schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109594",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-07T15:54:00Z",
"trace_id": "ccf02a86-32ca-88d6-605d-d513be5f2071"
} | {
"account_age_days": 727,
"account_id": "ACCT-59BE6E6ED69D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 214,
"timestamp": "2026-01-07T12:32:00Z",
"transaction_amount_usd": 10.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1598.07,
"financial_exposure_usd": 3049.75,
"recoverable_pct": 0.509
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100350",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "high",
"timestamp": "2026-01-01T05:50:00Z",
"trace_id": "d72199da-6b85-0f21-cf94-86881a40a57d"
} | {
"account_age_days": 1912,
"account_id": "ACCT-1477BA83BC3F",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_3",
"session_entropy": 0.745
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 395,
"timestamp": "2026-01-01T05:50:00Z",
"transaction_amount_usd": 51055.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 582209.32,
"financial_exposure_usd": 594908.05,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101015",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-01T16:55:00Z",
"trace_id": "d54af5d7-d79b-71a5-f91b-d964970a3a73"
} | {
"account_age_days": 1694,
"account_id": "ACCT-2EF3376F8342",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_2",
"session_entropy": 0.334
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 189,
"timestamp": "2026-01-01T11:33:00Z",
"transaction_amount_usd": 4.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.39,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 439469.48,
"financial_exposure_usd": 485805.2,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109555",
"label": "benign",
"label_confidence": 0.632,
"severity": "low",
"timestamp": "2026-01-07T15:15:00Z",
"trace_id": "543ac18f-1af7-0921-d6c9-dcc10a44939b"
} | {
"account_age_days": 984,
"account_id": "ACCT-4D01A14385BD",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.723
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 520,
"timestamp": "2026-01-07T15:15:00Z",
"transaction_amount_usd": 7816.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.494,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 996.09,
"financial_exposure_usd": 1834.32,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107621",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-06T07:01:00Z",
"trace_id": "50706c93-59b7-be0d-9991-21deff079e49"
} | {
"account_age_days": 1034,
"account_id": "ACCT-7D0F6C02EF0F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.799
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 335,
"timestamp": "2026-01-05T21:03:00Z",
"transaction_amount_usd": 17.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2007.91,
"financial_exposure_usd": 2610.89,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101915",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "critical",
"timestamp": "2026-01-02T07:55:00Z",
"trace_id": "5b92af06-2e57-d7be-8926-4afc25f8e854"
} | {
"account_age_days": 1740,
"account_id": "ACCT-8848941FFF89",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_2",
"session_entropy": 0.135
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 260,
"timestamp": "2026-01-02T05:53:00Z",
"transaction_amount_usd": 5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.617,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 323842.95,
"financial_exposure_usd": 489729.25,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102208",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "critical",
"timestamp": "2026-01-02T12:48:00Z",
"trace_id": "fb37625c-70f2-027b-61f0-1d24779ce760"
} | {
"account_age_days": 1779,
"account_id": "ACCT-343543C4DB68",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_2",
"session_entropy": 0.255
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 783,
"timestamp": "2026-01-02T12:48:00Z",
"transaction_amount_usd": 81494.32
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.859,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 326685.34,
"financial_exposure_usd": 407848.74,
"recoverable_pct": 0.305
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107919",
"label": "benign",
"label_confidence": 0.628,
"severity": "critical",
"timestamp": "2026-01-06T11:59:00Z",
"trace_id": "35cfeda0-dc6c-b7dc-5bc0-e33937cea28c"
} | {
"account_age_days": 155,
"account_id": "ACCT-AFEB22C3F534",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.259
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 323,
"timestamp": "2026-01-06T08:04:00Z",
"transaction_amount_usd": 4.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2109.36,
"financial_exposure_usd": 2846.53,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103335",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "high",
"timestamp": "2026-01-03T07:35:00Z",
"trace_id": "55557e78-ae13-6dbb-e3ea-04f45df76081"
} | {
"account_age_days": 1096,
"account_id": "ACCT-9FA7E6585EEF",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.537
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 622,
"timestamp": "2026-01-03T07:35:00Z",
"transaction_amount_usd": 1080326.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5792264.19,
"financial_exposure_usd": 7037655.78,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101099",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-01T18:19:00Z",
"trace_id": "ff9c1f21-c6dc-661c-6fb1-166065237bb2"
} | {
"account_age_days": 592,
"account_id": "ACCT-3789DD8F117B",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_1",
"session_entropy": 0.378
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1097,
"timestamp": "2026-01-01T18:19:00Z",
"transaction_amount_usd": 36745.88
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.931,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 852209.13,
"financial_exposure_usd": 1139035.16,
"recoverable_pct": 0.234
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101857",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-02T06:57:00Z",
"trace_id": "581239b7-d656-5aa8-4746-3292b2b0e224"
} | {
"account_age_days": 1459,
"account_id": "ACCT-470A4DCDBA53",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_2",
"session_entropy": 0.37
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 189,
"timestamp": "2026-01-02T06:57:00Z",
"transaction_amount_usd": 111315.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 314007.56,
"financial_exposure_usd": 659061.59,
"recoverable_pct": 0.319
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100397",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-01T06:37:00Z",
"trace_id": "6f95be22-3fac-dfa6-4c95-6585a59b0682"
} | {
"account_age_days": 1744,
"account_id": "ACCT-A4BA67D7712B",
"baseline_risk_score": 0.476,
"kyc_tier": "tier_3",
"session_entropy": 0.348
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 401,
"timestamp": "2026-01-01T06:37:00Z",
"transaction_amount_usd": 109884.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.854,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 423492.79,
"financial_exposure_usd": 678787.4,
"recoverable_pct": 0.167
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105126",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-04T13:26:00Z",
