schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101048",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-01T17:28:00Z",
"trace_id": "ea673147-af51-9026-a6fa-28139514476b"
} | {
"account_age_days": 1680,
"account_id": "ACCT-EC0016B9948C",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 217,
"timestamp": "2026-01-01T12:24:00Z",
"transaction_amount_usd": 3.42
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.881,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 74403.87,
"financial_exposure_usd": 184036.09,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104266",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "low",
"timestamp": "2026-01-03T23:06:00Z",
"trace_id": "274c1a2c-4afd-e5aa-0eec-e6312a2502e9"
} | {
"account_age_days": 90,
"account_id": "ACCT-59A46FFB7D1A",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 911,
"timestamp": "2026-01-03T23:06:00Z",
"transaction_amount_usd": 629388.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2282337.15,
"financial_exposure_usd": 3109568.02,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107544",
"label": "benign",
"label_confidence": 0.72,
"severity": "medium",
"timestamp": "2026-01-06T05:44:00Z",
"trace_id": "7747e602-9ec0-b068-3da1-7ef1696e1bf9"
} | {
"account_age_days": 1330,
"account_id": "ACCT-34A9A9DA7335",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 957,
"timestamp": "2026-01-06T05:44:00Z",
"transaction_amount_usd": 9370.35
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4846.77,
"financial_exposure_usd": 7672.75,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103495",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-03T10:15:00Z",
"trace_id": "182c5d5b-49e6-c5a8-7205-d8d66d94181c"
} | {
"account_age_days": 1228,
"account_id": "ACCT-9B93D2EE2F87",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.406
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 128,
"timestamp": "2026-01-02T21:36:00Z",
"transaction_amount_usd": 16.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2171553.38,
"financial_exposure_usd": 3068002.54,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108017",
"label": "benign",
"label_confidence": 0.522,
"severity": "medium",
"timestamp": "2026-01-06T13:37:00Z",
"trace_id": "8390cc3d-3dbd-aa36-0c9a-5d9fcbfd4315"
} | {
"account_age_days": 530,
"account_id": "ACCT-357A4D258F42",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.865
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1079,
"timestamp": "2026-01-06T13:37:00Z",
"transaction_amount_usd": 13898.73
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 145.92,
"financial_exposure_usd": 238.35,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103790",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-03T15:10:00Z",
"trace_id": "b50fa8a8-4ac6-b339-0fc5-1085139c4881"
} | {
"account_age_days": 1856,
"account_id": "ACCT-8DEF296AEDF7",
"baseline_risk_score": 0.248,
"kyc_tier": "tier_1",
"session_entropy": 0.299
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 244,
"timestamp": "2026-01-03T03:37:00Z",
"transaction_amount_usd": 8.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.708,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5322864.6,
"financial_exposure_usd": 5479013.58,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105120",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-04T13:20:00Z",
"trace_id": "e6a318aa-8654-30d9-3c16-38697ad7a859"
} | {
"account_age_days": 1950,
"account_id": "ACCT-709C55701AC8",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_1",
"session_entropy": 0.621
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 128,
"timestamp": "2026-01-04T04:11:00Z",
"transaction_amount_usd": 3.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.7,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4577983.61,
"financial_exposure_usd": 5095037.11,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103224",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "medium",
"timestamp": "2026-01-03T05:44:00Z",
"trace_id": "f89dab0b-973e-7762-e5aa-3e92948b2fc6"
} | {
"account_age_days": 665,
"account_id": "ACCT-A2BCB395A304",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_3",
"session_entropy": 0.633
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 128,
"timestamp": "2026-01-03T01:02:00Z",
"transaction_amount_usd": 19.58
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.663,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 163798.66,
"financial_exposure_usd": 192602.27,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105122",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "low",
"timestamp": "2026-01-04T13:22:00Z",
"trace_id": "2bfa763e-36bd-aae6-afd1-a66d1ad01292"
} | {
"account_age_days": 337,
"account_id": "ACCT-CA3D0DACC222",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.401
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 505,
"timestamp": "2026-01-04T13:22:00Z",
"transaction_amount_usd": 2099236.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.87,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5020190.77,
"financial_exposure_usd": 5575099.53,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102615",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "critical",
"timestamp": "2026-01-02T19:35:00Z",
"trace_id": "92250486-515d-dc10-5941-7553b4c89ae9"
} | {
"account_age_days": 630,
"account_id": "ACCT-06319665DCB5",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_1",
"session_entropy": 0.412
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 321,
"timestamp": "2026-01-02T13:00:00Z",
"transaction_amount_usd": 6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_c... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.75,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 821302.36,
"financial_exposure_usd": 1418431.93,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103294",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "medium",
"timestamp": "2026-01-03T06:54:00Z",
"trace_id": "a36b7ad4-82d0-aa22-fe6d-1670a805eb6f"
} | {
"account_age_days": 636,
"account_id": "ACCT-C7002F400385",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.942
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 992,
"timestamp": "2026-01-03T06:54:00Z",
"transaction_amount_usd": 116168.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 627422.13,
"financial_exposure_usd": 686384.26,
"recoverable_pct": 0.325
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102172",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "critical",
"timestamp": "2026-01-02T12:12:00Z",
"trace_id": "3c56d33c-0975-68b9-9da5-ec70dd0e9847"
} | {
"account_age_days": 352,
"account_id": "ACCT-3EEC876C1146",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_3",
"session_entropy": 0.516
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 522,
"timestamp": "2026-01-02T12:12:00Z",
"transaction_amount_usd": 105995.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.931,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 308811.77,
"financial_exposure_usd": 451446.64,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105752",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "medium",
