schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104895",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "medium",
"timestamp": "2026-01-04T09:35:00Z",
"trace_id": "b2425501-da89-c2e7-a45e-580efa95de56"
} | {
"account_age_days": 1977,
"account_id": "ACCT-A9617F71FDDA",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_2",
"session_entropy": 0.378
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 708,
"timestamp": "2026-01-04T09:35:00Z",
"transaction_amount_usd": 2918520.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.718,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 440929.12,
"financial_exposure_usd": 874967.1,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102672",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "low",
"timestamp": "2026-01-02T20:32:00Z",
"trace_id": "c9205b1d-0ab0-a6f3-8635-9995ed7aba5f"
} | {
"account_age_days": 1556,
"account_id": "ACCT-73923DF00F00",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_3",
"session_entropy": 0.225
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1102,
"timestamp": "2026-01-02T20:32:00Z",
"transaction_amount_usd": 100622.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.76,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 754542.63,
"financial_exposure_usd": 784375.92,
"recoverable_pct": 0.288
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101397",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-01T23:17:00Z",
"trace_id": "56902e61-114c-9d9b-3c76-2c88d36cd7fa"
} | {
"account_age_days": 530,
"account_id": "ACCT-48AAA7876F0B",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.276
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 535,
"timestamp": "2026-01-01T23:17:00Z",
"transaction_amount_usd": 50828.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 793554.11,
"financial_exposure_usd": 826922.85,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108913",
"label": "benign",
"label_confidence": 0.612,
"severity": "high",
"timestamp": "2026-01-07T04:33:00Z",
"trace_id": "69c7f972-b747-de77-4335-85b27f255f69"
} | {
"account_age_days": 1369,
"account_id": "ACCT-5E43019632C8",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_3",
"session_entropy": 0.117
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 333,
"timestamp": "2026-01-06T17:35:00Z",
"transaction_amount_usd": 10.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 972.55,
"financial_exposure_usd": 1385.27,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102943",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "low",
"timestamp": "2026-01-03T01:03:00Z",
"trace_id": "a0e2d132-6db1-c7e6-473c-218a74665d0f"
} | {
"account_age_days": 369,
"account_id": "ACCT-C69963EEC006",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 159,
"timestamp": "2026-01-02T21:39:00Z",
"transaction_amount_usd": 4.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 296944.57,
"financial_exposure_usd": 511789.49,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106354",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-05T09:54:00Z",
"trace_id": "c6f3b11a-bd0d-8a2a-a701-82a4afd8d2f1"
} | {
"account_age_days": 777,
"account_id": "ACCT-7438BDA72885",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.686
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 309,
"timestamp": "2026-01-05T09:54:00Z",
"transaction_amount_usd": 664600.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.588,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3174449.11,
"financial_exposure_usd": 7280905.37,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104366",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-04T00:46:00Z",
"trace_id": "93cc00dd-d0b5-b39d-0584-891c13519b79"
} | {
"account_age_days": 1676,
"account_id": "ACCT-114885F004C1",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_3",
"session_entropy": 0.349
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1047,
"timestamp": "2026-01-04T00:46:00Z",
"transaction_amount_usd": 2702744.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2249314.44,
"financial_exposure_usd": 2765274.76,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100660",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "high",
"timestamp": "2026-01-01T11:00:00Z",
"trace_id": "553c31f0-d07a-c812-7cf5-e30741e1431f"
} | {
"account_age_days": 56,
"account_id": "ACCT-9488F45BCEA1",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_2",
"session_entropy": 0.783
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 522,
"timestamp": "2026-01-01T11:00:00Z",
"transaction_amount_usd": 2406.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 889863.88,
"financial_exposure_usd": 1349658.28,
"recoverable_pct": 0.259
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102874",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-02T23:54:00Z",
"trace_id": "24365093-d41b-4223-c89e-d57ffc886af9"
} | {
"account_age_days": 35,
"account_id": "ACCT-7F7986488D50",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_2",
"session_entropy": 0.708
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 552,
"timestamp": "2026-01-02T23:54:00Z",
"transaction_amount_usd": 70127.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.436,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 701707.23,
"financial_exposure_usd": 811038.55,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105928",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "medium",
"timestamp": "2026-01-05T02:48:00Z",
"trace_id": "c00bdfe0-94d2-0f19-7517-a6af18650996"
} | {
"account_age_days": 527,
"account_id": "ACCT-26536DEA0F63",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.346
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 129,
"timestamp": "2026-01-05T02:48:00Z",
"transaction_amount_usd": 361180.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4887593.48,
"financial_exposure_usd": 6224382.68,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108639",
"label": "benign",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-06T23:59:00Z",
"trace_id": "6fea31ff-1853-0c8d-49a1-100b1f007da9"
} | {
"account_age_days": 1234,
"account_id": "ACCT-06DD6A2B2F61",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.257
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 389,
"timestamp": "2026-01-06T23:59:00Z",
"transaction_amount_usd": 258.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3790,
"financial_exposure_usd": 8319.83,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101198",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "critical",
"timestamp": "2026-01-01T19:58:00Z",
"trace_id": "316f2adf-d1e4-ff59-bc5f-0ebc14afeca0"
} | {
"account_age_days": 1949,
"account_id": "ACCT-0C181B1B2C8D",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_2",
"session_entropy": 0.615
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 950,
"timestamp": "2026-01-01T19:58:00Z",
"transaction_amount_usd": 34571.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.651,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 620171.91,
"financial_exposure_usd": 910407.1,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102589",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "critical",
