,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103639",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-03T12:39:00Z",
"trace_id": "f749c78a-5f38-5e74-9170-744140e5a7cd"
} | {
"account_age_days": 781,
"account_id": "ACCT-81729B1B32B8",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.948
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 676,
"timestamp": "2026-01-03T12:39:00Z",
"transaction_amount_usd": 1439936.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1710639.59,
"financial_exposure_usd": 2234899.54,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109236",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-07T09:56:00Z",
"trace_id": "06f1b026-22ee-cc42-2bf0-52ae9c929527"
} | {
"account_age_days": 1584,
"account_id": "ACCT-352A7D38FE80",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 628,
"timestamp": "2026-01-07T09:56:00Z",
"transaction_amount_usd": 11482.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2353.68,
"financial_exposure_usd": 2977.22,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102593",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-02T19:13:00Z",
"trace_id": "d6284ffb-a959-040c-8031-6d587eeb57cd"
} | {
"account_age_days": 1384,
"account_id": "ACCT-AE3D256EC1F4",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.29
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 171,
"timestamp": "2026-01-02T19:13:00Z",
"transaction_amount_usd": 20160.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.776,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 702752.39,
"financial_exposure_usd": 850514.9,
"recoverable_pct": 0.108
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109723",
"label": "benign",
"label_confidence": 0.544,
"severity": "medium",
"timestamp": "2026-01-07T18:03:00Z",
"trace_id": "7545c592-5e48-858c-6bc3-a24d10f26b4d"
} | {
"account_age_days": 483,
"account_id": "ACCT-A530E309AA18",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.603
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1064,
"timestamp": "2026-01-07T18:03:00Z",
"transaction_amount_usd": 3881.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.688,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3155.52,
"financial_exposure_usd": 4379.97,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101963",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-02T08:43:00Z",
"trace_id": "9f1944b5-7359-8fa1-08a7-90fd38ef3a02"
} | {
"account_age_days": 1235,
"account_id": "ACCT-660544139A4A",
"baseline_risk_score": 0.606,
"kyc_tier": "tier_3",
"session_entropy": 0.66
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 663,
"timestamp": "2026-01-02T08:43:00Z",
"transaction_amount_usd": 89026.09
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.679,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 392999.5,
"financial_exposure_usd": 899310.99,
"recoverable_pct": 0.137
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107097",
"label": "benign",
"label_confidence": 0.697,
"severity": "high",
"timestamp": "2026-01-05T22:17:00Z",
"trace_id": "3950038c-4536-dd33-734b-3c2a34f0ff66"
} | {
"account_age_days": 991,
"account_id": "ACCT-7D3305390A2E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 989,
"timestamp": "2026-01-05T22:17:00Z",
"transaction_amount_usd": 9788.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1527.04,
"financial_exposure_usd": 2455.69,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109312",
"label": "benign",
"label_confidence": 0.53,
"severity": "high",
"timestamp": "2026-01-07T11:12:00Z",
"trace_id": "0eb6ba1b-5a95-29f7-d60d-9bc0a63caa81"
} | {
"account_age_days": 1651,
"account_id": "ACCT-FB71430D8E48",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 985,
"timestamp": "2026-01-07T11:12:00Z",
"transaction_amount_usd": 1992.84
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 5343.47,
"financial_exposure_usd": 8020.5,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106241",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "medium",
"timestamp": "2026-01-05T08:01:00Z",
"trace_id": "ec58f7a5-283d-7e5a-1c7e-119e937c162b"
} | {
"account_age_days": 1545,
"account_id": "ACCT-2430C5F2C4D4",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_3",
"session_entropy": 0.836
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1072,
"timestamp": "2026-01-05T08:01:00Z",
"transaction_amount_usd": 2748397.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2336201.52,
"financial_exposure_usd": 4938408.95,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108754",
"label": "benign",
"label_confidence": 0.606,
"severity": "critical",
"timestamp": "2026-01-07T01:54:00Z",
"trace_id": "8c40bff1-87a4-8cb9-5129-c080a7fd6051"
} | {
"account_age_days": 819,
"account_id": "ACCT-FF6072945A33",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 80,
"timestamp": "2026-01-07T01:54:00Z",
"transaction_amount_usd": 3176.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 621.66,
"financial_exposure_usd": 1229.79,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101982",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-02T09:02:00Z",
"trace_id": "1ae8aee4-b4b2-5207-eea7-bf4822fdcb69"
} | {
"account_age_days": 764,
"account_id": "ACCT-149B0E0E7440",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.907
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 142,
"timestamp": "2026-01-02T05:31:00Z",
"transaction_amount_usd": 8.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 652528.35,
"financial_exposure_usd": 771198.81,
"recoverable_pct": 0.275
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108981",
"label": "benign",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-07T05:41:00Z",
"trace_id": "1d1bd721-2dad-4bb9-1066-21e02e823c2a"
} | {
"account_age_days": 180,
"account_id": "ACCT-E1BF520A5D7F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.723
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 485,
"timestamp": "2026-01-07T05:41:00Z",
"transaction_amount_usd": 8324.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2075,
"financial_exposure_usd": 2850.09,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100635",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "critical",
"timestamp": "2026-01-01T10:35:00Z",
"trace_id": "43a2ccae-4e65-389c-e009-316fae6c8d4d"
} | {
"account_age_days": 203,
"account_id": "ACCT-47596C22C7B0",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_3",
"session_entropy": 0.63
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 388,
"timestamp": "2026-01-01T00:24:00Z",
"transaction_amount_usd": 1.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.404,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 502299.41,
"financial_exposure_usd": 625027,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109649",
"label": "benign",
"label_confidence": 0.48,