"timestamp": "2026-01-04T23:52:00Z",
"trace_id": "df705c17-f321-d713-e1e0-142f1b18ab15"
} | {
"account_age_days": 1719,
"account_id": "ACCT-5729B52D3D59",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.217
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 980,
"timestamp": "2026-01-04T23:52:00Z",
"transaction_amount_usd": 2238238.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.856,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4498632.77,
"financial_exposure_usd": 5138728.46,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104900",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-04T09:40:00Z",
"trace_id": "3b34381c-8122-8cac-3e5f-d38811d81df8"
} | {
"account_age_days": 551,
"account_id": "ACCT-0DEA7B6F30EE",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.708
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 303,
"timestamp": "2026-01-04T08:59:00Z",
"transaction_amount_usd": 7.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.628,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5533636.29,
"financial_exposure_usd": 6410129.3,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101230",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-01T20:30:00Z",
"trace_id": "35262f08-01d4-a246-8376-c1a3de533e1d"
} | {
"account_age_days": 1701,
"account_id": "ACCT-82041C74326C",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_3",
"session_entropy": 0.64
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 327,
"timestamp": "2026-01-01T07:40:00Z",
"transaction_amount_usd": 18.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.496,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 457032.61,
"financial_exposure_usd": 525362.24,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105415",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-04T18:15:00Z",
"trace_id": "161d0637-77ea-fc47-c68d-ee87c4cc3743"
} | {
"account_age_days": 58,
"account_id": "ACCT-FEA99BF44775",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 197,
"timestamp": "2026-01-04T13:53:00Z",
"transaction_amount_usd": 2.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.587,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2454094.14,
"financial_exposure_usd": 5663643.75,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105653",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "high",
"timestamp": "2026-01-04T22:13:00Z",
"trace_id": "59f5a79b-f812-ca9e-a16e-e6c164223a44"
} | {
"account_age_days": 1712,
"account_id": "ACCT-95774CBEFFD1",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_1",
"session_entropy": 0.301
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 619,
"timestamp": "2026-01-04T22:13:00Z",
"transaction_amount_usd": 2228358.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.739,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5583204.28,
"financial_exposure_usd": 6995251.8,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106692",
"label": "benign",
"label_confidence": 0.506,
"severity": "medium",
"timestamp": "2026-01-05T15:32:00Z",
"trace_id": "6fc0f933-b629-9d27-e2d4-deee25ef12ff"
} | {
"account_age_days": 534,
"account_id": "ACCT-B442120D69FC",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 240,
"timestamp": "2026-01-05T15:32:00Z",
"transaction_amount_usd": 8935.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 715.37,
"financial_exposure_usd": 1083.21,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105102",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-04T13:02:00Z",
"trace_id": "07cfea44-6a30-721c-f7d6-86e096585eb8"
} | {
"account_age_days": 877,
"account_id": "ACCT-94B06AEEA6F9",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1136,
"timestamp": "2026-01-04T13:02:00Z",
"transaction_amount_usd": 803922.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1776223.36,
"financial_exposure_usd": 2993760.87,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104892",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "critical",
"timestamp": "2026-01-04T09:32:00Z",
"trace_id": "b130fded-6688-6dbd-2722-a8ab647f8eaa"
} | {
"account_age_days": 1032,
"account_id": "ACCT-B084CD6A9641",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.246
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 175,
"timestamp": "2026-01-04T09:32:00Z",
"transaction_amount_usd": 813697.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.518,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2668279.79,
"financial_exposure_usd": 5463467.84,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109473",
"label": "benign",
"label_confidence": 0.695,
"severity": "medium",
"timestamp": "2026-01-07T13:53:00Z",
"trace_id": "b4e31af4-0e0d-4a76-3fef-e2e1f3f98e24"
} | {
"account_age_days": 1639,
"account_id": "ACCT-66E38DD9A69B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.383
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 767,
"timestamp": "2026-01-07T13:53:00Z",
"transaction_amount_usd": 1176.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2076.69,
"financial_exposure_usd": 3891.36,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101378",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "critical",
"timestamp": "2026-01-01T22:58:00Z",
"trace_id": "95745b9f-c1d6-7539-6de8-cc17df0d7ee5"
} | {
"account_age_days": 1951,
"account_id": "ACCT-C2C78CCF9B9B",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.325
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 382,
"timestamp": "2026-01-01T22:58:00Z",
"transaction_amount_usd": 1626.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.565,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 313709.55,
"financial_exposure_usd": 742938.47,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100182",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-01T03:02:00Z",
"trace_id": "9884f76d-091e-11df-a2cf-c32d4c34f9de"
} | {
"account_age_days": 1413,
"account_id": "ACCT-6FDBAB51EF7B",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1175,
"timestamp": "2026-01-01T03:02:00Z",
"transaction_amount_usd": 4875.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.651,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 404849.31,
"financial_exposure_usd": 530759.51,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107030",
"label": "benign",
"label_confidence": 0.616,
"severity": "medium",
"timestamp": "2026-01-05T21:10:00Z",
"trace_id": "1b570894-d274-302b-64f9-7c314fd6b456"
} | {
"account_age_days": 1860,
"account_id": "ACCT-2EAC3C5F2226",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.318
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 362,
"timestamp": "2026-01-05T15:42:00Z",
"transaction_amount_usd": 5.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1745.45,
"financial_exposure_usd": 4115.4,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103926",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-03T17:26:00Z",
"trace_id": "a25cd84f-bcfe-0b39-a2b3-2428da09016e"
} | {
"account_age_days": 560,
"account_id": "ACCT-567B5EABC8EB",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.233
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 527,