"trace_id": "6beb2ef8-e617-82eb-27a5-de598c816520"
} | {
"account_age_days": 950,
"account_id": "ACCT-2E99E624F2C7",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.584
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 505,
"timestamp": "2026-01-04T13:26:00Z",
"transaction_amount_usd": 1438882.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.711,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1873256.77,
"financial_exposure_usd": 2295774.42,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105598",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-04T21:18:00Z",
"trace_id": "732486ab-0bb8-e4b2-09a7-988a0e2941a9"
} | {
"account_age_days": 1095,
"account_id": "ACCT-E1AA8E42B623",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.93
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1046,
"timestamp": "2026-01-04T21:18:00Z",
"transaction_amount_usd": 2446575.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 811849.46,
"financial_exposure_usd": 1710971.35,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105165",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-04T14:05:00Z",
"trace_id": "d743fd55-41ef-a09a-e0ff-f93af14f46fb"
} | {
"account_age_days": 1868,
"account_id": "ACCT-130B5C9F6037",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.643
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 802,
"timestamp": "2026-01-04T14:05:00Z",
"transaction_amount_usd": 1822836.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1405476.79,
"financial_exposure_usd": 2680583.62,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106088",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-05T05:28:00Z",
"trace_id": "b495d434-11bc-ce45-2b2a-535e3bd7bb5a"
} | {
"account_age_days": 1008,
"account_id": "ACCT-58D1B64ED566",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.283
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 98,
"timestamp": "2026-01-04T20:23:00Z",
"transaction_amount_usd": 6.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5665517.07,
"financial_exposure_usd": 8249672.94,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102621",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "medium",
"timestamp": "2026-01-02T19:41:00Z",
"trace_id": "36a8befa-a8e6-0fe4-5493-61c2da1ef5b6"
} | {
"account_age_days": 1616,
"account_id": "ACCT-8F96BDFE086C",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_2",
"session_entropy": 0.399
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 399,
"timestamp": "2026-01-02T11:56:00Z",
"transaction_amount_usd": 6.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.541,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 495030.69,
"financial_exposure_usd": 830982.14,
"recoverable_pct": 0.053
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103173",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "critical",
"timestamp": "2026-01-03T04:53:00Z",
"trace_id": "3fe93622-76ff-2bbe-ef21-57a94b85d087"
} | {
"account_age_days": 422,
"account_id": "ACCT-745BE7C6748F",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_1",
"session_entropy": 0.368
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 299,
"timestamp": "2026-01-03T04:53:00Z",
"transaction_amount_usd": 46418.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 622488.82,
"financial_exposure_usd": 627801.95,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101686",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-02T04:06:00Z",
"trace_id": "021ddaec-b15b-0f25-5889-feef74a8b3d9"
} | {
"account_age_days": 141,
"account_id": "ACCT-759309CBA41F",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_2",
"session_entropy": 0.837
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 416,
"timestamp": "2026-01-02T04:06:00Z",
"transaction_amount_usd": 5448.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 530480.76,
"financial_exposure_usd": 884133.73,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109226",
"label": "benign",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-07T09:46:00Z",
"trace_id": "b0a2e955-23e1-b1d4-0339-41c55dfe74a5"
} | {
"account_age_days": 1999,
"account_id": "ACCT-88784AA605B9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 128,
"timestamp": "2026-01-07T04:57:00Z",
"transaction_amount_usd": 4.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1088.23,
"financial_exposure_usd": 1196.2,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100167",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-01T02:47:00Z",
"trace_id": "7aeee7df-5bd5-5037-f744-459609791408"
} | {
"account_age_days": 1338,
"account_id": "ACCT-F9A013BE55C1",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.447
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 723,
"timestamp": "2026-01-01T02:47:00Z",
"transaction_amount_usd": 26532.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.915,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 551925.66,
"financial_exposure_usd": 713866.38,
"recoverable_pct": 0.136
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109052",
"label": "benign",
"label_confidence": 0.536,
"severity": "critical",
"timestamp": "2026-01-07T06:52:00Z",
"trace_id": "f9e072fe-5032-854f-88ac-5b7ae2499209"
} | {
"account_age_days": 1260,
"account_id": "ACCT-C35300223C01",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.564
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1118,
"timestamp": "2026-01-07T06:52:00Z",
"transaction_amount_usd": 8708.22
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3264.84,
"financial_exposure_usd": 4922.21,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109943",
"label": "benign",
"label_confidence": 0.603,
"severity": "high",
"timestamp": "2026-01-07T21:43:00Z",
"trace_id": "fe219059-637c-a58a-9768-168ef88556ce"
} | {
"account_age_days": 473,
"account_id": "ACCT-3EF19FC0098E",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_1",
"session_entropy": 0.505
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 638,
"timestamp": "2026-01-07T21:43:00Z",
"transaction_amount_usd": 10904.09
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3562.26,
"financial_exposure_usd": 4717.13,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104539",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-04T03:39:00Z",
"trace_id": "2acc6a84-99c8-2b07-1929-1082b957438c"
} | {
"account_age_days": 1858,
"account_id": "ACCT-3FAD4E9118E0",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_1",
"session_entropy": 0.764
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 306,
"timestamp": "2026-01-04T03:39:00Z",
"transaction_amount_usd": 1051986.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.667,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1788869.31,
"financial_exposure_usd": 3055729.6,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106208",
"label": "fraudulent",
"label_confidence": 0.611,
"severity": "high",
"timestamp": "2026-01-05T07:28:00Z",
"trace_id": "200d5381-cf26-b3bf-e925-b65653272433"
} | {
"account_age_days": 790,
"account_id": "ACCT-DCD1292A57E4",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 234,
"timestamp": "2026-01-04T21:29:00Z",
"transaction_amount_usd": 5.83
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5231785.31,