"timestamp": "2026-01-02T19:09:00Z",
"trace_id": "656c0aff-39fa-37dd-04be-b3fb55afe0d1"
} | {
"account_age_days": 131,
"account_id": "ACCT-56096CFE80D1",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_3",
"session_entropy": 0.576
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 104,
"timestamp": "2026-01-02T16:48:00Z",
"transaction_amount_usd": 23.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1006711.33,
"financial_exposure_usd": 1376722.54,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105056",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-04T12:16:00Z",
"trace_id": "c3b94926-5480-616d-6d1f-7c47757321b7"
} | {
"account_age_days": 673,
"account_id": "ACCT-94E36FFF2332",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.157
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 353,
"timestamp": "2026-01-04T04:55:00Z",
"transaction_amount_usd": 19.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2322384.66,
"financial_exposure_usd": 3372489.38,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101818",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-02T06:18:00Z",
"trace_id": "7432fd63-b89a-9ce1-15e7-02633e1a4c94"
} | {
"account_age_days": 1851,
"account_id": "ACCT-856DB056E32A",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.25
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 97,
"timestamp": "2026-01-01T23:56:00Z",
"transaction_amount_usd": 0.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.519,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 333142.53,
"financial_exposure_usd": 799846.6,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109783",
"label": "benign",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-07T19:03:00Z",
"trace_id": "a4ea023c-32d5-09cd-153f-71a19023a483"
} | {
"account_age_days": 577,
"account_id": "ACCT-9C289F726D5C",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_3",
"session_entropy": 0.219
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 895,
"timestamp": "2026-01-07T19:03:00Z",
"transaction_amount_usd": 445.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1072.07,
"financial_exposure_usd": 2299.6,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104382",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-04T01:02:00Z",
"trace_id": "b1525d81-93e4-16c1-b9d1-f7817016919e"
} | {
"account_age_days": 1291,
"account_id": "ACCT-0E553CED5D72",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_3",
"session_entropy": 0.414
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1005,
"timestamp": "2026-01-04T01:02:00Z",
"transaction_amount_usd": 1295300.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.659,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3969376.4,
"financial_exposure_usd": 5241825.07,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104342",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "medium",
"timestamp": "2026-01-04T00:22:00Z",
"trace_id": "20d09254-139a-5d77-0697-b732abcb0920"
} | {
"account_age_days": 1513,
"account_id": "ACCT-181DAD5A8E70",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_3",
"session_entropy": 0.858
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 81,
"timestamp": "2026-01-03T11:36:00Z",
"transaction_amount_usd": 20.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 639593.9,
"financial_exposure_usd": 1259033.15,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107798",
"label": "benign",
"label_confidence": 0.645,
"severity": "high",
"timestamp": "2026-01-06T09:58:00Z",
"trace_id": "9640d69c-95c5-609c-58c5-dd58e6cc56c9"
} | {
"account_age_days": 1752,
"account_id": "ACCT-2075E29BDDD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.32
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 915,
"timestamp": "2026-01-06T09:58:00Z",
"transaction_amount_usd": 7057.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4670.71,
"financial_exposure_usd": 5030.48,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109514",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-07T14:34:00Z",
"trace_id": "c478f518-651e-319b-d549-17a4065da717"
} | {
"account_age_days": 793,
"account_id": "ACCT-CBD96D7D983B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.676
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 742,
"timestamp": "2026-01-07T14:34:00Z",
"transaction_amount_usd": 11401.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3484.76,
"financial_exposure_usd": 4755.56,
"recoverable_pct": 0.899
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100813",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-01T13:33:00Z",
"trace_id": "85062b63-0ee7-5054-d4b3-b02345e3d4db"
} | {
"account_age_days": 696,
"account_id": "ACCT-A61D34759A9B",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.186
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 556,
"timestamp": "2026-01-01T13:33:00Z",
"transaction_amount_usd": 117818.9
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 746166.73,
"financial_exposure_usd": 1021379.24,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103410",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "medium",
"timestamp": "2026-01-03T08:50:00Z",
"trace_id": "0d9944a9-ef51-19b8-f7bc-5d014ded6c9e"
} | {
"account_age_days": 845,
"account_id": "ACCT-DA024709A18F",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_3",
"session_entropy": 0.441
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 215,
"timestamp": "2026-01-03T08:50:00Z",
"transaction_amount_usd": 2505963.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1572916.86,
"financial_exposure_usd": 2304082.56,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102239",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-02T13:19:00Z",
"trace_id": "79a909d5-b625-6262-34dc-5357eeefec17"
} | {
"account_age_days": 77,
"account_id": "ACCT-FA6F29D00551",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_2",
"session_entropy": 0.256
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1145,
"timestamp": "2026-01-02T13:19:00Z",
"transaction_amount_usd": 33554.72
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.543,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1213447.27,
"financial_exposure_usd": 1235298.32,
"recoverable_pct": 0.043
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109855",
"label": "benign",
"label_confidence": 0.532,
"severity": "critical",
"timestamp": "2026-01-07T20:15:00Z",
"trace_id": "b72eea3d-d92c-c715-e581-f0693ffe1072"
} | {
"account_age_days": 1568,
"account_id": "ACCT-057E071B733D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.186
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1058,
"timestamp": "2026-01-07T20:15:00Z",
"transaction_amount_usd": 5977.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2245.61,
"financial_exposure_usd": 2986.79,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105001",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-04T11:21:00Z",
"trace_id": "d8061954-bc9e-fb22-2b47-6769b12de06d"
} | {
"account_age_days": 384,
"account_id": "ACCT-E9C5961EAD8A",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 382,
"timestamp": "2026-01-04T05:55:00Z",