"timestamp": "2026-01-03T17:26:00Z",
"transaction_amount_usd": 1028498.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1466329.24,
"financial_exposure_usd": 2479568.77,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109073",
"label": "benign",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-07T07:13:00Z",
"trace_id": "b52fbdd8-e722-9b32-f9ef-d761c539a160"
} | {
"account_age_days": 190,
"account_id": "ACCT-1FA3AD3F1D46",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.893
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 103,
"timestamp": "2026-01-06T19:26:00Z",
"transaction_amount_usd": 8.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1368.31,
"financial_exposure_usd": 1563.63,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100046",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "medium",
"timestamp": "2026-01-01T00:46:00Z",
"trace_id": "25f88c74-53ea-4919-db48-62c2d5ff2a1f"
} | {
"account_age_days": 1024,
"account_id": "ACCT-3EEBC04A9DF2",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.65
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 612,
"timestamp": "2026-01-01T00:46:00Z",
"transaction_amount_usd": 116223.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 327146.83,
"financial_exposure_usd": 576099.05,
"recoverable_pct": 0.117
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107345",
"label": "benign",
"label_confidence": 0.541,
"severity": "critical",
"timestamp": "2026-01-06T02:25:00Z",
"trace_id": "5b03a012-22c2-fea9-ad8e-a9d3e52593a9"
} | {
"account_age_days": 1530,
"account_id": "ACCT-0347BFBFA359",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.72
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1046,
"timestamp": "2026-01-06T02:25:00Z",
"transaction_amount_usd": 14400.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1788.2,
"financial_exposure_usd": 1807.47,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109386",
"label": "benign",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-07T12:26:00Z",
"trace_id": "6a108b10-2f4c-27b0-0c02-6f11aa757e4b"
} | {
"account_age_days": 1307,
"account_id": "ACCT-5DCA5AE141C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 395,
"timestamp": "2026-01-07T12:26:00Z",
"transaction_amount_usd": 9984.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3799.49,
"financial_exposure_usd": 6546.6,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105746",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-04T23:46:00Z",
"trace_id": "ae7febec-d598-ef81-551d-1a319f9eee30"
} | {
"account_age_days": 1178,
"account_id": "ACCT-2A78DD36D09E",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_2",
"session_entropy": 0.904
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 226,
"timestamp": "2026-01-04T12:09:00Z",
"transaction_amount_usd": 10.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1565754.73,
"financial_exposure_usd": 1877433.79,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102063",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "high",
"timestamp": "2026-01-02T10:23:00Z",
"trace_id": "cbab4cd4-f021-ed61-cbc4-9a92838d18a6"
} | {
"account_age_days": 566,
"account_id": "ACCT-6351A8E81EF7",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.22
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 286,
"timestamp": "2026-01-02T00:47:00Z",
"transaction_amount_usd": 4.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 802962.84,
"financial_exposure_usd": 990497.57,
"recoverable_pct": 0.286
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100357",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "low",
"timestamp": "2026-01-01T05:57:00Z",
"trace_id": "35b1d7d4-1c09-3b82-44cb-3cf68e241f29"
} | {
"account_age_days": 1251,
"account_id": "ACCT-6FD13B5E8857",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_2",
"session_entropy": 0.491
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1030,
"timestamp": "2026-01-01T05:57:00Z",
"transaction_amount_usd": 32801.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.744,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 368640.94,
"financial_exposure_usd": 520612.24,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107969",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-06T12:49:00Z",
"trace_id": "f5230db6-3d7e-b3f9-98bb-d27f915e759f"
} | {
"account_age_days": 1263,
"account_id": "ACCT-91C82EE1DA87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.25
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 259,
"timestamp": "2026-01-06T05:09:00Z",
"transaction_amount_usd": 14.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3592.34,
"financial_exposure_usd": 4559.23,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101875",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "critical",
"timestamp": "2026-01-02T07:15:00Z",
"trace_id": "f8111e34-0d20-de6f-6f88-c259c028339e"
} | {
"account_age_days": 1830,
"account_id": "ACCT-3FB5404D07F7",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_2",
"session_entropy": 0.811
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 282,
"timestamp": "2026-01-02T07:15:00Z",
"transaction_amount_usd": 54551.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 353912.73,
"financial_exposure_usd": 411698.15,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102779",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-02T22:19:00Z",
"trace_id": "4881e261-2d09-4f05-f37e-9f6da8c10a9b"
} | {
"account_age_days": 817,
"account_id": "ACCT-F785A2B4F2BF",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_3",
"session_entropy": 0.731
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 335,
"timestamp": "2026-01-02T22:19:00Z",
"transaction_amount_usd": 48807.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.927,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 517433.79,
"financial_exposure_usd": 1017637.63,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106169",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-05T06:49:00Z",
"trace_id": "b6141447-be98-c660-12c7-76392ecd3f7b"
} | {
"account_age_days": 890,
"account_id": "ACCT-BD12A2523FD1",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_1",
"session_entropy": 0.537
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 581,
"timestamp": "2026-01-05T06:49:00Z",
"transaction_amount_usd": 2767211.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.755,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2568425.39,
"financial_exposure_usd": 6058295.28,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108359",
"label": "benign",
"label_confidence": 0.567,
"severity": "high",
"timestamp": "2026-01-06T19:19:00Z",
"trace_id": "a0467721-d699-9ea2-ebf9-3de93cd8d9f8"
} | {
"account_age_days": 1494,
"account_id": "ACCT-A5723B8E0D58",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.639
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 119,
"timestamp": "2026-01-06T19:19:00Z",
"transaction_amount_usd": 1223.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1990.97,
"financial_exposure_usd": 2463.6,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106300",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-05T09:00:00Z",