"financial_exposure_usd": 6108651.51,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102715",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "high",
"timestamp": "2026-01-02T21:15:00Z",
"trace_id": "f913f4dc-6225-e2d7-9d8a-c38791a5a919"
} | {
"account_age_days": 687,
"account_id": "ACCT-773FAE91E789",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.693
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1194,
"timestamp": "2026-01-02T21:15:00Z",
"transaction_amount_usd": 21089.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 521622.34,
"financial_exposure_usd": 1055455.13,
"recoverable_pct": 0.018
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109392",
"label": "benign",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-07T12:32:00Z",
"trace_id": "fb65127a-bece-df53-d527-549c98ac229d"
} | {
"account_age_days": 1477,
"account_id": "ACCT-6152CC34C969",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_3",
"session_entropy": 0.11
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1134,
"timestamp": "2026-01-07T12:32:00Z",
"transaction_amount_usd": 758.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 940.42,
"financial_exposure_usd": 1736.23,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102520",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-02T18:00:00Z",
"trace_id": "45257fc0-721a-0d82-db66-d163ef3bbdf7"
} | {
"account_age_days": 783,
"account_id": "ACCT-816576C84254",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_2",
"session_entropy": 0.88
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 210,
"timestamp": "2026-01-02T10:15:00Z",
"transaction_amount_usd": 10.72
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.446,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 282080.03,
"financial_exposure_usd": 531374.81,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100324",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "high",
"timestamp": "2026-01-01T05:24:00Z",
"trace_id": "7b2acbee-4056-20d4-625a-c0d9fce35a66"
} | {
"account_age_days": 1927,
"account_id": "ACCT-5D5B7ADBEE77",
"baseline_risk_score": 0.297,
"kyc_tier": "tier_1",
"session_entropy": 0.692
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 996,
"timestamp": "2026-01-01T05:24:00Z",
"transaction_amount_usd": 64489.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.543,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 602331.17,
"financial_exposure_usd": 666857.84,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104159",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "low",
"timestamp": "2026-01-03T21:19:00Z",
"trace_id": "a8a4b571-c592-5a57-c870-a218c40f7d62"
} | {
"account_age_days": 394,
"account_id": "ACCT-7CD007B94110",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1104,
"timestamp": "2026-01-03T21:19:00Z",
"transaction_amount_usd": 472151.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.575,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6210714.01,
"financial_exposure_usd": 6514789.15,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102970",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "high",
"timestamp": "2026-01-03T01:30:00Z",
"trace_id": "5cf9d918-9683-0a98-ca28-27cdb5fb1bb0"
} | {
"account_age_days": 1888,
"account_id": "ACCT-BE194B94F17D",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_1",
"session_entropy": 0.306
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 665,
"timestamp": "2026-01-03T01:30:00Z",
"transaction_amount_usd": 18899.33
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.881,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 302403.57,
"financial_exposure_usd": 544401.95,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105111",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "high",
"timestamp": "2026-01-04T13:11:00Z",
"trace_id": "a0b14cdb-afac-a63d-5e63-2b06c1245bf5"
} | {
"account_age_days": 1156,
"account_id": "ACCT-727DF43F7FE7",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1161,
"timestamp": "2026-01-04T13:11:00Z",
"transaction_amount_usd": 1907469.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.731,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3874771.38,
"financial_exposure_usd": 9273497.04,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101441",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "high",
"timestamp": "2026-01-02T00:01:00Z",
"trace_id": "ba78f5d5-8d35-a804-67a7-00209784945d"
} | {
"account_age_days": 1437,
"account_id": "ACCT-54DC54BFD2DA",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.557
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 109,
"timestamp": "2026-01-02T00:01:00Z",
"transaction_amount_usd": 80049.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 756552.29,
"financial_exposure_usd": 1040119.57,
"recoverable_pct": 0.33
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103667",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "critical",
"timestamp": "2026-01-03T13:07:00Z",
"trace_id": "ae81c83f-21a1-8084-7a77-2aa074c5ba9b"
} | {
"account_age_days": 1169,
"account_id": "ACCT-F4E62ED16225",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.202
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 834,
"timestamp": "2026-01-03T13:07:00Z",
"transaction_amount_usd": 2812750.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1479054.54,
"financial_exposure_usd": 2557670.2,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103482",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "high",
"timestamp": "2026-01-03T10:02:00Z",
"trace_id": "0e2579f2-50f8-da02-5a57-eeaa0a4ce44e"
} | {
"account_age_days": 1421,
"account_id": "ACCT-777B758CF783",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_2",
"session_entropy": 0.328
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 271,
"timestamp": "2026-01-03T06:49:00Z",
"transaction_amount_usd": 9.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.42,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3405170.55,
"financial_exposure_usd": 8396606.93,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108572",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-06T22:52:00Z",
"trace_id": "001b2cea-2e77-b27a-2600-0d142606dbaa"
} | {
"account_age_days": 51,
"account_id": "ACCT-ED694AA086D6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.412
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 193,
"timestamp": "2026-01-06T12:22:00Z",
"transaction_amount_usd": 18.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5344.2,
"financial_exposure_usd": 8269.91,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109577",
"label": "benign",
"label_confidence": 0.499,
"severity": "high",
"timestamp": "2026-01-07T15:37:00Z",
"trace_id": "128dce61-7da1-0158-89a2-90e0e5c54215"
} | {
"account_age_days": 902,
"account_id": "ACCT-0556D6ECE1A5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.932
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 150,
"timestamp": "2026-01-07T10:03:00Z",
"transaction_amount_usd": 23.73
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3385.57,
"financial_exposure_usd": 3414.53,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102162",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-02T12:02:00Z",
"trace_id": "e1c20230-534d-9fc9-232c-a66a69b31064"
} | {
"account_age_days": 1784,