"transaction_amount_usd": 13.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.693,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3732857.33,
"financial_exposure_usd": 6589095.66,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106469",
"label": "fraudulent",
"label_confidence": 0.71,
"severity": "critical",
"timestamp": "2026-01-05T11:49:00Z",
"trace_id": "0d71b8b2-dd4c-ee99-5306-a9eff214d0a5"
} | {
"account_age_days": 1981,
"account_id": "ACCT-87B1D524ED53",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 876,
"timestamp": "2026-01-05T11:49:00Z",
"transaction_amount_usd": 1451762.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.631,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5786150.86,
"financial_exposure_usd": 5806263.23,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105822",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "medium",
"timestamp": "2026-01-05T01:02:00Z",
"trace_id": "72006038-c58f-0ac8-3ac1-7f2297bb704d"
} | {
"account_age_days": 1000,
"account_id": "ACCT-C50F6F89C4B7",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_1",
"session_entropy": 0.411
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 321,
"timestamp": "2026-01-04T15:48:00Z",
"transaction_amount_usd": 24.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.666,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1006583.75,
"financial_exposure_usd": 1456782.2,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109023",
"label": "benign",
"label_confidence": 0.532,
"severity": "critical",
"timestamp": "2026-01-07T06:23:00Z",
"trace_id": "aec19bfd-3ab0-f1b6-90fa-3ca678821ff8"
} | {
"account_age_days": 1255,
"account_id": "ACCT-BD937C8645AD",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_3",
"session_entropy": 0.311
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 233,
"timestamp": "2026-01-07T00:13:00Z",
"transaction_amount_usd": 8.37
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 589.01,
"financial_exposure_usd": 893.86,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103081",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "high",
"timestamp": "2026-01-03T03:21:00Z",
"trace_id": "d08bf09c-07ca-20d4-00dc-17eae1a449b9"
} | {
"account_age_days": 686,
"account_id": "ACCT-5EF3EFB06630",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_3",
"session_entropy": 0.576
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 418,
"timestamp": "2026-01-03T03:21:00Z",
"transaction_amount_usd": 40574.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.596,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 751817.31,
"financial_exposure_usd": 1257520.77,
"recoverable_pct": 0.317
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109210",
"label": "benign",
"label_confidence": 0.56,
"severity": "high",
"timestamp": "2026-01-07T09:30:00Z",
"trace_id": "4d93fd76-0474-17d4-e1b9-41e3187ed29d"
} | {
"account_age_days": 146,
"account_id": "ACCT-128B81408117",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.324
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 571,
"timestamp": "2026-01-07T09:30:00Z",
"transaction_amount_usd": 5839.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1636.51,
"financial_exposure_usd": 2325.17,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106111",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "low",
"timestamp": "2026-01-05T05:51:00Z",
"trace_id": "ad13d5d8-cc86-a3cf-6e4d-452ed0624013"
} | {
"account_age_days": 602,
"account_id": "ACCT-5AD428306DCF",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_1",
"session_entropy": 0.799
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1182,
"timestamp": "2026-01-05T05:51:00Z",
"transaction_amount_usd": 1271254.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.707,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1070762.42,
"financial_exposure_usd": 2035696.8,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109054",
"label": "benign",
"label_confidence": 0.659,
"severity": "low",
"timestamp": "2026-01-07T06:54:00Z",
"trace_id": "0cbe2983-701b-7ef7-6a2a-4a7093adc558"
} | {
"account_age_days": 307,
"account_id": "ACCT-C86B8C0EEF1B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.433
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 209,
"timestamp": "2026-01-07T06:54:00Z",
"transaction_amount_usd": 10960.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2029.83,
"financial_exposure_usd": 2439.76,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102483",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-02T17:23:00Z",
"trace_id": "7f7cdc70-8450-43a1-0cdd-b42a223514c5"
} | {
"account_age_days": 1678,
"account_id": "ACCT-9EA43F6580D0",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.438
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 654,
"timestamp": "2026-01-02T17:23:00Z",
"transaction_amount_usd": 35397.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 235681.1,
"financial_exposure_usd": 237552.42,
"recoverable_pct": 0.317
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102249",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-02T13:29:00Z",
"trace_id": "35cee5a2-2d9c-7a96-2a28-2ce9f7be4d93"
} | {
"account_age_days": 1474,
"account_id": "ACCT-DFED74335598",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 117,
"timestamp": "2026-01-02T04:36:00Z",
"transaction_amount_usd": 21.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.945,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 820738.73,
"financial_exposure_usd": 1160611.2,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102974",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "critical",
"timestamp": "2026-01-03T01:34:00Z",
"trace_id": "18de7f16-5262-b9a0-f4bf-ff52853d258c"
} | {
"account_age_days": 114,
"account_id": "ACCT-32D4F0095A50",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_2",
"session_entropy": 0.283
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 363,
"timestamp": "2026-01-02T22:17:00Z",
"transaction_amount_usd": 6.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 532751.38,
"financial_exposure_usd": 680520.09,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100498",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-01T08:18:00Z",
"trace_id": "81afc5fe-8603-a1f7-87da-d815bbd1414b"
} | {
"account_age_days": 1379,
"account_id": "ACCT-66F7AC985A6E",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.111
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 347,
"timestamp": "2026-01-01T08:18:00Z",
"transaction_amount_usd": 57401.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.927,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 333954.06,
"financial_exposure_usd": 671625.51,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107548",
"label": "benign",
"label_confidence": 0.488,
"severity": "medium",
"timestamp": "2026-01-06T05:48:00Z",
"trace_id": "269fc6e8-60bb-ddbc-460c-3462b549ee38"
} | {
"account_age_days": 181,
"account_id": "ACCT-290B283CDD36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.228
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 164,
"timestamp": "2026-01-06T05:48:00Z",