"trace_id": "f984af8e-613e-426f-2fef-827cd5c1c27c"
} | {
"account_age_days": 1091,
"account_id": "ACCT-983528195AEA",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.538
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1092,
"timestamp": "2026-01-05T09:00:00Z",
"transaction_amount_usd": 2821964.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1626483.4,
"financial_exposure_usd": 3088638.23,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109282",
"label": "benign",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-07T10:42:00Z",
"trace_id": "3f199417-54f7-1406-3a2f-009828fc7375"
} | {
"account_age_days": 472,
"account_id": "ACCT-416BEECC4CB7",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_2",
"session_entropy": 0.475
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1078,
"timestamp": "2026-01-07T10:42:00Z",
"transaction_amount_usd": 2728.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.786,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3223.15,
"financial_exposure_usd": 3762.91,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108560",
"label": "benign",
"label_confidence": 0.724,
"severity": "low",
"timestamp": "2026-01-06T22:40:00Z",
"trace_id": "7a4947c0-7a2e-092f-760c-5d6d807076c3"
} | {
"account_age_days": 1244,
"account_id": "ACCT-5C8D7F234A20",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_3",
"session_entropy": 0.514
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 419,
"timestamp": "2026-01-06T22:40:00Z",
"transaction_amount_usd": 14513.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2202.83,
"financial_exposure_usd": 2427.98,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104799",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-04T07:59:00Z",
"trace_id": "116f0368-e106-4333-3c85-13aadbbef395"
} | {
"account_age_days": 1784,
"account_id": "ACCT-27A772004B73",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 415,
"timestamp": "2026-01-04T07:59:00Z",
"transaction_amount_usd": 1690391.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3385422.23,
"financial_exposure_usd": 6359027.82,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103106",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "critical",
"timestamp": "2026-01-03T03:46:00Z",
"trace_id": "bdb21400-2332-069b-4268-e648405c2b9b"
} | {
"account_age_days": 749,
"account_id": "ACCT-F5547FB0CB58",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_3",
"session_entropy": 0.61
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 348,
"timestamp": "2026-01-02T20:22:00Z",
"transaction_amount_usd": 0.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 989436.49,
"financial_exposure_usd": 1198813.26,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107217",
"label": "benign",
"label_confidence": 0.57,
"severity": "medium",
"timestamp": "2026-01-06T00:17:00Z",
"trace_id": "5c074df7-a133-efcb-ebf2-758a7a49fd1f"
} | {
"account_age_days": 1469,
"account_id": "ACCT-209805A371D0",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.848
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 593,
"timestamp": "2026-01-06T00:17:00Z",
"transaction_amount_usd": 10744.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1630.6,
"financial_exposure_usd": 1991,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109412",
"label": "benign",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-07T12:52:00Z",
"trace_id": "a4f3af68-a742-e269-06b6-a9502edf7f5a"
} | {
"account_age_days": 1782,
"account_id": "ACCT-104D6075F886",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.376
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 111,
"timestamp": "2026-01-07T12:52:00Z",
"transaction_amount_usd": 7933.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2098.49,
"financial_exposure_usd": 3119.78,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102999",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-03T01:59:00Z",
"trace_id": "6a82e24a-90df-d252-6e69-0e23ca76c9a2"
} | {
"account_age_days": 651,
"account_id": "ACCT-FBC6A4A7FF03",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 830,
"timestamp": "2026-01-03T01:59:00Z",
"transaction_amount_usd": 3424.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.803,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 604284.69,
"financial_exposure_usd": 1106706.32,
"recoverable_pct": 0.076
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105813",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-05T00:53:00Z",
"trace_id": "609f86ee-f5d3-6916-858f-b25eaf8c8488"
} | {
"account_age_days": 1741,
"account_id": "ACCT-0DFE1D1D23C9",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 326,
"timestamp": "2026-01-05T00:53:00Z",
"transaction_amount_usd": 1020919.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.66,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1715229.49,
"financial_exposure_usd": 3481580.77,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109590",
"label": "benign",
"label_confidence": 0.63,
"severity": "medium",
"timestamp": "2026-01-07T15:50:00Z",
"trace_id": "1a4f5e21-a5bb-c1a8-a9cc-2a00ece63033"
} | {
"account_age_days": 725,
"account_id": "ACCT-3F79F70FB27F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 290,
"timestamp": "2026-01-07T12:53:00Z",
"transaction_amount_usd": 2.51
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1717.82,
"financial_exposure_usd": 2181.91,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101990",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "critical",
"timestamp": "2026-01-02T09:10:00Z",
"trace_id": "1c770f78-1e83-74b8-6ba6-29751a7bfd28"
} | {
"account_age_days": 1961,
"account_id": "ACCT-FBE88C6E3D22",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 393,
"timestamp": "2026-01-02T04:14:00Z",
"transaction_amount_usd": 3.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 488823.82,
"financial_exposure_usd": 732472.7,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105031",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-04T11:51:00Z",
"trace_id": "1c7094f6-6966-ec4c-132e-fb1ca4b4606b"
} | {
"account_age_days": 1568,
"account_id": "ACCT-2F1DB4F2E6B7",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_3",
"session_entropy": 0.564
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 999,
"timestamp": "2026-01-04T11:51:00Z",
"transaction_amount_usd": 574672.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.633,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2006667.4,
"financial_exposure_usd": 2025489.48,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100777",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-01T12:57:00Z",
"trace_id": "50827c4e-1a57-9ab9-549c-96767b3dd48a"
} | {
"account_age_days": 194,
"account_id": "ACCT-D1B3F6B16D73",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_1",
"session_entropy": 0.401
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 804,
"timestamp": "2026-01-01T12:57:00Z",
"transaction_amount_usd": 53048.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 771930.6,
"financial_exposure_usd": 877490.19,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109918",