"account_id": "ACCT-7A9518A43B28",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_1",
"session_entropy": 0.633
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1089,
"timestamp": "2026-01-02T12:02:00Z",
"transaction_amount_usd": 6600.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.353,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 576358.22,
"financial_exposure_usd": 680120.71,
"recoverable_pct": 0.204
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108202",
"label": "benign",
"label_confidence": 0.613,
"severity": "low",
"timestamp": "2026-01-06T16:42:00Z",
"trace_id": "f849dd6d-ad18-be3f-9acc-b74a2b649970"
} | {
"account_age_days": 520,
"account_id": "ACCT-B9E9494CDBC4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.663
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1082,
"timestamp": "2026-01-06T16:42:00Z",
"transaction_amount_usd": 178.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.688,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1721.69,
"financial_exposure_usd": 2104.67,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101883",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "low",
"timestamp": "2026-01-02T07:23:00Z",
"trace_id": "248a591a-241c-5bca-3474-de29b848fc35"
} | {
"account_age_days": 1141,
"account_id": "ACCT-A05AF1B4491A",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_2",
"session_entropy": 0.166
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 678,
"timestamp": "2026-01-02T07:23:00Z",
"transaction_amount_usd": 98589.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.38,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 721933.88,
"financial_exposure_usd": 946229.53,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104079",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "medium",
"timestamp": "2026-01-03T19:59:00Z",
"trace_id": "86f722c1-c821-1e58-8dbd-2918be19e290"
} | {
"account_age_days": 447,
"account_id": "ACCT-DFC5169AAB50",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_1",
"session_entropy": 0.494
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 350,
"timestamp": "2026-01-03T11:16:00Z",
"transaction_amount_usd": 18.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2607248.08,
"financial_exposure_usd": 3221320.45,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103948",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-03T17:48:00Z",
"trace_id": "7333e89f-3b52-b564-7554-8d9c73b976bd"
} | {
"account_age_days": 1923,
"account_id": "ACCT-3CA3D375AA22",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_3",
"session_entropy": 0.147
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 383,
"timestamp": "2026-01-03T12:34:00Z",
"transaction_amount_usd": 14.97
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.686,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6194339.4,
"financial_exposure_usd": 6465441.31,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104810",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-04T08:10:00Z",
"trace_id": "a0b8d381-46b3-6398-f033-5213943c8628"
} | {
"account_age_days": 92,
"account_id": "ACCT-8490B3BBF1AB",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1112,
"timestamp": "2026-01-04T08:10:00Z",
"transaction_amount_usd": 2220775.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.845,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 912384.82,
"financial_exposure_usd": 1019473.29,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101561",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-02T02:01:00Z",
"trace_id": "3680f185-ad12-9264-810c-1e44c76e9d9b"
} | {
"account_age_days": 1965,
"account_id": "ACCT-73DDDF936BF3",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_2",
"session_entropy": 0.577
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 257,
"timestamp": "2026-01-02T02:01:00Z",
"transaction_amount_usd": 104870.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 347285.39,
"financial_exposure_usd": 445117.11,
"recoverable_pct": 0.124
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102694",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "critical",
"timestamp": "2026-01-02T20:54:00Z",
"trace_id": "130f81cf-e0e1-1aa8-5d3c-1271d0fd51d5"
} | {
"account_age_days": 1561,
"account_id": "ACCT-79A5EF9F839D",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_3",
"session_entropy": 0.183
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 111,
"timestamp": "2026-01-02T09:29:00Z",
"transaction_amount_usd": 7.74
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.876,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 427231.41,
"financial_exposure_usd": 749532.95,
"recoverable_pct": 0.115
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106097",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-05T05:37:00Z",
"trace_id": "dce11418-3a88-2f86-1f76-20b37693a53d"
} | {
"account_age_days": 1947,
"account_id": "ACCT-F16E0A28C92E",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.144
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 586,
"timestamp": "2026-01-05T05:37:00Z",
"transaction_amount_usd": 2854817.86
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.949,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2248349.96,
"financial_exposure_usd": 5111570.47,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101121",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T18:41:00Z",
"trace_id": "97772b61-50a4-d135-4704-4ab45a369481"
} | {
"account_age_days": 1552,
"account_id": "ACCT-C3ACB60501E8",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.372
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 348,
"timestamp": "2026-01-01T18:41:00Z",
"transaction_amount_usd": 3344.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 503632.31,
"financial_exposure_usd": 1145938.09,
"recoverable_pct": 0.04
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105157",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-04T13:57:00Z",
"trace_id": "f2b27b6f-fc63-4499-1106-f051f875393f"
} | {
"account_age_days": 103,
"account_id": "ACCT-05CC490CB557",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_3",
"session_entropy": 0.465
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 214,
"timestamp": "2026-01-04T13:57:00Z",
"transaction_amount_usd": 2437006.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1528005.44,
"financial_exposure_usd": 1705709.06,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105531",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-04T20:11:00Z",
"trace_id": "3efd2c53-f7d9-ddbb-fd67-d969db07e401"
} | {
"account_age_days": 1348,
"account_id": "ACCT-138A41C57B2E",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 389,
"timestamp": "2026-01-04T18:09:00Z",
"transaction_amount_usd": 13.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.881,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4357398.89,
"financial_exposure_usd": 7940585.47,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100644",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-01T10:44:00Z",
"trace_id": "7d1324f7-2061-88aa-03c7-1011784ab448"
} | {
"account_age_days": 743,
"account_id": "ACCT-58746C41C650",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_1",
"session_entropy": 0.111