"transaction_amount_usd": 13758.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 327,
"financial_exposure_usd": 375.8,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103663",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "medium",
"timestamp": "2026-01-03T13:03:00Z",
"trace_id": "a35564e6-17a1-f38f-ad9c-6ab7e98a815f"
} | {
"account_age_days": 22,
"account_id": "ACCT-6B4E95F4C576",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_1",
"session_entropy": 0.553
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 131,
"timestamp": "2026-01-03T13:03:00Z",
"transaction_amount_usd": 1190486.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.61,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1147814.18,
"financial_exposure_usd": 1324345.71,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108603",
"label": "benign",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-06T23:23:00Z",
"trace_id": "5e5b7f3f-7359-deec-aaef-fe954158bef3"
} | {
"account_age_days": 432,
"account_id": "ACCT-A508479DD3B7",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 301,
"timestamp": "2026-01-06T23:23:00Z",
"transaction_amount_usd": 3141.9
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4575.47,
"financial_exposure_usd": 7465.09,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108346",
"label": "benign",
"label_confidence": 0.461,
"severity": "medium",
"timestamp": "2026-01-06T19:06:00Z",
"trace_id": "dba779f4-bf4d-4928-01f4-12405c98f824"
} | {
"account_age_days": 592,
"account_id": "ACCT-F2248286AD51",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.199
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 347,
"timestamp": "2026-01-06T07:59:00Z",
"transaction_amount_usd": 16.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5705.41,
"financial_exposure_usd": 6691.87,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106320",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-05T09:20:00Z",
"trace_id": "2a65cade-a987-b2aa-3a6c-03638883b4d3"
} | {
"account_age_days": 1204,
"account_id": "ACCT-4A38BED61BD1",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_3",
"session_entropy": 0.464
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 89,
"timestamp": "2026-01-05T09:20:00Z",
"transaction_amount_usd": 311417.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.821,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4844891.28,
"financial_exposure_usd": 4938258.94,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108724",
"label": "benign",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-07T01:24:00Z",
"trace_id": "8e1d291d-9dd2-e7ff-a524-ee31629d9085"
} | {
"account_age_days": 828,
"account_id": "ACCT-2DE410F83B77",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_1",
"session_entropy": 0.829
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 472,
"timestamp": "2026-01-07T01:24:00Z",
"transaction_amount_usd": 11490.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 913.61,
"financial_exposure_usd": 1352.85,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105624",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-04T21:44:00Z",
"trace_id": "e6189020-5163-70ab-6599-d27aa155e82d"
} | {
"account_age_days": 708,
"account_id": "ACCT-8821BE897155",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.851
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 381,
"timestamp": "2026-01-04T09:46:00Z",
"transaction_amount_usd": 13.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2189709.92,
"financial_exposure_usd": 4174111.49,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109992",
"label": "benign",
"label_confidence": 0.534,
"severity": "low",
"timestamp": "2026-01-07T22:32:00Z",
"trace_id": "5702dc89-5b67-62b3-2c47-be7bf1cdd70a"
} | {
"account_age_days": 754,
"account_id": "ACCT-B1E4982EA323",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 129,
"timestamp": "2026-01-07T11:12:00Z",
"transaction_amount_usd": 3.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1353.38,
"financial_exposure_usd": 1964.01,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107375",
"label": "benign",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-06T02:55:00Z",
"trace_id": "029577b1-ccdb-e072-4993-cb7f8f1a0f11"
} | {
"account_age_days": 669,
"account_id": "ACCT-708A8176CFEA",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 188,
"timestamp": "2026-01-05T14:55:00Z",
"transaction_amount_usd": 19.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2989.38,
"financial_exposure_usd": 3310.71,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102740",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-02T21:40:00Z",
"trace_id": "9553f945-8285-1a45-f9a7-f350a95400dd"
} | {
"account_age_days": 1747,
"account_id": "ACCT-804514C49C57",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 283,
"timestamp": "2026-01-02T17:57:00Z",
"transaction_amount_usd": 18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.864,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 665127.32,
"financial_exposure_usd": 803386.25,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105932",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-05T02:52:00Z",
"trace_id": "6508295a-a6bb-968a-3ec1-4a1580f6537c"
} | {
"account_age_days": 225,
"account_id": "ACCT-08C746F220C3",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_1",
"session_entropy": 0.775
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 286,
"timestamp": "2026-01-04T20:38:00Z",
"transaction_amount_usd": 23.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 8520008.29,
"financial_exposure_usd": 9135755.03,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101841",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-02T06:41:00Z",
"trace_id": "3a36fdb7-3b49-f2ee-b49b-5f2ed710e48e"
} | {
"account_age_days": 864,
"account_id": "ACCT-BD326F2E1780",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 390,
"timestamp": "2026-01-02T00:21:00Z",
"transaction_amount_usd": 14.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 793697.29,
"financial_exposure_usd": 959422.57,
"recoverable_pct": 0.319
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103569",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "low",
"timestamp": "2026-01-03T11:29:00Z",
"trace_id": "85227837-5799-4ede-159e-3e8a50c829ea"
} | {
"account_age_days": 1721,
"account_id": "ACCT-AF0776FDDEF3",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 282,
"timestamp": "2026-01-03T11:29:00Z",
"transaction_amount_usd": 834494.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.6,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2359432.12,
"financial_exposure_usd": 4624036.19,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100957",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "low",
"timestamp": "2026-01-01T15:57:00Z",
"trace_id": "a627197e-1f2d-86a6-a9ec-5bd2312dbe0a"
} | {
"account_age_days": 1121,
"account_id": "ACCT-5A56706A24A6",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_1",
"session_entropy": 0.535
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 454,
"timestamp": "2026-01-01T15:57:00Z",