"label": "benign",
"label_confidence": 0.574,
"severity": "low",
"timestamp": "2026-01-07T21:18:00Z",
"trace_id": "20c99743-339e-8f27-0689-c6d331fb3884"
} | {
"account_age_days": 282,
"account_id": "ACCT-FFFE7410F3EA",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 347,
"timestamp": "2026-01-07T21:18:00Z",
"transaction_amount_usd": 7717.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.642,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2877.78,
"financial_exposure_usd": 3461.36,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107305",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-06T01:45:00Z",
"trace_id": "dce6278a-50e0-ae85-d778-a779b4bae426"
} | {
"account_age_days": 1814,
"account_id": "ACCT-8FF8F42A161D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.403
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1037,
"timestamp": "2026-01-06T01:45:00Z",
"transaction_amount_usd": 11971.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 748.79,
"financial_exposure_usd": 1054.52,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105981",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-05T03:41:00Z",
"trace_id": "9273d012-12d9-7b8a-b5a7-b0a2118c9b28"
} | {
"account_age_days": 492,
"account_id": "ACCT-949B7CA9B8D5",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_1",
"session_entropy": 0.216
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 822,
"timestamp": "2026-01-05T03:41:00Z",
"transaction_amount_usd": 53389.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4390802.65,
"financial_exposure_usd": 8969920.85,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106101",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-05T05:41:00Z",
"trace_id": "e8a88151-aa0d-e1ce-290b-4a74b7946db9"
} | {
"account_age_days": 1866,
"account_id": "ACCT-3C011FDA9E16",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.647
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 269,
"timestamp": "2026-01-04T22:57:00Z",
"transaction_amount_usd": 2.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2843531.21,
"financial_exposure_usd": 3506924.64,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102493",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "critical",
"timestamp": "2026-01-02T17:33:00Z",
"trace_id": "d8471d2b-02fc-35ca-200c-32b948335418"
} | {
"account_age_days": 614,
"account_id": "ACCT-B4A95404D83C",
"baseline_risk_score": 0.621,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 142,
"timestamp": "2026-01-02T05:59:00Z",
"transaction_amount_usd": 10.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.76,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 655378.68,
"financial_exposure_usd": 757724.72,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109295",
"label": "benign",
"label_confidence": 0.579,
"severity": "critical",
"timestamp": "2026-01-07T10:55:00Z",
"trace_id": "0d6cddeb-bbb4-b621-7070-d8f2765493c2"
} | {
"account_age_days": 1312,
"account_id": "ACCT-8DB1A2FC5858",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.619
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 865,
"timestamp": "2026-01-07T10:55:00Z",
"transaction_amount_usd": 5022.54
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 537.31,
"financial_exposure_usd": 762.41,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103009",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-03T02:09:00Z",
"trace_id": "429d90e8-cf61-b4aa-88dc-61d9a19c0a13"
} | {
"account_age_days": 263,
"account_id": "ACCT-1ED3BB0936D6",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 281,
"timestamp": "2026-01-02T21:06:00Z",
"transaction_amount_usd": 22.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.409,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 253636.3,
"financial_exposure_usd": 628159.05,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105666",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-04T22:26:00Z",
"trace_id": "d2779944-0299-5253-cf9b-2b7e30f78e38"
} | {
"account_age_days": 310,
"account_id": "ACCT-392438806393",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_2",
"session_entropy": 0.304
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 725,
"timestamp": "2026-01-04T22:26:00Z",
"transaction_amount_usd": 1124062
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.638,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1444446.44,
"financial_exposure_usd": 2791884.3,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107381",
"label": "benign",
"label_confidence": 0.537,
"severity": "low",
"timestamp": "2026-01-06T03:01:00Z",
"trace_id": "9e3bc48b-b9e4-5a19-27c8-315edba89b23"
} | {
"account_age_days": 1704,
"account_id": "ACCT-7A053C0E72F5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 300,
"timestamp": "2026-01-05T22:46:00Z",
"transaction_amount_usd": 23.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4189.35,
"financial_exposure_usd": 5297.48,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101823",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "low",
"timestamp": "2026-01-02T06:23:00Z",
"trace_id": "4c1f6599-c326-c591-8223-46fb17facfd3"
} | {
"account_age_days": 643,
"account_id": "ACCT-AE17799F56D9",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 333,
"timestamp": "2026-01-02T04:46:00Z",
"transaction_amount_usd": 7.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 507052.01,
"financial_exposure_usd": 676049.97,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107613",
"label": "benign",
"label_confidence": 0.519,
"severity": "low",
"timestamp": "2026-01-06T06:53:00Z",
"trace_id": "bbc3ec03-1bca-c80e-e7bf-93a9ec7f021d"
} | {
"account_age_days": 836,
"account_id": "ACCT-81A97FFF994B",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1028,
"timestamp": "2026-01-06T06:53:00Z",
"transaction_amount_usd": 7045.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.453,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2173.15,
"financial_exposure_usd": 3560.65,
"recoverable_pct": 0.857
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107853",
"label": "benign",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-06T10:53:00Z",
"trace_id": "1c0a4cca-da2b-aaef-d097-4adc60b88ddf"
} | {
"account_age_days": 1507,
"account_id": "ACCT-E0C603E3538D",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 876,
"timestamp": "2026-01-06T10:53:00Z",
"transaction_amount_usd": 14255.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4925.05,
"financial_exposure_usd": 4992.28,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105719",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "medium",
"timestamp": "2026-01-04T23:19:00Z",
"trace_id": "411cad7e-5e77-d337-e5f7-aadf0922f225"
} | {
"account_age_days": 1431,
"account_id": "ACCT-6B7DC26CD6B9",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_2",
"session_entropy": 0.765
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 179,
"timestamp": "2026-01-04T15:28:00Z",
"transaction_amount_usd": 17.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4563886.48,