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 312,
"timestamp": "2026-01-01T10:44:00Z",
"transaction_amount_usd": 3320.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.94,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 465763.49,
"financial_exposure_usd": 502797.36,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101243",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "medium",
"timestamp": "2026-01-01T20:43:00Z",
"trace_id": "437bfa41-5854-0e55-c6f7-4f3bd1ca8fd4"
} | {
"account_age_days": 863,
"account_id": "ACCT-6F80A322BF86",
"baseline_risk_score": 0.453,
"kyc_tier": "tier_3",
"session_entropy": 0.834
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 208,
"timestamp": "2026-01-01T08:07:00Z",
"transaction_amount_usd": 0.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 471598.22,
"financial_exposure_usd": 786465.97,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102258",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "high",
"timestamp": "2026-01-02T13:38:00Z",
"trace_id": "43c22d12-3e64-65b8-c3ba-2bd0d229bc0c"
} | {
"account_age_days": 1838,
"account_id": "ACCT-A98CDDC69FD1",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_3",
"session_entropy": 0.776
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1066,
"timestamp": "2026-01-02T13:38:00Z",
"transaction_amount_usd": 57911.1
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 953132.25,
"financial_exposure_usd": 1457308.27,
"recoverable_pct": 0.274
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100830",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-01T13:50:00Z",
"trace_id": "0517fbd9-6cba-4531-1f01-ab6032650352"
} | {
"account_age_days": 1042,
"account_id": "ACCT-C207713A0469",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_1",
"session_entropy": 0.503
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 776,
"timestamp": "2026-01-01T13:50:00Z",
"transaction_amount_usd": 42132.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 185664.38,
"financial_exposure_usd": 312003.54,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102183",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "critical",
"timestamp": "2026-01-02T12:23:00Z",
"trace_id": "e8d5dec2-a046-dac0-8b38-ed84acc37f8e"
} | {
"account_age_days": 1429,
"account_id": "ACCT-DB82419AD7C3",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.265
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 189,
"timestamp": "2026-01-02T06:45:00Z",
"transaction_amount_usd": 3.41
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.652,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 482359.19,
"financial_exposure_usd": 551138.04,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102498",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-02T17:38:00Z",
"trace_id": "59512994-049c-77ba-390f-7223f85bca61"
} | {
"account_age_days": 195,
"account_id": "ACCT-684C549AB5B3",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 605,
"timestamp": "2026-01-02T17:38:00Z",
"transaction_amount_usd": 77257.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.436,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 726086.63,
"financial_exposure_usd": 831222.79,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102199",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-02T12:39:00Z",
"trace_id": "2cdc5c97-6fb2-7dc0-b6e5-ed5887904407"
} | {
"account_age_days": 706,
"account_id": "ACCT-3012C1E3F423",
"baseline_risk_score": 0.541,
"kyc_tier": "tier_3",
"session_entropy": 0.894
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 947,
"timestamp": "2026-01-02T12:39:00Z",
"transaction_amount_usd": 44557.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.559,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 670174.37,
"financial_exposure_usd": 756125.56,
"recoverable_pct": 0.212
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103427",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "medium",
"timestamp": "2026-01-03T09:07:00Z",
"trace_id": "e84af40f-3780-1c2d-b12a-47561582c7a2"
} | {
"account_age_days": 268,
"account_id": "ACCT-389314701C0B",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_3",
"session_entropy": 0.373
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 229,
"timestamp": "2026-01-03T01:44:00Z",
"transaction_amount_usd": 13.84
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.711,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2833394.26,
"financial_exposure_usd": 3373756.68,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107527",
"label": "benign",
"label_confidence": 0.71,
"severity": "high",
"timestamp": "2026-01-06T05:27:00Z",
"trace_id": "656882b6-c483-0b51-bb4c-d67f9c7c3257"
} | {
"account_age_days": 1274,
"account_id": "ACCT-0F724B4367F0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.945
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1116,
"timestamp": "2026-01-06T05:27:00Z",
"transaction_amount_usd": 14108.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2201.1,
"financial_exposure_usd": 2559.26,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102692",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "medium",
"timestamp": "2026-01-02T20:52:00Z",
"trace_id": "f7db3361-5436-a86f-b3de-ac03eb2c384b"
} | {
"account_age_days": 461,
"account_id": "ACCT-24D1374F6305",
"baseline_risk_score": 0.587,
"kyc_tier": "tier_3",
"session_entropy": 0.117
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 450,
"timestamp": "2026-01-02T20:52:00Z",
"transaction_amount_usd": 62908
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.534,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 335476.1,
"financial_exposure_usd": 714495.17,
"recoverable_pct": 0.023
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100902",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-01T15:02:00Z",
"trace_id": "a42f9410-e8f3-f24f-f1de-1c28de136628"
} | {
"account_age_days": 652,
"account_id": "ACCT-FAB8F016C47C",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_3",
"session_entropy": 0.481
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 386,
"timestamp": "2026-01-01T15:02:00Z",
"transaction_amount_usd": 99299.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 477093.17,
"financial_exposure_usd": 782910.13,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109349",
"label": "benign",
"label_confidence": 0.556,
"severity": "medium",
"timestamp": "2026-01-07T11:49:00Z",
"trace_id": "88a1425b-1051-74c8-f951-e28951b1f64b"
} | {
"account_age_days": 1229,
"account_id": "ACCT-92353B74F514",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.938
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1061,
"timestamp": "2026-01-07T11:49:00Z",
"transaction_amount_usd": 1434.16
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 933.05,
"financial_exposure_usd": 2005.91,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104284",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-03T23:24:00Z",
"trace_id": "d1b4ff28-00a0-1c53-5511-92a8625ef3a6"
} | {
"account_age_days": 202,
"account_id": "ACCT-FB2E7B01A7A1",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.358
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 181,
"timestamp": "2026-01-03T16:19:00Z",
"transaction_amount_usd": 3.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3581494.48,