"transaction_amount_usd": 65327.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.505,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 506770.77,
"financial_exposure_usd": 533958.35,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109835",
"label": "benign",
"label_confidence": 0.532,
"severity": "low",
"timestamp": "2026-01-07T19:55:00Z",
"trace_id": "cb5b84fe-4402-20c2-2f81-09b3518c200b"
} | {
"account_age_days": 1410,
"account_id": "ACCT-07E81AB06FDE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1179,
"timestamp": "2026-01-07T19:55:00Z",
"transaction_amount_usd": 2063.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2821.25,
"financial_exposure_usd": 2841.59,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102163",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "critical",
"timestamp": "2026-01-02T12:03:00Z",
"trace_id": "795e11ca-968e-e0c1-b32d-6a2532698c4a"
} | {
"account_age_days": 1045,
"account_id": "ACCT-FE43FA1BF30C",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_1",
"session_entropy": 0.113
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 355,
"timestamp": "2026-01-02T10:48:00Z",
"transaction_amount_usd": 0.2
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.381,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 366508.14,
"financial_exposure_usd": 493462.32,
"recoverable_pct": 0.333
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104649",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "low",
"timestamp": "2026-01-04T05:29:00Z",
"trace_id": "a3b34fd2-fea7-e81b-7653-255456a53b80"
} | {
"account_age_days": 1530,
"account_id": "ACCT-11828087A91C",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 507,
"timestamp": "2026-01-04T05:29:00Z",
"transaction_amount_usd": 2805432.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4184412.15,
"financial_exposure_usd": 6466947.92,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100107",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-01T01:47:00Z",
"trace_id": "622cc212-b69d-2f48-3653-e588afd58fe7"
} | {
"account_age_days": 1637,
"account_id": "ACCT-EC4014C6DA60",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_2",
"session_entropy": 0.659
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 560,
"timestamp": "2026-01-01T01:47:00Z",
"transaction_amount_usd": 31118.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.463,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 243972.7,
"financial_exposure_usd": 453551.4,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109899",
"label": "benign",
"label_confidence": 0.487,
"severity": "medium",
"timestamp": "2026-01-07T20:59:00Z",
"trace_id": "e9a5d8f6-841d-0292-2f36-34f7c4cab88d"
} | {
"account_age_days": 1395,
"account_id": "ACCT-65DEB5F908FE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.595
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 564,
"timestamp": "2026-01-07T20:59:00Z",
"transaction_amount_usd": 3690.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1525.96,
"financial_exposure_usd": 2597.82,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105088",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "medium",
"timestamp": "2026-01-04T12:48:00Z",
"trace_id": "cd6c7b05-e1ad-6dec-1248-4d50592fbc51"
} | {
"account_age_days": 1614,
"account_id": "ACCT-472562C8A50D",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 642,
"timestamp": "2026-01-04T12:48:00Z",
"transaction_amount_usd": 2196794.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.53,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1854710.43,
"financial_exposure_usd": 3302982.07,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108142",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-06T15:42:00Z",
"trace_id": "29193e4c-6d12-4799-9ba9-53dd0c402d90"
} | {
"account_age_days": 1393,
"account_id": "ACCT-9BD28A2DEF5E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.409
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 361,
"timestamp": "2026-01-06T11:45:00Z",
"transaction_amount_usd": 8.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1915.63,
"financial_exposure_usd": 3833.79,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109708",
"label": "benign",
"label_confidence": 0.584,
"severity": "medium",
"timestamp": "2026-01-07T17:48:00Z",
"trace_id": "5709e4c9-ec87-3c8e-e487-510448344704"
} | {
"account_age_days": 243,
"account_id": "ACCT-53D932E976E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.143
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 566,
"timestamp": "2026-01-07T17:48:00Z",
"transaction_amount_usd": 13228.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 598.42,
"financial_exposure_usd": 672.26,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107690",
"label": "benign",
"label_confidence": 0.522,
"severity": "low",
"timestamp": "2026-01-06T08:10:00Z",
"trace_id": "b5aaebe7-2c35-8964-6079-27b2b07c83bf"
} | {
"account_age_days": 233,
"account_id": "ACCT-78EB8AA5665D",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_1",
"session_entropy": 0.88
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 708,
"timestamp": "2026-01-06T08:10:00Z",
"transaction_amount_usd": 11443.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.776,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 887.22,
"financial_exposure_usd": 1559.72,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107016",
"label": "benign",
"label_confidence": 0.474,
"severity": "high",
"timestamp": "2026-01-05T20:56:00Z",
"trace_id": "ea7b6800-7c06-1e2c-7ec1-8253b0eec569"
} | {
"account_age_days": 908,
"account_id": "ACCT-84E78EA58ADD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 366,
"timestamp": "2026-01-05T20:56:00Z",
"transaction_amount_usd": 9017.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 755.84,
"financial_exposure_usd": 1583.75,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107992",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-06T13:12:00Z",
"trace_id": "14e749fd-01f2-4ce7-8108-d7c23708b97e"
} | {
"account_age_days": 1595,
"account_id": "ACCT-309637493436",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.45
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1043,
"timestamp": "2026-01-06T13:12:00Z",
"transaction_amount_usd": 10393.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2195.57,
"financial_exposure_usd": 2402.81,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103932",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "critical",
"timestamp": "2026-01-03T17:32:00Z",
"trace_id": "4eaf4cf2-e146-1de2-28ce-015ad5f6d36a"
} | {
"account_age_days": 862,
"account_id": "ACCT-60D6D8E523AC",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_3",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1155,
"timestamp": "2026-01-03T17:32:00Z",
"transaction_amount_usd": 331675.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6562545.25,
"financial_exposure_usd": 7945820.08,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104121",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-03T20:41:00Z",
"trace_id": "75b91e10-8247-fd0e-9223-cf93c5885d88"
} | {
"account_age_days": 382,
"account_id": "ACCT-15E8D87DD76A",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_2",