"financial_exposure_usd": 5987723.21,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102430",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "critical",
"timestamp": "2026-01-02T16:30:00Z",
"trace_id": "2553c4c9-cd76-e92d-a850-447edbdd31a1"
} | {
"account_age_days": 1628,
"account_id": "ACCT-8BDC468B5C99",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_2",
"session_entropy": 0.598
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 482,
"timestamp": "2026-01-02T16:30:00Z",
"transaction_amount_usd": 14136.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 534533.25,
"financial_exposure_usd": 1069225.38,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107008",
"label": "benign",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-05T20:48:00Z",
"trace_id": "8de87a7b-e7cf-404f-e275-1e48b2404b8a"
} | {
"account_age_days": 1210,
"account_id": "ACCT-D3BD0E6E3AFC",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_3",
"session_entropy": 0.622
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 102,
"timestamp": "2026-01-05T20:48:00Z",
"transaction_amount_usd": 6435.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2401.06,
"financial_exposure_usd": 4378.7,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103675",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "medium",
"timestamp": "2026-01-03T13:15:00Z",
"trace_id": "b5e60e0a-cc8c-3fff-93ca-a0c92e0d5dc3"
} | {
"account_age_days": 1688,
"account_id": "ACCT-DA045042F36A",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_1",
"session_entropy": 0.486
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 159,
"timestamp": "2026-01-03T12:08:00Z",
"transaction_amount_usd": 2.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.761,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3326500.96,
"financial_exposure_usd": 5105731.22,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106553",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "critical",
"timestamp": "2026-01-05T13:13:00Z",
"trace_id": "10b75174-d908-a25a-a79d-65fe496c2f9b"
} | {
"account_age_days": 1483,
"account_id": "ACCT-6E5F208DA8FE",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.768
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 624,
"timestamp": "2026-01-05T13:13:00Z",
"transaction_amount_usd": 2827488.76
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2538841.06,
"financial_exposure_usd": 4730120.85,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103040",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-03T02:40:00Z",
"trace_id": "43346b97-bb02-f367-ff0e-07b45eac80c5"
} | {
"account_age_days": 762,
"account_id": "ACCT-5D36A47077A4",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_2",
"session_entropy": 0.917
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 344,
"timestamp": "2026-01-03T00:01:00Z",
"transaction_amount_usd": 12
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.92,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 183541.09,
"financial_exposure_usd": 447950,
"recoverable_pct": 0.264
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103062",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-03T03:02:00Z",
"trace_id": "28d323e0-b915-2650-c039-8dce5db6bd78"
} | {
"account_age_days": 1247,
"account_id": "ACCT-44EE206A8AFB",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.636
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 615,
"timestamp": "2026-01-03T03:02:00Z",
"transaction_amount_usd": 1382.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.473,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 267442.31,
"financial_exposure_usd": 576538.84,
"recoverable_pct": 0.093
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102682",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "low",
"timestamp": "2026-01-02T20:42:00Z",
"trace_id": "79028262-98bb-c323-52fb-2fd21218add6"
} | {
"account_age_days": 1852,
"account_id": "ACCT-82F4ABB1CF7C",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1018,
"timestamp": "2026-01-02T20:42:00Z",
"transaction_amount_usd": 770.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 615670.98,
"financial_exposure_usd": 687322.53,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101188",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-01T19:48:00Z",
"trace_id": "285d96ff-bd09-d97a-80f4-a56e8314d948"
} | {
"account_age_days": 1278,
"account_id": "ACCT-EFD10041CA24",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 111,
"timestamp": "2026-01-01T19:48:00Z",
"transaction_amount_usd": 52402.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.437,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 681435.8,
"financial_exposure_usd": 958311.2,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101290",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-01T21:30:00Z",
"trace_id": "c6bb3b6c-5fea-4b06-aa30-7af16df9d561"
} | {
"account_age_days": 1452,
"account_id": "ACCT-6BB43A284879",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 315,
"timestamp": "2026-01-01T21:30:00Z",
"transaction_amount_usd": 111594.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.405,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 665916.47,
"financial_exposure_usd": 864561.61,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101563",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-02T02:03:00Z",
"trace_id": "d1d74024-8a97-3c84-c507-955a46dba376"
} | {
"account_age_days": 1621,
"account_id": "ACCT-7E36B695464A",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 532,
"timestamp": "2026-01-02T02:03:00Z",
"transaction_amount_usd": 81055.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.519,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 380598.48,
"financial_exposure_usd": 605788.89,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100187",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-01T03:07:00Z",
"trace_id": "266c3392-396c-6135-34d8-8c514f2ed3eb"
} | {
"account_age_days": 107,
"account_id": "ACCT-89747BAF1928",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1020,
"timestamp": "2026-01-01T03:07:00Z",
"transaction_amount_usd": 87587.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.468,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 501369.64,
"financial_exposure_usd": 753781.93,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104129",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-03T20:49:00Z",
"trace_id": "8718c6f5-9911-537d-ae4b-27c6ee92f67f"
} | {
"account_age_days": 872,
"account_id": "ACCT-AC3BF8981CF9",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_3",
"session_entropy": 0.896
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 124,
"timestamp": "2026-01-03T12:50:00Z",
"transaction_amount_usd": 5.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.934,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3041923.27,
"financial_exposure_usd": 3429695.21,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107024",
"label": "benign",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-05T21:04:00Z",
"trace_id": "26a254c3-e9d4-ba07-538e-57f6972d4787"
} | {
"account_age_days": 794,
"account_id": "ACCT-C4BE46C8D3D0",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_3",