"financial_exposure_usd": 6417732.25,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105344",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-04T17:04:00Z",
"trace_id": "b1abe342-4b15-a413-754c-a5a8319c546e"
} | {
"account_age_days": 676,
"account_id": "ACCT-9F532802D9FB",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_2",
"session_entropy": 0.839
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 101,
"timestamp": "2026-01-04T17:04:00Z",
"transaction_amount_usd": 532861.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3129956.75,
"financial_exposure_usd": 5239871.61,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103000",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "critical",
"timestamp": "2026-01-03T02:00:00Z",
"trace_id": "8bd693c8-e090-765e-aaee-37d85073cd33"
} | {
"account_age_days": 574,
"account_id": "ACCT-2EA8494237D9",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.648
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 183,
"timestamp": "2026-01-03T02:00:00Z",
"transaction_amount_usd": 62435.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.693,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1137556.27,
"financial_exposure_usd": 1206709.66,
"recoverable_pct": 0.027
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103806",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-03T15:26:00Z",
"trace_id": "36492104-b541-60dc-4df6-22d23f8a4bba"
} | {
"account_age_days": 1143,
"account_id": "ACCT-B60BD3A63A07",
"baseline_risk_score": 0.218,
"kyc_tier": "tier_2",
"session_entropy": 0.697
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 256,
"timestamp": "2026-01-03T05:48:00Z",
"transaction_amount_usd": 11.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1489409.3,
"financial_exposure_usd": 3041927.81,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101935",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-02T08:15:00Z",
"trace_id": "8757c819-da49-3f2e-17b5-b75a348f8d30"
} | {
"account_age_days": 196,
"account_id": "ACCT-C6189502EDED",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_2",
"session_entropy": 0.289
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 144,
"timestamp": "2026-01-01T22:48:00Z",
"transaction_amount_usd": 18.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 271957.09,
"financial_exposure_usd": 446595.33,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109307",
"label": "benign",
"label_confidence": 0.455,
"severity": "low",
"timestamp": "2026-01-07T11:07:00Z",
"trace_id": "2259c9a4-cc6c-50d2-c537-a99c7855ce3e"
} | {
"account_age_days": 333,
"account_id": "ACCT-ABD85793DE63",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.61
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 771,
"timestamp": "2026-01-07T11:07:00Z",
"transaction_amount_usd": 4497.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3846.82,
"financial_exposure_usd": 6255.7,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106906",
"label": "benign",
"label_confidence": 0.632,
"severity": "medium",
"timestamp": "2026-01-05T19:06:00Z",
"trace_id": "424d4bde-407a-90e4-0f87-9cdbf450e7ae"
} | {
"account_age_days": 564,
"account_id": "ACCT-679FDACAD45C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.549
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 377,
"timestamp": "2026-01-05T19:06:00Z",
"transaction_amount_usd": 11336.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2325.23,
"financial_exposure_usd": 4310.25,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107193",
"label": "benign",
"label_confidence": 0.578,
"severity": "medium",
"timestamp": "2026-01-05T23:53:00Z",
"trace_id": "9b15b281-0f9e-5745-1939-b0478b0d21e5"
} | {
"account_age_days": 88,
"account_id": "ACCT-882F707729CA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.42
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 444,
"timestamp": "2026-01-05T23:53:00Z",
"transaction_amount_usd": 8321.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3401.24,
"financial_exposure_usd": 4716.86,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104035",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "medium",
"timestamp": "2026-01-03T19:15:00Z",
"trace_id": "2e7c0206-9f24-3b4d-8172-18dc345f44d3"
} | {
"account_age_days": 1611,
"account_id": "ACCT-2C4A07E6FD70",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_2",
"session_entropy": 0.244
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 197,
"timestamp": "2026-01-03T19:15:00Z",
"transaction_amount_usd": 2658210.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.407,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3536463.32,
"financial_exposure_usd": 6286564.28,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106168",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "high",
"timestamp": "2026-01-05T06:48:00Z",
"trace_id": "55b9bae2-89f1-0d8e-0a98-4df88f9a0251"
} | {
"account_age_days": 1478,
"account_id": "ACCT-E008BB824FB7",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.142
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 933,
"timestamp": "2026-01-05T06:48:00Z",
"transaction_amount_usd": 1926614.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.948,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2279302.08,
"financial_exposure_usd": 4817802.21,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109801",
"label": "benign",
"label_confidence": 0.598,
"severity": "low",
"timestamp": "2026-01-07T19:21:00Z",
"trace_id": "2d8ea85b-54b1-3c26-b7f2-99cbdc70ebc3"
} | {
"account_age_days": 782,
"account_id": "ACCT-C31832576645",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.111
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1098,
"timestamp": "2026-01-07T19:21:00Z",
"transaction_amount_usd": 10811.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2746.44,
"financial_exposure_usd": 3294.5,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107656",
"label": "benign",
"label_confidence": 0.569,
"severity": "medium",
"timestamp": "2026-01-06T07:36:00Z",
"trace_id": "8176126c-24ea-bea0-2ed6-1e4cf68d76b3"
} | {
"account_age_days": 595,
"account_id": "ACCT-26E0ECD53A61",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.116
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 883,
"timestamp": "2026-01-06T07:36:00Z",
"transaction_amount_usd": 2788.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1275.19,
"financial_exposure_usd": 1841.17,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105770",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "low",
"timestamp": "2026-01-05T00:10:00Z",
"trace_id": "a9b8b6ae-24d4-83c0-95ab-38b068aa691c"
} | {
"account_age_days": 487,
"account_id": "ACCT-A85CC5171F3F",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 833,
"timestamp": "2026-01-05T00:10:00Z",
"transaction_amount_usd": 1062233.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.533,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2928099.74,
"financial_exposure_usd": 3339714.25,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106602",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-05T14:02:00Z",
"trace_id": "376f1db1-42e3-88a4-bff1-c9a347b22f4b"
} | {
"account_age_days": 1446,