"session_entropy": 0.563
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 433,
"timestamp": "2026-01-03T20:41:00Z",
"transaction_amount_usd": 710498.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1988710.45,
"financial_exposure_usd": 3854056.5,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100817",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-01T13:37:00Z",
"trace_id": "5150304e-6aa1-67ea-d4ea-6d9028afe899"
} | {
"account_age_days": 394,
"account_id": "ACCT-843B617DA2BD",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 957,
"timestamp": "2026-01-01T13:37:00Z",
"transaction_amount_usd": 46399.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 331891.25,
"financial_exposure_usd": 668285.68,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108397",
"label": "benign",
"label_confidence": 0.512,
"severity": "low",
"timestamp": "2026-01-06T19:57:00Z",
"trace_id": "a5d32050-ffc5-5e92-70e0-76d780d91a9f"
} | {
"account_age_days": 1464,
"account_id": "ACCT-51EF6DFFCF85",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.113
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 123,
"timestamp": "2026-01-06T11:56:00Z",
"transaction_amount_usd": 17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2579.81,
"financial_exposure_usd": 2747.52,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100156",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "critical",
"timestamp": "2026-01-01T02:36:00Z",
"trace_id": "34b549be-db19-de67-bc3a-8abba5aa9765"
} | {
"account_age_days": 1013,
"account_id": "ACCT-46A3110A9813",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_3",
"session_entropy": 0.55
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 277,
"timestamp": "2026-01-01T00:10:00Z",
"transaction_amount_usd": 16.76
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 653688.02,
"financial_exposure_usd": 829756.64,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103055",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "critical",
"timestamp": "2026-01-03T02:55:00Z",
"trace_id": "f1e97272-1fe4-1894-898b-a230f3fca121"
} | {
"account_age_days": 562,
"account_id": "ACCT-BE89F5551EFD",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_2",
"session_entropy": 0.23
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 188,
"timestamp": "2026-01-03T02:55:00Z",
"transaction_amount_usd": 15689.3
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 158503.24,
"financial_exposure_usd": 295796.73,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109894",
"label": "benign",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-07T20:54:00Z",
"trace_id": "8b34fb65-27b9-19e5-a1ce-86bc324209f0"
} | {
"account_age_days": 622,
"account_id": "ACCT-F4A8E361A478",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.761
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 374,
"timestamp": "2026-01-07T11:45:00Z",
"transaction_amount_usd": 8.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3663.45,
"financial_exposure_usd": 4718.84,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105716",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "high",
"timestamp": "2026-01-04T23:16:00Z",
"trace_id": "46278d61-47d7-2076-cc3c-aaa298512c30"
} | {
"account_age_days": 800,
"account_id": "ACCT-985C7833D4B4",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.239
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 237,
"timestamp": "2026-01-04T13:54:00Z",
"transaction_amount_usd": 16.38
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.449,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2234708.85,
"financial_exposure_usd": 3212679.48,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109633",
"label": "benign",
"label_confidence": 0.501,
"severity": "high",
"timestamp": "2026-01-07T16:33:00Z",
"trace_id": "b8aeac54-023c-c1e9-a64e-f65e236ab6de"
} | {
"account_age_days": 371,
"account_id": "ACCT-3381BC889847",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.63
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1151,
"timestamp": "2026-01-07T16:33:00Z",
"transaction_amount_usd": 3567.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4283.71,
"financial_exposure_usd": 5100.7,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102975",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "medium",
"timestamp": "2026-01-03T01:35:00Z",
"trace_id": "df92ee72-0291-785d-c9ff-78b0a74583c4"
} | {
"account_age_days": 136,
"account_id": "ACCT-1FB96917E889",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 605,
"timestamp": "2026-01-03T01:35:00Z",
"transaction_amount_usd": 27858.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 279661.45,
"financial_exposure_usd": 376283.89,
"recoverable_pct": 0.032
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100708",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "critical",
"timestamp": "2026-01-01T11:48:00Z",
"trace_id": "e4eef5b9-47da-7f5e-96a0-48232f0d1582"
} | {
"account_age_days": 364,
"account_id": "ACCT-F055E55D8006",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.889
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 385,
"timestamp": "2026-01-01T02:38:00Z",
"transaction_amount_usd": 1.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.48,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 183952.71,
"financial_exposure_usd": 291586.16,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108651",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-07T00:11:00Z",
"trace_id": "2d06e243-07a6-93bb-d194-5240dc127e5a"
} | {
"account_age_days": 1027,
"account_id": "ACCT-203C7346C65D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.175
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 92,
"timestamp": "2026-01-07T00:11:00Z",
"transaction_amount_usd": 14093.07
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1601.45,
"financial_exposure_usd": 2395.37,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109203",
"label": "benign",
"label_confidence": 0.611,
"severity": "high",
"timestamp": "2026-01-07T09:23:00Z",
"trace_id": "204618df-4c70-f3f2-ca52-b06e42460fef"
} | {
"account_age_days": 298,
"account_id": "ACCT-837E7996A18A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.289
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 111,
"timestamp": "2026-01-07T05:25:00Z",
"transaction_amount_usd": 21.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3065.77,
"financial_exposure_usd": 3399.4,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101986",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "low",
"timestamp": "2026-01-02T09:06:00Z",
"trace_id": "47c1551f-038a-325a-0732-cde9d9404475"
} | {
"account_age_days": 1157,
"account_id": "ACCT-FFAC595E0A1A",
"baseline_risk_score": 0.565,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 235,
"timestamp": "2026-01-02T09:06:00Z",
"transaction_amount_usd": 60831.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 352105.77,
"financial_exposure_usd": 694831.83,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109029",
"label": "benign",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-07T06:29:00Z",
"trace_id": "422f7868-fe34-0e9f-3d31-241fe5137980"