"session_entropy": 0.75
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 977,
"timestamp": "2026-01-05T21:04:00Z",
"transaction_amount_usd": 3295.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5104.51,
"financial_exposure_usd": 9359.83,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108171",
"label": "benign",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-06T16:11:00Z",
"trace_id": "fb79a111-695b-97d5-aa54-1d8949e3df9e"
} | {
"account_age_days": 1696,
"account_id": "ACCT-985CCE6B60B5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 871,
"timestamp": "2026-01-06T16:11:00Z",
"transaction_amount_usd": 13865.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4968.22,
"financial_exposure_usd": 5309.84,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105479",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "critical",
"timestamp": "2026-01-04T19:19:00Z",
"trace_id": "0c815567-ba1f-ad70-a271-50983d62dee2"
} | {
"account_age_days": 592,
"account_id": "ACCT-C5AECC39DD4B",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.505
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 173,
"timestamp": "2026-01-04T11:46:00Z",
"transaction_amount_usd": 9.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2933922.29,
"financial_exposure_usd": 3605612.2,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101129",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "low",
"timestamp": "2026-01-01T18:49:00Z",
"trace_id": "f69ae79f-f2ab-2697-6bed-53746a602de3"
} | {
"account_age_days": 1888,
"account_id": "ACCT-64F375D235AF",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_1",
"session_entropy": 0.255
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 632,
"timestamp": "2026-01-01T18:49:00Z",
"transaction_amount_usd": 28871.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.67,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 384915.06,
"financial_exposure_usd": 818187.23,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106416",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-05T10:56:00Z",
"trace_id": "6d3b2d5a-3ae6-dfc4-fa72-10139ad7ea03"
} | {
"account_age_days": 503,
"account_id": "ACCT-10A68F55240F",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_1",
"session_entropy": 0.351
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 568,
"timestamp": "2026-01-05T10:56:00Z",
"transaction_amount_usd": 1643105.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2328462.2,
"financial_exposure_usd": 2922369.91,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107838",
"label": "benign",
"label_confidence": 0.545,
"severity": "low",
"timestamp": "2026-01-06T10:38:00Z",
"trace_id": "26d700c3-61c3-5cfd-8dbe-429b7dd077a4"
} | {
"account_age_days": 842,
"account_id": "ACCT-2D1A7FC7E0A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.642
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 200,
"timestamp": "2026-01-06T04:31:00Z",
"transaction_amount_usd": 10.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3937.85,
"financial_exposure_usd": 4133.26,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102027",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-02T09:47:00Z",
"trace_id": "bab8d091-b00b-a510-e0cb-79e0ccaeb0dd"
} | {
"account_age_days": 1595,
"account_id": "ACCT-D52F602DCC19",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_1",
"session_entropy": 0.78
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1190,
"timestamp": "2026-01-02T09:47:00Z",
"transaction_amount_usd": 52439.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.431,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 733101.53,
"financial_exposure_usd": 780605.6,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106276",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-05T08:36:00Z",
"trace_id": "a0ae7b02-5699-cd24-5a2f-2521c8724cd7"
} | {
"account_age_days": 1354,
"account_id": "ACCT-FC1521B1229A",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_2",
"session_entropy": 0.54
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 165,
"timestamp": "2026-01-05T04:10:00Z",
"transaction_amount_usd": 15.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.845,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1775732.42,
"financial_exposure_usd": 2442316.27,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109466",
"label": "benign",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-07T13:46:00Z",
"trace_id": "4bd18482-042d-605e-f233-861c74724818"
} | {
"account_age_days": 1387,
"account_id": "ACCT-5742BD2B1F7C",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_2",
"session_entropy": 0.498
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 363,
"timestamp": "2026-01-07T13:46:00Z",
"transaction_amount_usd": 8948.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3582.38,
"financial_exposure_usd": 3811.78,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104847",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "high",
"timestamp": "2026-01-04T08:47:00Z",
"trace_id": "ae590340-5fd0-81fa-1376-50f71e20f889"
} | {
"account_age_days": 1271,
"account_id": "ACCT-0D1574757C8A",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.594
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 917,
"timestamp": "2026-01-04T08:47:00Z",
"transaction_amount_usd": 1819808.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.912,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2322797.95,
"financial_exposure_usd": 2941472.89,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101006",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-01T16:46:00Z",
"trace_id": "e86ceeb2-2db0-7db6-5524-3ed345d332bf"
} | {
"account_age_days": 250,
"account_id": "ACCT-806E930089BF",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1025,
"timestamp": "2026-01-01T16:46:00Z",
"transaction_amount_usd": 84613.12
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.801,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 250563.53,
"financial_exposure_usd": 589174.77,
"recoverable_pct": 0.297
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107526",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-06T05:26:00Z",
"trace_id": "cb366bfe-e9f5-dc1e-6dc1-7a73fce0950f"
} | {
"account_age_days": 307,
"account_id": "ACCT-6BF9695356B8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.49
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 94,
"timestamp": "2026-01-05T21:08:00Z",
"transaction_amount_usd": 9.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2040.16,
"financial_exposure_usd": 2519.39,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103282",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "high",
"timestamp": "2026-01-03T06:42:00Z",
"trace_id": "34262701-516e-96be-60a5-c78bfc7a62a7"
} | {
"account_age_days": 92,
"account_id": "ACCT-5C894AC5858D",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.687
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1061,
"timestamp": "2026-01-03T06:42:00Z",
"transaction_amount_usd": 19037.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 240680.79,