"account_id": "ACCT-598610F3A6A5",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_3",
"session_entropy": 0.205
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 534,
"timestamp": "2026-01-05T14:02:00Z",
"transaction_amount_usd": 2369828.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.436,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2446559.54,
"financial_exposure_usd": 4670005.87,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108253",
"label": "benign",
"label_confidence": 0.558,
"severity": "high",
"timestamp": "2026-01-06T17:33:00Z",
"trace_id": "721b7328-680e-55ee-f3f6-ee456fd36119"
} | {
"account_age_days": 731,
"account_id": "ACCT-F7418CD2FD15",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.741
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 156,
"timestamp": "2026-01-06T16:04:00Z",
"transaction_amount_usd": 1.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1099.71,
"financial_exposure_usd": 1301.96,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102256",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-02T13:36:00Z",
"trace_id": "3006a591-2831-1595-7efd-cc8ed82a9a21"
} | {
"account_age_days": 330,
"account_id": "ACCT-36482324B766",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.613
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 487,
"timestamp": "2026-01-02T13:36:00Z",
"transaction_amount_usd": 98432.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 526344.36,
"financial_exposure_usd": 831234.97,
"recoverable_pct": 0.29
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109030",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-07T06:30:00Z",
"trace_id": "7347989a-c38c-905e-fd5f-80bb1127ddc1"
} | {
"account_age_days": 1336,
"account_id": "ACCT-11C59E40C81D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.673
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 134,
"timestamp": "2026-01-07T02:40:00Z",
"transaction_amount_usd": 12.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2334.39,
"financial_exposure_usd": 3585.25,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109115",
"label": "benign",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-07T07:55:00Z",
"trace_id": "1bbfcd64-167b-89af-9f51-804d2a026c6d"
} | {
"account_age_days": 1016,
"account_id": "ACCT-C374A26982C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.761
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 792,
"timestamp": "2026-01-07T07:55:00Z",
"transaction_amount_usd": 7717.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2799.8,
"financial_exposure_usd": 2920.88,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106574",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-05T13:34:00Z",
"trace_id": "9a299305-213d-93df-f195-8df37f1b999d"
} | {
"account_age_days": 661,
"account_id": "ACCT-FD3014A3D73E",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.476
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 581,
"timestamp": "2026-01-05T13:34:00Z",
"transaction_amount_usd": 1285988.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.709,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6364676.11,
"financial_exposure_usd": 6960947.23,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103842",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-03T16:02:00Z",
"trace_id": "3acf193f-bad2-834b-6d3a-9607cbd731f4"
} | {
"account_age_days": 1231,
"account_id": "ACCT-3DA94FB5129F",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1060,
"timestamp": "2026-01-03T16:02:00Z",
"transaction_amount_usd": 577810.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.393,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6275012.18,
"financial_exposure_usd": 6962118.96,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105261",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-04T15:41:00Z",
"trace_id": "1e4e1a09-8761-d2a6-39a4-73ff494e92ac"
} | {
"account_age_days": 1794,
"account_id": "ACCT-6C8024E472F9",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_2",
"session_entropy": 0.274
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 537,
"timestamp": "2026-01-04T15:41:00Z",
"transaction_amount_usd": 1817977
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.815,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2175945.17,
"financial_exposure_usd": 5412476.52,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100285",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-01T04:45:00Z",
"trace_id": "ab204463-d92c-c6c8-5da7-f990d59ec42e"
} | {
"account_age_days": 621,
"account_id": "ACCT-936229665F07",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_2",
"session_entropy": 0.424
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1036,
"timestamp": "2026-01-01T04:45:00Z",
"transaction_amount_usd": 3844.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 336564.06,
"financial_exposure_usd": 824653.71,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101445",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-02T00:05:00Z",
"trace_id": "93115f3a-3201-491b-907e-662386549f04"
} | {
"account_age_days": 421,
"account_id": "ACCT-DB14C85E19D8",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 258,
"timestamp": "2026-01-02T00:05:00Z",
"transaction_amount_usd": 19237.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 160509.17,
"financial_exposure_usd": 294247.41,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108702",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-07T01:02:00Z",
"trace_id": "0662521a-8d4f-95af-05fe-bde4ff023e8f"
} | {
"account_age_days": 91,
"account_id": "ACCT-6CCCF7DD8C71",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 169,
"timestamp": "2026-01-06T23:20:00Z",
"transaction_amount_usd": 10.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3916.97,
"financial_exposure_usd": 6525.14,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100079",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-01T01:19:00Z",
"trace_id": "eee9795e-a308-6e48-e4e5-b5b0d25ad576"
} | {
"account_age_days": 813,
"account_id": "ACCT-3EE79D31FEEF",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.541
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 395,
"timestamp": "2025-12-31T19:35:00Z",
"transaction_amount_usd": 0.65
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 668603.12,
"financial_exposure_usd": 1301011.57,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102373",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-02T15:33:00Z",
"trace_id": "b0b38e6a-7265-3f08-9930-463c50c2d705"
} | {
"account_age_days": 1974,
"account_id": "ACCT-D9F3C4893CCE",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_3",
"session_entropy": 0.382
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 125,
"timestamp": "2026-01-02T05:50:00Z",
"transaction_amount_usd": 10.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.45,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 158588.23,
"financial_exposure_usd": 347907.73,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103998",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "critical",
"timestamp": "2026-01-03T18:38:00Z",
"trace_id": "fc4e7452-3c53-6c2f-f6b4-7c222eebe675"
} | {
"account_age_days": 1397,
"account_id": "ACCT-3B862025B8FF",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.38