} | {
"account_age_days": 973,
"account_id": "ACCT-C633DD122665",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.466
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 956,
"timestamp": "2026-01-07T06:29:00Z",
"transaction_amount_usd": 13396.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1673.92,
"financial_exposure_usd": 2548.21,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107865",
"label": "benign",
"label_confidence": 0.658,
"severity": "low",
"timestamp": "2026-01-06T11:05:00Z",
"trace_id": "96fd38d9-d136-8042-1460-757811c9028f"
} | {
"account_age_days": 511,
"account_id": "ACCT-D7A503A8724B",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 294,
"timestamp": "2026-01-06T08:15:00Z",
"transaction_amount_usd": 8.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1942.47,
"financial_exposure_usd": 3081.05,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102936",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-03T00:56:00Z",
"trace_id": "7cf5edb3-0dd2-9ea7-61e2-8d3737c9552b"
} | {
"account_age_days": 1198,
"account_id": "ACCT-D401D076EA6A",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 260,
"timestamp": "2026-01-02T20:45:00Z",
"transaction_amount_usd": 14.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 335577.4,
"financial_exposure_usd": 649482.51,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100151",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "medium",
"timestamp": "2026-01-01T02:31:00Z",
"trace_id": "71b0c1fa-a22e-b45b-1986-133d8b73aba7"
} | {
"account_age_days": 898,
"account_id": "ACCT-5170A2EFE777",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_1",
"session_entropy": 0.54
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1011,
"timestamp": "2026-01-01T02:31:00Z",
"transaction_amount_usd": 4399.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.776,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 363759.61,
"financial_exposure_usd": 517767.3,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108010",
"label": "benign",
"label_confidence": 0.528,
"severity": "low",
"timestamp": "2026-01-06T13:30:00Z",
"trace_id": "f23b5584-1a5b-aaa1-09a0-4c49055f2ee3"
} | {
"account_age_days": 454,
"account_id": "ACCT-AF2209F43B6B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.396
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1123,
"timestamp": "2026-01-06T13:30:00Z",
"transaction_amount_usd": 3758.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2308.34,
"financial_exposure_usd": 2636.46,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101747",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-02T05:07:00Z",
"trace_id": "7d2eb0e7-f683-29a9-9c6d-b523cc5314d1"
} | {
"account_age_days": 434,
"account_id": "ACCT-C344881F69D9",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.152
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 308,
"timestamp": "2026-01-02T05:07:00Z",
"transaction_amount_usd": 88296.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 703437.95,
"financial_exposure_usd": 1044679.8,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105679",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-04T22:39:00Z",
"trace_id": "e35ed865-d955-6c31-336f-7aee8f941cf4"
} | {
"account_age_days": 1558,
"account_id": "ACCT-FB52FFBBFEAB",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.119
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 210,
"timestamp": "2026-01-04T22:39:00Z",
"transaction_amount_usd": 650211.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.851,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1685514.44,
"financial_exposure_usd": 4209612.47,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108591",
"label": "benign",
"label_confidence": 0.727,
"severity": "critical",
"timestamp": "2026-01-06T23:11:00Z",
"trace_id": "41d45655-4bd5-ff25-0140-1dfae7dc2a7f"
} | {
"account_age_days": 1906,
"account_id": "ACCT-7DFE32B71C74",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.7
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 603,
"timestamp": "2026-01-06T23:11:00Z",
"transaction_amount_usd": 12210.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4521.3,
"financial_exposure_usd": 4565.2,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108601",
"label": "benign",
"label_confidence": 0.603,
"severity": "low",
"timestamp": "2026-01-06T23:21:00Z",
"trace_id": "81764cf0-f6d5-1338-42e6-80922789d34f"
} | {
"account_age_days": 1293,
"account_id": "ACCT-8420CEE06A9A",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 167,
"timestamp": "2026-01-06T18:57:00Z",
"transaction_amount_usd": 12.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.606,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3906.32,
"financial_exposure_usd": 4288.93,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107294",
"label": "benign",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-06T01:34:00Z",
"trace_id": "890f88ce-5074-39f0-3657-4326c5485e0b"
} | {
"account_age_days": 1818,
"account_id": "ACCT-016040251DF9",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 926,
"timestamp": "2026-01-06T01:34:00Z",
"transaction_amount_usd": 4165.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1253.84,
"financial_exposure_usd": 2525.07,
"recoverable_pct": 0.932
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104787",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "high",
"timestamp": "2026-01-04T07:47:00Z",
"trace_id": "d652543b-5276-8152-7f53-272610b7c9d6"
} | {
"account_age_days": 608,
"account_id": "ACCT-6EDF6149E5C5",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.686
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 86,
"timestamp": "2026-01-04T07:47:00Z",
"transaction_amount_usd": 2170623.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.756,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3738448.18,
"financial_exposure_usd": 6537573.55,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105825",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "high",
"timestamp": "2026-01-05T01:05:00Z",
"trace_id": "a641c314-2e9e-d46e-7ae5-44bc9b7e9a4d"
} | {
"account_age_days": 1039,
"account_id": "ACCT-0CBAAB27613E",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_2",
"session_entropy": 0.625
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 963,
"timestamp": "2026-01-05T01:05:00Z",
"transaction_amount_usd": 1429179.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.428,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1144694.26,
"financial_exposure_usd": 1623405.7,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100744",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-01T12:24:00Z",
"trace_id": "17efbc92-ae21-6ba1-f9e6-142a10d1884d"
} | {
"account_age_days": 1567,
"account_id": "ACCT-7F58F9421EA0",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.498
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 140,
"timestamp": "2026-01-01T03:12:00Z",
"transaction_amount_usd": 3.88
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 373314.15,
"financial_exposure_usd": 812861.75,
"recoverable_pct": 0.158