"severity": "high",
"timestamp": "2026-01-07T16:49:00Z",
"trace_id": "98540e0d-9296-7898-e04a-826b87c04cbc"
} | {
"account_age_days": 141,
"account_id": "ACCT-7542E4E9D2F9",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_2",
"session_entropy": 0.757
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 935,
"timestamp": "2026-01-07T16:49:00Z",
"transaction_amount_usd": 5043.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1836.2,
"financial_exposure_usd": 3462.88,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102124",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-02T11:24:00Z",
"trace_id": "ee089381-b96e-23d7-36e9-e56acbbadf80"
} | {
"account_age_days": 1346,
"account_id": "ACCT-0445298154FD",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.949
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 398,
"timestamp": "2026-01-02T11:24:00Z",
"transaction_amount_usd": 43266.83
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.442,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 640455.91,
"financial_exposure_usd": 1207124.82,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104259",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-03T22:59:00Z",
"trace_id": "a418ed92-2ab4-23bc-ac86-d93ef2aee13c"
} | {
"account_age_days": 686,
"account_id": "ACCT-808DBD69FA60",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.776
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 491,
"timestamp": "2026-01-03T22:59:00Z",
"transaction_amount_usd": 717054.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.375,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4961144.87,
"financial_exposure_usd": 5586125.16,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104979",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-04T10:59:00Z",
"trace_id": "6eab8fac-a6b7-7906-50f1-d7c8caeeca35"
} | {
"account_age_days": 137,
"account_id": "ACCT-9F0519137F2C",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 690,
"timestamp": "2026-01-04T10:59:00Z",
"transaction_amount_usd": 1378175
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 997179.89,
"financial_exposure_usd": 1270117.06,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108303",
"label": "benign",
"label_confidence": 0.678,
"severity": "low",
"timestamp": "2026-01-06T18:23:00Z",
"trace_id": "be1316f7-83d5-09e3-2d8c-0372af8852b0"
} | {
"account_age_days": 1873,
"account_id": "ACCT-61FD51BFEF50",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.918
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 711,
"timestamp": "2026-01-06T18:23:00Z",
"transaction_amount_usd": 10160.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1395.05,
"financial_exposure_usd": 2433,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103681",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-03T13:21:00Z",
"trace_id": "b94adcc2-277f-7133-af24-9bbbdeb1074e"
} | {
"account_age_days": 320,
"account_id": "ACCT-871CB853253B",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.818
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1123,
"timestamp": "2026-01-03T13:21:00Z",
"transaction_amount_usd": 2735741.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.431,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4132303.01,
"financial_exposure_usd": 5793111.73,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104091",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-03T20:11:00Z",
"trace_id": "9923c14e-1c14-15ca-3ca4-88d16913303a"
} | {
"account_age_days": 228,
"account_id": "ACCT-E6D6BB95FAA6",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.112
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 87,
"timestamp": "2026-01-03T08:31:00Z",
"transaction_amount_usd": 16.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.881,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3991678.33,
"financial_exposure_usd": 4290627.69,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100917",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-01T15:17:00Z",
"trace_id": "bb8e67aa-4cba-febc-0c2a-acd06f9241d6"
} | {
"account_age_days": 1197,
"account_id": "ACCT-479305AB28D2",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_3",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 241,
"timestamp": "2026-01-01T09:20:00Z",
"transaction_amount_usd": 3.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.627,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 219502.08,
"financial_exposure_usd": 276022.37,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107904",
"label": "benign",
"label_confidence": 0.506,
"severity": "medium",
"timestamp": "2026-01-06T11:44:00Z",
"trace_id": "3ded0d45-ce83-6ab4-3e63-c18978a10a66"
} | {
"account_age_days": 1004,
"account_id": "ACCT-D15A1490AB07",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 399,
"timestamp": "2026-01-06T07:50:00Z",
"transaction_amount_usd": 10.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.606,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 805.86,
"financial_exposure_usd": 1652.45,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108064",
"label": "benign",
"label_confidence": 0.749,
"severity": "high",
"timestamp": "2026-01-06T14:24:00Z",
"trace_id": "fb6083f6-a3bc-271d-e394-373f5c96b497"
} | {
"account_age_days": 419,
"account_id": "ACCT-07F70BA6B5EB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.745
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 927,
"timestamp": "2026-01-06T14:24:00Z",
"transaction_amount_usd": 5368.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.739,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1917.81,
"financial_exposure_usd": 3226.27,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101358",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "low",
"timestamp": "2026-01-01T22:38:00Z",
"trace_id": "8954df7d-7f60-c998-74ae-e705a2d58de6"
} | {
"account_age_days": 868,
"account_id": "ACCT-2DE898249C89",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.874
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1066,
"timestamp": "2026-01-01T22:38:00Z",
"transaction_amount_usd": 34062.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 650323.73,
"financial_exposure_usd": 1291078.19,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105672",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "medium",
"timestamp": "2026-01-04T22:32:00Z",
"trace_id": "455c193e-392b-b681-8efb-35dfbb585d65"
} | {
"account_age_days": 1340,
"account_id": "ACCT-C8CC3E610943",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.172
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 321,
"timestamp": "2026-01-04T15:31:00Z",
"transaction_amount_usd": 13.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3856560.23,
"financial_exposure_usd": 4263879.64,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.