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1183,
"timestamp": "2026-01-03T18:38:00Z",
"transaction_amount_usd": 2123164.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.742,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4479367.39,
"financial_exposure_usd": 4851515.1,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109409",
"label": "benign",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-07T12:49:00Z",
"trace_id": "ccb1b79a-e25e-ad9c-bcc3-afc90349d1aa"
} | {
"account_age_days": 867,
"account_id": "ACCT-4D1F44F60ECF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.296
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1031,
"timestamp": "2026-01-07T12:49:00Z",
"transaction_amount_usd": 524.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2659.91,
"financial_exposure_usd": 4818.22,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102212",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-02T12:52:00Z",
"trace_id": "3de67e2d-c2bb-a9db-ce1c-2e27fe189cfd"
} | {
"account_age_days": 485,
"account_id": "ACCT-38F6A7FE4355",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_2",
"session_entropy": 0.924
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 500,
"timestamp": "2026-01-02T12:52:00Z",
"transaction_amount_usd": 7901.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 284052.45,
"financial_exposure_usd": 517988.02,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101424",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-01T23:44:00Z",
"trace_id": "f7b9ff1e-8e46-f620-58d1-9d30330a5025"
} | {
"account_age_days": 698,
"account_id": "ACCT-04600D00D4BF",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_3",
"session_entropy": 0.933
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 758,
"timestamp": "2026-01-01T23:44:00Z",
"transaction_amount_usd": 93070.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.38,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 594838.96,
"financial_exposure_usd": 647044.56,
"recoverable_pct": 0.383
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108297",
"label": "benign",
"label_confidence": 0.62,
"severity": "medium",
"timestamp": "2026-01-06T18:17:00Z",
"trace_id": "42fad82f-7f9c-3ba5-2c24-b0519d0b7560"
} | {
"account_age_days": 637,
"account_id": "ACCT-4CD8DE09C587",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.567
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 167,
"timestamp": "2026-01-06T18:17:00Z",
"transaction_amount_usd": 1354.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1518.77,
"financial_exposure_usd": 2082.64,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103839",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "low",
"timestamp": "2026-01-03T15:59:00Z",
"trace_id": "58410526-a1f3-f982-276c-5583938507a1"
} | {
"account_age_days": 282,
"account_id": "ACCT-9DC36E9D2804",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.938
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 984,
"timestamp": "2026-01-03T15:59:00Z",
"transaction_amount_usd": 1707779.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2570798.04,
"financial_exposure_usd": 4522825.52,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105094",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "high",
"timestamp": "2026-01-04T12:54:00Z",
"trace_id": "b57b6542-5d77-dd4c-9371-66ce2c37a044"
} | {
"account_age_days": 1396,
"account_id": "ACCT-2D781CA392E7",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.58
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 826,
"timestamp": "2026-01-04T12:54:00Z",
"transaction_amount_usd": 1388046.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.538,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4426258.55,
"financial_exposure_usd": 5769159.05,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109088",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-07T07:28:00Z",
"trace_id": "3bb43768-1c04-8252-0c4b-ee391ab58650"
} | {
"account_age_days": 587,
"account_id": "ACCT-5869B1890D8E",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.433
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1112,
"timestamp": "2026-01-07T07:28:00Z",
"transaction_amount_usd": 14339.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1121.36,
"financial_exposure_usd": 1168.78,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109934",
"label": "benign",
"label_confidence": 0.451,
"severity": "low",
"timestamp": "2026-01-07T21:34:00Z",
"trace_id": "1e4f9479-66b1-6549-a5dd-4527af8abeab"
} | {
"account_age_days": 1680,
"account_id": "ACCT-79397933FECD",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_2",
"session_entropy": 0.78
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 672,
"timestamp": "2026-01-07T21:34:00Z",
"transaction_amount_usd": 245.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 326.39,
"financial_exposure_usd": 703.73,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109636",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-07T16:36:00Z",
"trace_id": "ce5505bb-3eca-8b80-0fbc-704302a3abec"
} | {
"account_age_days": 1649,
"account_id": "ACCT-16D0ADFA745C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 106,
"timestamp": "2026-01-07T07:44:00Z",
"transaction_amount_usd": 8.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.723,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1009.17,
"financial_exposure_usd": 1014.32,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106784",
"label": "benign",
"label_confidence": 0.657,
"severity": "high",
"timestamp": "2026-01-05T17:04:00Z",
"trace_id": "e7d08370-2c3c-fae1-06c2-836451241e86"
} | {
"account_age_days": 887,
"account_id": "ACCT-07B134689AEB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.358
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1156,
"timestamp": "2026-01-05T17:04:00Z",
"transaction_amount_usd": 12815.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2404.57,
"financial_exposure_usd": 4912.5,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101994",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "critical",
"timestamp": "2026-01-02T09:14:00Z",
"trace_id": "a3c8311f-e8e4-6fbb-c664-43e0c4e0a9dc"
} | {
"account_age_days": 45,
"account_id": "ACCT-BC81B93D0A9A",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_3",
"session_entropy": 0.426
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 335,
"timestamp": "2026-01-02T08:00:00Z",
"transaction_amount_usd": 6.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 134940.84,
"financial_exposure_usd": 243162.53,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105745",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "medium",
"timestamp": "2026-01-04T23:45:00Z",
"trace_id": "10002549-049e-ebb6-5ceb-b0df7e67433a"
} | {
"account_age_days": 1036,
"account_id": "ACCT-FB0A4AA7FD8B",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_3",
"session_entropy": 0.885
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 702,
"timestamp": "2026-01-04T23:45:00Z",
"transaction_amount_usd": 783446.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.879,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4353310.45,
"financial_exposure_usd": 8302185.69,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.