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100477",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "medium",
"timestamp": "2026-01-01T07:57:00Z",
"trace_id": "ffba47b9-50fd-4b74-5b27-737f463ba616"
} | {
"account_age_days": 1442,
"account_id": "ACCT-4FC5668BB4EC",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.705
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 239,
"timestamp": "2026-01-01T05:28:00Z",
"transaction_amount_usd": 19.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.394,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 267827.54,
"financial_exposure_usd": 568687.1,
"recoverable_pct": 0.261
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104050",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-03T19:30:00Z",
"trace_id": "af99b2dd-0ea8-eaee-b54d-6b4b67cb3f08"
} | {
"account_age_days": 1410,
"account_id": "ACCT-D51F70C26BB6",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_2",
"session_entropy": 0.228
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 108,
"timestamp": "2026-01-03T14:52:00Z",
"transaction_amount_usd": 5.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.41,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 845416.3,
"financial_exposure_usd": 2007682.86,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108528",
"label": "benign",
"label_confidence": 0.578,
"severity": "medium",
"timestamp": "2026-01-06T22:08:00Z",
"trace_id": "94c6f1a5-0705-9530-e03f-6f445afea3a6"
} | {
"account_age_days": 276,
"account_id": "ACCT-D30490FD6882",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.62
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 146,
"timestamp": "2026-01-06T22:08:00Z",
"transaction_amount_usd": 3623.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.608,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3991.07,
"financial_exposure_usd": 7746.71,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103611",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "critical",
"timestamp": "2026-01-03T12:11:00Z",
"trace_id": "037e37e9-3f55-1446-309d-a02f97aec6c1"
} | {
"account_age_days": 1693,
"account_id": "ACCT-176345F53AE3",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.41
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 278,
"timestamp": "2026-01-03T07:22:00Z",
"transaction_amount_usd": 14.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.805,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2661113.36,
"financial_exposure_usd": 3967554.39,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109451",
"label": "benign",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-07T13:31:00Z",
"trace_id": "1a8d0e44-b6bb-b181-71d1-6b970b86f4aa"
} | {
"account_age_days": 124,
"account_id": "ACCT-5593D26E2EC6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.927
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 353,
"timestamp": "2026-01-07T03:23:00Z",
"transaction_amount_usd": 17.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 358.7,
"financial_exposure_usd": 426.18,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103928",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-03T17:28:00Z",
"trace_id": "537b37de-ddb2-4442-e982-d5a2b0dd8230"
} | {
"account_age_days": 497,
"account_id": "ACCT-9E84F6E65D2E",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_3",
"session_entropy": 0.784
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 373,
"timestamp": "2026-01-03T10:53:00Z",
"transaction_amount_usd": 22.52
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.744,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2101550.21,
"financial_exposure_usd": 3852788.67,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104805",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-04T08:05:00Z",
"trace_id": "d1d4be4a-af9a-e2b0-e4d1-8b0b5f9f91d0"
} | {
"account_age_days": 1176,
"account_id": "ACCT-5CE61D8EF3D6",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.138
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1143,
"timestamp": "2026-01-04T08:05:00Z",
"transaction_amount_usd": 2862286.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.815,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2624767.39,
"financial_exposure_usd": 3172451.04,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108860",
"label": "benign",
"label_confidence": 0.473,
"severity": "low",
"timestamp": "2026-01-07T03:40:00Z",
"trace_id": "30b64317-2498-efcf-1f45-47b7a694229e"
} | {
"account_age_days": 1080,
"account_id": "ACCT-5FC7C0C4DE32",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.853
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 147,
"timestamp": "2026-01-06T16:37:00Z",
"transaction_amount_usd": 19.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1374.16,
"financial_exposure_usd": 3326.66,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103936",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-03T17:36:00Z",
"trace_id": "784ffc30-f84f-d7b7-38b6-7ecc167a540f"
} | {
"account_age_days": 398,
"account_id": "ACCT-3016E071A237",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_3",
"session_entropy": 0.867
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 185,
"timestamp": "2026-01-03T17:06:00Z",
"transaction_amount_usd": 19.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.527,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2611491.43,
"financial_exposure_usd": 2956386.19,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103930",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-03T17:30:00Z",
"trace_id": "796f5863-6240-6c18-0ec3-5b7cf67e8cb0"
} | {
"account_age_days": 72,
"account_id": "ACCT-87B86A688119",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 668,
"timestamp": "2026-01-03T17:30:00Z",
"transaction_amount_usd": 1695499.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3365271.63,
"financial_exposure_usd": 5766531.61,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109411",
"label": "benign",
"label_confidence": 0.616,
"severity": "high",
"timestamp": "2026-01-07T12:51:00Z",
"trace_id": "3dc500b6-cbd7-0efa-ada3-9242acc1f770"
} | {
"account_age_days": 1214,
"account_id": "ACCT-D7F4F281A5D9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.895
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 243,
"timestamp": "2026-01-07T09:23:00Z",
"transaction_amount_usd": 18.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.57,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2188.5,
"financial_exposure_usd": 2613.48,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105915",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "medium",
"timestamp": "2026-01-05T02:35:00Z",
"trace_id": "0ec879b7-531b-73d3-f7a9-cb1eedc4960f"
} | {
"account_age_days": 827,
"account_id": "ACCT-6ECD1AB40A59",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_2",
"session_entropy": 0.876
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1022,
"timestamp": "2026-01-05T02:35:00Z",
"transaction_amount_usd": 1857570.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.706,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2059288.69,
"financial_exposure_usd": 2098094,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.