"financial_exposure_usd": 414510.75,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105461",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-04T19:01:00Z",
"trace_id": "4f72bdda-a705-d9ef-9af8-8e5ec6e74e16"
} | {
"account_age_days": 1797,
"account_id": "ACCT-A780A9CB34AA",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_2",
"session_entropy": 0.289
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 833,
"timestamp": "2026-01-04T19:01:00Z",
"transaction_amount_usd": 1704476.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.636,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2899472.29,
"financial_exposure_usd": 5882611.98,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107741",
"label": "benign",
"label_confidence": 0.571,
"severity": "high",
"timestamp": "2026-01-06T09:01:00Z",
"trace_id": "bfe230bc-fb0d-b63a-3136-2767e5811154"
} | {
"account_age_days": 129,
"account_id": "ACCT-E1FF6C31F58F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 297,
"timestamp": "2026-01-05T21:30:00Z",
"transaction_amount_usd": 3.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1634.8,
"financial_exposure_usd": 2738.45,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101634",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "critical",
"timestamp": "2026-01-02T03:14:00Z",
"trace_id": "a8b26268-c042-7f10-a21a-67eace9ea502"
} | {
"account_age_days": 333,
"account_id": "ACCT-39D8FDDC71B9",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.765
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 108,
"timestamp": "2026-01-01T23:24:00Z",
"transaction_amount_usd": 23.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.365,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 348270.28,
"financial_exposure_usd": 360088.74,
"recoverable_pct": 0.28
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102945",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "critical",
"timestamp": "2026-01-03T01:05:00Z",
"trace_id": "49b60911-656f-bc4e-1701-48694cf87852"
} | {
"account_age_days": 1590,
"account_id": "ACCT-1C6502EA11A0",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.517
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 426,
"timestamp": "2026-01-03T01:05:00Z",
"transaction_amount_usd": 71590.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 658145.49,
"financial_exposure_usd": 1110847.02,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108527",
"label": "benign",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-06T22:07:00Z",
"trace_id": "e06b7a97-8f5d-1300-3b9d-b02aa51b9663"
} | {
"account_age_days": 553,
"account_id": "ACCT-9290749E0700",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.167
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 80,
"timestamp": "2026-01-06T14:31:00Z",
"transaction_amount_usd": 1.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1450.09,
"financial_exposure_usd": 1479.67,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106295",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-05T08:55:00Z",
"trace_id": "c33961e6-4dea-1c0d-a262-61d01575608d"
} | {
"account_age_days": 231,
"account_id": "ACCT-0DE532121C90",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_3",
"session_entropy": 0.451
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 118,
"timestamp": "2026-01-05T06:48:00Z",
"transaction_amount_usd": 12.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4182764.78,
"financial_exposure_usd": 6333658.1,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106551",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-05T13:11:00Z",
"trace_id": "23c1ab8d-2384-45eb-cae3-d06c29265fe9"
} | {
"account_age_days": 1627,
"account_id": "ACCT-A2172233BE29",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_2",
"session_entropy": 0.274
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 150,
"timestamp": "2026-01-05T04:12:00Z",
"transaction_amount_usd": 15.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.543,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5708932.58,
"financial_exposure_usd": 6861922.01,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105829",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-05T01:09:00Z",
"trace_id": "3f00aa25-65be-83f6-04b9-5837f01811f8"
} | {
"account_age_days": 247,
"account_id": "ACCT-F78406216D5A",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_2",
"session_entropy": 0.812
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 398,
"timestamp": "2026-01-04T19:14:00Z",
"transaction_amount_usd": 3.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2571131.74,
"financial_exposure_usd": 3675918.39,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108735",
"label": "benign",
"label_confidence": 0.687,
"severity": "high",
"timestamp": "2026-01-07T01:35:00Z",
"trace_id": "c545f304-42b2-6b2f-4234-1b056aa5ac6c"
} | {
"account_age_days": 45,
"account_id": "ACCT-DE03DEC885FC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.212
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1103,
"timestamp": "2026-01-07T01:35:00Z",
"transaction_amount_usd": 10339.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.582,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1112.17,
"financial_exposure_usd": 2466.37,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103490",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "medium",
"timestamp": "2026-01-03T10:10:00Z",
"trace_id": "174360c5-d3ea-2f68-2544-68e0732f895c"
} | {
"account_age_days": 1151,
"account_id": "ACCT-6A9BB9D9FB85",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_3",
"session_entropy": 0.246
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 340,
"timestamp": "2026-01-02T22:15:00Z",
"transaction_amount_usd": 3.93
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 8400993.9,
"financial_exposure_usd": 9466685.88,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100196",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "low",
"timestamp": "2026-01-01T03:16:00Z",
"trace_id": "1e06d96a-a302-7b21-02c1-c26953d509af"
} | {
"account_age_days": 547,
"account_id": "ACCT-97514F4938AC",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_1",
"session_entropy": 0.469
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 977,
"timestamp": "2026-01-01T03:16:00Z",
"transaction_amount_usd": 12762.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.686,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 246356.41,
"financial_exposure_usd": 322465.87,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103493",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "high",
"timestamp": "2026-01-03T10:13:00Z",
"trace_id": "31c0a064-c6db-ff7c-7a23-f8c6e11b8aa3"
} | {
"account_age_days": 1355,
"account_id": "ACCT-23D38A6CF3F4",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_3",
"session_entropy": 0.302
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 799,
"timestamp": "2026-01-03T10:13:00Z",
"transaction_amount_usd": 1123662.4
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.683,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1003764.39,
"financial_exposure_usd": 1555101.81,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.